Analysis

  • max time kernel
    92s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/06/2024, 02:32

General

  • Target

    7d8e93c44d33688d17c996eec60ffba480eade79aed079a66d2396ae044aaa7d.exe

  • Size

    17KB

  • MD5

    4924b6609f89ccf0ccdcf64a5cd4ebe9

  • SHA1

    d8dd5c842d4f79df7ef58c9a0d96cfad5211a6cd

  • SHA256

    7d8e93c44d33688d17c996eec60ffba480eade79aed079a66d2396ae044aaa7d

  • SHA512

    5b90aac1b1b2b8a63d67fc3677c6026b81349a2b85aac5b014575e157832eff6d6183e890841d12fd0502a50851024027e36e78ebc29f4e3a434cbb9bf9b12af

  • SSDEEP

    384:x+uPfoQ+DfYMzKdPEsOuubuEG3KHM2/ZBjRz:IMAQ+BzWPEwnE+KHM2/ZBjh

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7d8e93c44d33688d17c996eec60ffba480eade79aed079a66d2396ae044aaa7d.exe
    "C:\Users\Admin\AppData\Local\Temp\7d8e93c44d33688d17c996eec60ffba480eade79aed079a66d2396ae044aaa7d.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2320
    • C:\Windows\svhost.exe
      "C:\Windows\svhost.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:1492

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xml

    Filesize

    338KB

    MD5

    1f4da93d08d2e352f93c7200e9449575

    SHA1

    081eeb0da463696cdc9125be71128bf2aeb67149

    SHA256

    0ab7e77c99283622e5bba9fc27d8500d7a84e5bf3f629ca9b2fb9672b9f79a23

    SHA512

    f24e7d9cc1c99310ebfa47246ef9a4d40ad60dcff4fbba8fd500b9ecf98a2f0469173104772756d6c74d5663551a368e54fad6f1da6e3cd2900f3c9cbd341b46

  • C:\Users\Admin\AppData\Local\Temp\dcxEhx023ykks66.exe

    Filesize

    17KB

    MD5

    19bf923fc7b0a1a382a80cd74bcd99c3

    SHA1

    0dfe1c592e3b2e53530bfab642022833bab2a8f2

    SHA256

    5309c2251ca307df8522179987cb138000f4294a9bc80ffedfb3ffa97113971f

    SHA512

    2b8380595d0a776454eb35c389540fd6864e64ac5fcde4f94e0b0ccdf8e5e589f2cce783c77a0d7e9e86467382546acf7159e4dc9bef56e93c17379206235583

  • C:\Windows\svhost.exe

    Filesize

    16KB

    MD5

    76fd02b48297edb28940bdfa3fa1c48a

    SHA1

    bf5cae1057a0aca8bf3aab8b121fe77ebb0788ce

    SHA256

    07abd35f09b954eba7011ce18b225017c50168e039732680df58ae703324825c

    SHA512

    28c7bf4785547f6df9d678699a55cfb24c429a2bac5375733ff2f760c92933190517d8acd740bdf69c3ecc799635279af5d7ebd848c5b471318d1f330c441ff0