Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
24-06-2024 20:52
Static task
static1
Behavioral task
behavioral1
Sample
4193f57c71a4c5a46fb50bbadee6e9d1786bba4820f17da52bbd0b741e311693.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4193f57c71a4c5a46fb50bbadee6e9d1786bba4820f17da52bbd0b741e311693.exe
Resource
win10v2004-20240226-en
General
-
Target
4193f57c71a4c5a46fb50bbadee6e9d1786bba4820f17da52bbd0b741e311693.exe
-
Size
387KB
-
MD5
6a83e0018512174846a87c577db58ba2
-
SHA1
91e67bb940eb4736aca57e93f9251cc21816e7fd
-
SHA256
4193f57c71a4c5a46fb50bbadee6e9d1786bba4820f17da52bbd0b741e311693
-
SHA512
52032a277a6c5f204efce6b122c453c08bcc9bb47b1f486d27a328e197163f24abef622744879dadc69ea4d771e4b1f8e925c6556014d9177f0e5dad12dd9a85
-
SSDEEP
6144:/rTfUHeeSKOS9ccFKk3Y9t9YZjuiYz1MpA5nL:/n8yN0Mr8ZjtI1z5nL
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 20 IoCs
resource yara_rule behavioral1/files/0x0033000000015cdf-3.dat UPX behavioral1/memory/2400-8-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2400-11-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2760-13-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2760-16-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2760-17-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2760-18-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2760-21-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2760-28-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2760-29-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2760-37-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2760-38-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2760-44-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2760-45-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2760-52-0x0000000004600000-0x00000000058A9000-memory.dmp UPX behavioral1/memory/2760-53-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2760-55-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2760-63-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2760-64-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2760-76-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX -
Executes dropped EXE 1 IoCs
pid Process 2760 Isass.exe -
Loads dropped DLL 2 IoCs
pid Process 2400 4193f57c71a4c5a46fb50bbadee6e9d1786bba4820f17da52bbd0b741e311693.exe 2400 4193f57c71a4c5a46fb50bbadee6e9d1786bba4820f17da52bbd0b741e311693.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" 4193f57c71a4c5a46fb50bbadee6e9d1786bba4820f17da52bbd0b741e311693.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" 4193f57c71a4c5a46fb50bbadee6e9d1786bba4820f17da52bbd0b741e311693.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2400 4193f57c71a4c5a46fb50bbadee6e9d1786bba4820f17da52bbd0b741e311693.exe 2760 Isass.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2760 2400 4193f57c71a4c5a46fb50bbadee6e9d1786bba4820f17da52bbd0b741e311693.exe 28 PID 2400 wrote to memory of 2760 2400 4193f57c71a4c5a46fb50bbadee6e9d1786bba4820f17da52bbd0b741e311693.exe 28 PID 2400 wrote to memory of 2760 2400 4193f57c71a4c5a46fb50bbadee6e9d1786bba4820f17da52bbd0b741e311693.exe 28 PID 2400 wrote to memory of 2760 2400 4193f57c71a4c5a46fb50bbadee6e9d1786bba4820f17da52bbd0b741e311693.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4193f57c71a4c5a46fb50bbadee6e9d1786bba4820f17da52bbd0b741e311693.exe"C:\Users\Admin\AppData\Local\Temp\4193f57c71a4c5a46fb50bbadee6e9d1786bba4820f17da52bbd0b741e311693.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
387KB
MD56a83e0018512174846a87c577db58ba2
SHA191e67bb940eb4736aca57e93f9251cc21816e7fd
SHA2564193f57c71a4c5a46fb50bbadee6e9d1786bba4820f17da52bbd0b741e311693
SHA51252032a277a6c5f204efce6b122c453c08bcc9bb47b1f486d27a328e197163f24abef622744879dadc69ea4d771e4b1f8e925c6556014d9177f0e5dad12dd9a85