Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
29/06/2024, 08:23
Static task
static1
Behavioral task
behavioral1
Sample
28273b1f245b0da2b764f8fd25af8b5d0123c668e7f6d11913ca676e6cff3807.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
28273b1f245b0da2b764f8fd25af8b5d0123c668e7f6d11913ca676e6cff3807.exe
Resource
win10v2004-20240508-en
General
-
Target
28273b1f245b0da2b764f8fd25af8b5d0123c668e7f6d11913ca676e6cff3807.exe
-
Size
17KB
-
MD5
20042531776a1a3a1fb17f0d80b383ab
-
SHA1
89166497845460cc70e4888ef42be7e885e5581e
-
SHA256
28273b1f245b0da2b764f8fd25af8b5d0123c668e7f6d11913ca676e6cff3807
-
SHA512
60e93e6680a98321d197e35598fb99fb1c0f7592ba8da4e39d024e54963cbfdcc33a2cdb045d91bdc74e247ac8876dc3d46df58c778a0ac4b442c54d26be9832
-
SSDEEP
384:x+uPfoQ+DfYMzKdPEsOuubuEG3KHM2/6s:IMAQ+BzWPEwnE+KHM2/L
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2784 svhost.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Winhost = "C:\\Windows\\svhost.exe" 28273b1f245b0da2b764f8fd25af8b5d0123c668e7f6d11913ca676e6cff3807.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Winhost = "C:\\Windows\\svhost.exe" svhost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\svhost.exe 28273b1f245b0da2b764f8fd25af8b5d0123c668e7f6d11913ca676e6cff3807.exe File created C:\Windows\svhost.exe svhost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2916 28273b1f245b0da2b764f8fd25af8b5d0123c668e7f6d11913ca676e6cff3807.exe Token: SeDebugPrivilege 2784 svhost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2916 wrote to memory of 2784 2916 28273b1f245b0da2b764f8fd25af8b5d0123c668e7f6d11913ca676e6cff3807.exe 28 PID 2916 wrote to memory of 2784 2916 28273b1f245b0da2b764f8fd25af8b5d0123c668e7f6d11913ca676e6cff3807.exe 28 PID 2916 wrote to memory of 2784 2916 28273b1f245b0da2b764f8fd25af8b5d0123c668e7f6d11913ca676e6cff3807.exe 28 PID 2916 wrote to memory of 2784 2916 28273b1f245b0da2b764f8fd25af8b5d0123c668e7f6d11913ca676e6cff3807.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\28273b1f245b0da2b764f8fd25af8b5d0123c668e7f6d11913ca676e6cff3807.exe"C:\Users\Admin\AppData\Local\Temp\28273b1f245b0da2b764f8fd25af8b5d0123c668e7f6d11913ca676e6cff3807.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\svhost.exe"C:\Windows\svhost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD59e72fdc81a6e6c632d3c9d4ff7621b30
SHA1354ac30b311fe7a20148938780a1e4f854437fd3
SHA25646caaaa294f8add8a0a0160005dbfecd28cd9c1aab4f3c15f365f84b9137ff32
SHA5122f0027856350bcde3b5ca36592adff6f78e9b800914d64a78963d266dbfc17ebfcd787920ae5758a93db76039605b1ad31122118cbf4a13036d89ac8550ad93c
-
Filesize
16KB
MD576fd02b48297edb28940bdfa3fa1c48a
SHA1bf5cae1057a0aca8bf3aab8b121fe77ebb0788ce
SHA25607abd35f09b954eba7011ce18b225017c50168e039732680df58ae703324825c
SHA51228c7bf4785547f6df9d678699a55cfb24c429a2bac5375733ff2f760c92933190517d8acd740bdf69c3ecc799635279af5d7ebd848c5b471318d1f330c441ff0