Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
04-07-2024 02:09
Behavioral task
behavioral1
Sample
e5f5e88e8becfe092d10a927f72f580fd3a98612989a69a1f6df309f32b169f6.exe
Resource
win7-20240221-en
General
-
Target
e5f5e88e8becfe092d10a927f72f580fd3a98612989a69a1f6df309f32b169f6.exe
-
Size
703KB
-
MD5
15125bd7f04e0129ceebb7781f7051d2
-
SHA1
d06ac0fc49a473fafac1069ebe195edd6996cec1
-
SHA256
e5f5e88e8becfe092d10a927f72f580fd3a98612989a69a1f6df309f32b169f6
-
SHA512
4f7ae5be7fe522742170a38f4f805b38013d908ad71ba5d4e48976036f389d89f80af5e88e652195bc4ed46142ff036ff3f4ab012d06c4185c218d76c1bd1d1d
-
SSDEEP
12288:mYV6MorX7qzuC3QHO9FQVHPF51jgcmB+3sSfAW5p5c+EV6XpIzmb:lBXu9HGaVHm8SWHe+E8Emb
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/808-0-0x0000000000EE0000-0x000000000106D000-memory.dmp upx behavioral2/memory/808-17-0x0000000000EE0000-0x000000000106D000-memory.dmp upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/808-17-0x0000000000EE0000-0x000000000106D000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 808 set thread context of 2708 808 e5f5e88e8becfe092d10a927f72f580fd3a98612989a69a1f6df309f32b169f6.exe 85 PID 2708 set thread context of 3448 2708 svchost.exe 56 PID 2708 set thread context of 1236 2708 svchost.exe 100 PID 1236 set thread context of 3448 1236 rundll32.exe 56 PID 1236 set thread context of 4960 1236 rundll32.exe 108 -
Program crash 1 IoCs
pid pid_target Process procid_target 1316 808 WerFault.exe 81 -
description ioc Process Key created \Registry\User\S-1-5-21-4204450073-1267028356-951339405-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 56 IoCs
pid Process 2708 svchost.exe 2708 svchost.exe 2708 svchost.exe 2708 svchost.exe 2708 svchost.exe 2708 svchost.exe 2708 svchost.exe 2708 svchost.exe 2708 svchost.exe 2708 svchost.exe 2708 svchost.exe 2708 svchost.exe 2708 svchost.exe 2708 svchost.exe 2708 svchost.exe 2708 svchost.exe 1236 rundll32.exe 1236 rundll32.exe 1236 rundll32.exe 1236 rundll32.exe 1236 rundll32.exe 1236 rundll32.exe 1236 rundll32.exe 1236 rundll32.exe 1236 rundll32.exe 1236 rundll32.exe 1236 rundll32.exe 1236 rundll32.exe 1236 rundll32.exe 1236 rundll32.exe 1236 rundll32.exe 1236 rundll32.exe 1236 rundll32.exe 1236 rundll32.exe 1236 rundll32.exe 1236 rundll32.exe 1236 rundll32.exe 1236 rundll32.exe 1236 rundll32.exe 1236 rundll32.exe 1236 rundll32.exe 1236 rundll32.exe 1236 rundll32.exe 1236 rundll32.exe 1236 rundll32.exe 1236 rundll32.exe 1236 rundll32.exe 1236 rundll32.exe 1236 rundll32.exe 1236 rundll32.exe 1236 rundll32.exe 1236 rundll32.exe 1236 rundll32.exe 1236 rundll32.exe 1236 rundll32.exe 1236 rundll32.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 808 e5f5e88e8becfe092d10a927f72f580fd3a98612989a69a1f6df309f32b169f6.exe 2708 svchost.exe 3448 Explorer.EXE 3448 Explorer.EXE 1236 rundll32.exe 1236 rundll32.exe 1236 rundll32.exe 1236 rundll32.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 808 e5f5e88e8becfe092d10a927f72f580fd3a98612989a69a1f6df309f32b169f6.exe 808 e5f5e88e8becfe092d10a927f72f580fd3a98612989a69a1f6df309f32b169f6.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 808 e5f5e88e8becfe092d10a927f72f580fd3a98612989a69a1f6df309f32b169f6.exe 808 e5f5e88e8becfe092d10a927f72f580fd3a98612989a69a1f6df309f32b169f6.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3448 Explorer.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 808 wrote to memory of 2708 808 e5f5e88e8becfe092d10a927f72f580fd3a98612989a69a1f6df309f32b169f6.exe 85 PID 808 wrote to memory of 2708 808 e5f5e88e8becfe092d10a927f72f580fd3a98612989a69a1f6df309f32b169f6.exe 85 PID 808 wrote to memory of 2708 808 e5f5e88e8becfe092d10a927f72f580fd3a98612989a69a1f6df309f32b169f6.exe 85 PID 808 wrote to memory of 2708 808 e5f5e88e8becfe092d10a927f72f580fd3a98612989a69a1f6df309f32b169f6.exe 85 PID 3448 wrote to memory of 1236 3448 Explorer.EXE 100 PID 3448 wrote to memory of 1236 3448 Explorer.EXE 100 PID 3448 wrote to memory of 1236 3448 Explorer.EXE 100 PID 1236 wrote to memory of 4960 1236 rundll32.exe 108 PID 1236 wrote to memory of 4960 1236 rundll32.exe 108
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\e5f5e88e8becfe092d10a927f72f580fd3a98612989a69a1f6df309f32b169f6.exe"C:\Users\Admin\AppData\Local\Temp\e5f5e88e8becfe092d10a927f72f580fd3a98612989a69a1f6df309f32b169f6.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\e5f5e88e8becfe092d10a927f72f580fd3a98612989a69a1f6df309f32b169f6.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 808 -s 7283⤵
- Program crash
PID:1316
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:4960
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 808 -ip 8081⤵PID:2380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
266KB
MD5c88ef6ae25ea906a594e0f0efb9fbaa2
SHA1db7b26cb48d5267b6821308124ca5f7e2a245613
SHA256fe1f7beed9b270acbd19ebd3e289654fd237f1240b97ad9a823ecd80a0164ba6
SHA512c3be303037b08b3fc8434b8c4b15c6b1701ee5610f4ed479d7818b07d52192b8b2994159e7fd5fb50c7b8378248d305494660a07c6ef7509fe795332c9f0b20d