Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    05/07/2024, 00:05

General

  • Target

    3094c423310954b6bd00c2d9ca4f0fa50ba87f5826e8303e95adfe1fd1b9e92e.exe

  • Size

    16KB

  • MD5

    6a32b0887bf6989293704bbf53f3a2ba

  • SHA1

    bce7a52434b624e9da8041b6ffb67a46b477a8ba

  • SHA256

    3094c423310954b6bd00c2d9ca4f0fa50ba87f5826e8303e95adfe1fd1b9e92e

  • SHA512

    5337650a4a73f06831e108dd23d26f87f135c13910d91c37f580b2896444a62810cbcd600d70470e844287b629258134d160df874ec7537d6af110eef72c28c1

  • SSDEEP

    192:nx+uPBkqyIfgm64++u6gzYMzZ0dqsEq65+O0I5L0pJ/WDvd0EtITbKH62RTs2/f5:x+uPfoQ+DfYMzKdPEsOuubuEG3KHM2/R

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3094c423310954b6bd00c2d9ca4f0fa50ba87f5826e8303e95adfe1fd1b9e92e.exe
    "C:\Users\Admin\AppData\Local\Temp\3094c423310954b6bd00c2d9ca4f0fa50ba87f5826e8303e95adfe1fd1b9e92e.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1700
    • C:\Windows\svhost.exe
      "C:\Windows\svhost.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:2952

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\F3ObfHdlc3L5ENq.exe

    Filesize

    16KB

    MD5

    509ab79d17a0ada3b80e356282df5580

    SHA1

    7c44f90d142a50e926bbd5a3eec0d3e5f826789d

    SHA256

    605e8cd7da3f2a70c0bb0b5ce67e967a27fee40367e2022006967387a590e621

    SHA512

    b5d59a02ddbbb59f94bbe08211727d1463e19484746ac29385ba0a2f548d8c7ebf111af81dc13c8782d5d5d4dfaeb07b3c42c04ebd50c207b2a6dd01befd0440

  • C:\Windows\svhost.exe

    Filesize

    16KB

    MD5

    76fd02b48297edb28940bdfa3fa1c48a

    SHA1

    bf5cae1057a0aca8bf3aab8b121fe77ebb0788ce

    SHA256

    07abd35f09b954eba7011ce18b225017c50168e039732680df58ae703324825c

    SHA512

    28c7bf4785547f6df9d678699a55cfb24c429a2bac5375733ff2f760c92933190517d8acd740bdf69c3ecc799635279af5d7ebd848c5b471318d1f330c441ff0