Analysis
-
max time kernel
135s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
07/07/2024, 01:11
Static task
static1
Behavioral task
behavioral1
Sample
6cd8a052498b02d1f070d36dcc6540838193d35eee101c8c41de0a5dd634c44b.exe
Resource
win7-20240220-en
General
-
Target
6cd8a052498b02d1f070d36dcc6540838193d35eee101c8c41de0a5dd634c44b.exe
-
Size
2.0MB
-
MD5
5251794e42d5d9e95309ebe4f6ea9151
-
SHA1
6a47353cf0aba3e393130bb66d7e747f7d9c6660
-
SHA256
6cd8a052498b02d1f070d36dcc6540838193d35eee101c8c41de0a5dd634c44b
-
SHA512
a93ee7c9d3ccced5ce2ef3249c09159cf524b48c23139de4ecb7689548020de2172acfe1b134749d8614ab15d726e7a03fe5a06f887e75d70c3935a55995554d
-
SSDEEP
24576:yTbBv5rUdxiUSDFRUq6RdVgP2lWZZIRLbhWgNM95vcJm0rez0X7Sma3dlmmgctuT:UBci/FRAnWSb/JnfTWe9HPiTVEyO
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2792 webFont.exe 2472 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 2668 cmd.exe 2668 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\servicing\de-DE\webFont.exe webFont.exe File created C:\Windows\L2Schemas\cmd.exe webFont.exe File created C:\Windows\L2Schemas\ebf1f9fa8afd6d webFont.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2792 webFont.exe 2472 cmd.exe 2472 cmd.exe 2472 cmd.exe 2472 cmd.exe 2472 cmd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2472 cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2792 webFont.exe Token: SeDebugPrivilege 2472 cmd.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2004 wrote to memory of 2368 2004 6cd8a052498b02d1f070d36dcc6540838193d35eee101c8c41de0a5dd634c44b.exe 28 PID 2004 wrote to memory of 2368 2004 6cd8a052498b02d1f070d36dcc6540838193d35eee101c8c41de0a5dd634c44b.exe 28 PID 2004 wrote to memory of 2368 2004 6cd8a052498b02d1f070d36dcc6540838193d35eee101c8c41de0a5dd634c44b.exe 28 PID 2004 wrote to memory of 2368 2004 6cd8a052498b02d1f070d36dcc6540838193d35eee101c8c41de0a5dd634c44b.exe 28 PID 2368 wrote to memory of 2668 2368 WScript.exe 29 PID 2368 wrote to memory of 2668 2368 WScript.exe 29 PID 2368 wrote to memory of 2668 2368 WScript.exe 29 PID 2368 wrote to memory of 2668 2368 WScript.exe 29 PID 2668 wrote to memory of 2792 2668 cmd.exe 31 PID 2668 wrote to memory of 2792 2668 cmd.exe 31 PID 2668 wrote to memory of 2792 2668 cmd.exe 31 PID 2668 wrote to memory of 2792 2668 cmd.exe 31 PID 2792 wrote to memory of 2424 2792 webFont.exe 32 PID 2792 wrote to memory of 2424 2792 webFont.exe 32 PID 2792 wrote to memory of 2424 2792 webFont.exe 32 PID 2424 wrote to memory of 2484 2424 cmd.exe 34 PID 2424 wrote to memory of 2484 2424 cmd.exe 34 PID 2424 wrote to memory of 2484 2424 cmd.exe 34 PID 2424 wrote to memory of 2496 2424 cmd.exe 35 PID 2424 wrote to memory of 2496 2424 cmd.exe 35 PID 2424 wrote to memory of 2496 2424 cmd.exe 35 PID 2424 wrote to memory of 2472 2424 cmd.exe 36 PID 2424 wrote to memory of 2472 2424 cmd.exe 36 PID 2424 wrote to memory of 2472 2424 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\6cd8a052498b02d1f070d36dcc6540838193d35eee101c8c41de0a5dd634c44b.exe"C:\Users\Admin\AppData\Local\Temp\6cd8a052498b02d1f070d36dcc6540838193d35eee101c8c41de0a5dd634c44b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\BridgeMsChainreviewBroker\QGZV4gEZhWdI2xPJlBss86jAqfIGOr8L2x3YW0oQAF2lKE5w6P9d.vbe"2⤵
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\BridgeMsChainreviewBroker\IHHWG.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\BridgeMsChainreviewBroker\webFont.exe"C:\BridgeMsChainreviewBroker/webFont.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\qOerumYC5d.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\system32\chcp.comchcp 650016⤵PID:2484
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:2496
-
-
C:\Windows\L2Schemas\cmd.exe"C:\Windows\L2Schemas\cmd.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2472
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78B
MD5e5d9ebb1906c5b64b10f98f1c54ef302
SHA1f74b3cd0654c55083ff835cd19f46f8b99eacc32
SHA256e1ddfaa9d7516fbf7dde55318d604d18f83ec1236e096ad113fb0ee72eb41dff
SHA5129d921fc79d5de980dc5d7b75ae1a828a95d71938f1353456bfee80c43c53d53fb214af72419e44dc59668ce542784036bb7ee4b2c40cda3a9f02b58a6a98f133
-
Filesize
208B
MD508b19bed5e5e46b38e206927681fa2bc
SHA199e75b198dd66178c12ffb4826a2e556f3cf1f1a
SHA256cb0a2a3bb9273eb24c7344ae981f68bfc88b2d570b7eb149a3722a8907645ba7
SHA51217c8d915c95276f9e295592cdc03d3345a0c254cbac3b7c560753ff438c126fa4180e23cf964852cfbcf2a7d35edc371280dd9d76e05f59dfce70564786c9fb7
-
Filesize
204B
MD562497bf3896c0f8f3ac41d66440403ab
SHA1e86fcf68732300fa6d71fde847cf327f7d548efc
SHA256ab93eeec27a1a96d6ab61a1ef54189c20814110232788a156e37f092ae5f5297
SHA512e1111d07f6e94d444b1d948a01e13de32881ffffb98f18f86059e144dfe2c2c21e5e7c54fc310a8cdaf8c4ad7c1b6f5d7030f93ba29b37b0a32b14b430494cfe
-
Filesize
1.7MB
MD55b575cdec6aa42b8ba173ed342b7dcb6
SHA13fe17672b9cca787b505234058a31a68278d701d
SHA25630dbf81d2b4ead6a51efd24e9f31539bf3102acb1396b0e44492a17d2f4ede26
SHA512fb99487dae0193e157ad0d70ace82b09b3541980f1cb2a6fee8599a814fa3710e5687e5c68e57bbf28c7bcdc042e238545b825c1ba1550c519de1e18a7a0a71f