Analysis

  • max time kernel
    117s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    22/07/2024, 11:09

General

  • Target

    a437cac1caf64a4e1992a548a8c43ec0N.exe

  • Size

    90KB

  • MD5

    a437cac1caf64a4e1992a548a8c43ec0

  • SHA1

    51b4d1a2e8e5f98ca715a12ee0d9d1f78b80003c

  • SHA256

    a2bad3298dc092dbcfd26960f3a68d685a59828fb08565b6c99ee3e52829b0ca

  • SHA512

    596fcce24f3f0f89aae11feebc2f91b2673827e4da03d6edfe1014035ef71598ae4595c5a67d513d2b1e83b490b0068ef92f8933a6e24e2be317c0e5fba94221

  • SSDEEP

    1536:ljj3x85+Ks2WtjYGlMJZnieL2p9UvVNdfxWl53PiYzGH2e118u7G3QLTIPCDeA8y:9jh85+Ks77mn1CvmNxxWjhzGWsQALTYm

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a437cac1caf64a4e1992a548a8c43ec0N.exe
    "C:\Users\Admin\AppData\Local\Temp\a437cac1caf64a4e1992a548a8c43ec0N.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2292
    • C:\Users\Admin\AppData\Local\Temp\a8j7Us8pKsvGPHE.exe
      C:\Users\Admin\AppData\Local\Temp\a8j7Us8pKsvGPHE.exe
      2⤵
      • Executes dropped EXE
      PID:2036
    • C:\Windows\svhost.exe
      "C:\Windows\svhost.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:3012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\a8j7Us8pKsvGPHE.exe

    Filesize

    90KB

    MD5

    b2c02a292e0605de999fb89b125e09e7

    SHA1

    668343b7354b5bc04d87e7a2b539cf6b127694c5

    SHA256

    34694ad0e37ef9872b55e3c4551f7eefd72a28713d876feaca27b8085d2dbb55

    SHA512

    c9260700aa4b96b05b33e8805f6ef4a6b65faf501c7615e78fad984ae1867431bbee0678a1a43f44116a4b6c19d9128c274303568da2ee2f91537ae99f5918ae

  • C:\Windows\svhost.exe

    Filesize

    16KB

    MD5

    5e7c375139b7453abd0b91a8a220f8e5

    SHA1

    88a3d645fab0f4129c1e485c90b593ab60e469ae

    SHA256

    36ec99991653fa54be6f638d0b95eeac3e3f5e3006e4320318c4aa6fc2e330a8

    SHA512

    0805763fe788e0edeb69747d2f419842dc093c2d871d39f25afe2cd27867d54f90fa15892ff5e8c7148280c1ca9b90a0a375f56c277e5d442257c9e77295f1b2

  • \Users\Admin\AppData\Local\Temp\a8j7Us8pKsvGPHE.exe

    Filesize

    73KB

    MD5

    2ffc9a24492c0a1af4d562f0c7608aa5

    SHA1

    1fd5ff6136fba36e9ee22598ecd250af3180ee53

    SHA256

    69828c857d4824b9f850b1e0597d2c134c91114b7a0774c41dffe33b0eb23721

    SHA512

    03806d162931b1dcf036a51e753ff073a43664491a3cd2e649e55dd77d5e910f7bcf1e217eb0889ef606457b679428640e975ee227de941a200f652417bc6d5d