Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 11:09
Static task
static1
Behavioral task
behavioral1
Sample
a437cac1caf64a4e1992a548a8c43ec0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a437cac1caf64a4e1992a548a8c43ec0N.exe
Resource
win10v2004-20240709-en
General
-
Target
a437cac1caf64a4e1992a548a8c43ec0N.exe
-
Size
90KB
-
MD5
a437cac1caf64a4e1992a548a8c43ec0
-
SHA1
51b4d1a2e8e5f98ca715a12ee0d9d1f78b80003c
-
SHA256
a2bad3298dc092dbcfd26960f3a68d685a59828fb08565b6c99ee3e52829b0ca
-
SHA512
596fcce24f3f0f89aae11feebc2f91b2673827e4da03d6edfe1014035ef71598ae4595c5a67d513d2b1e83b490b0068ef92f8933a6e24e2be317c0e5fba94221
-
SSDEEP
1536:ljj3x85+Ks2WtjYGlMJZnieL2p9UvVNdfxWl53PiYzGH2e118u7G3QLTIPCDeA8y:9jh85+Ks77mn1CvmNxxWjhzGWsQALTYm
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2036 a8j7Us8pKsvGPHE.exe 3012 svhost.exe -
Loads dropped DLL 2 IoCs
pid Process 2292 a437cac1caf64a4e1992a548a8c43ec0N.exe 2292 a437cac1caf64a4e1992a548a8c43ec0N.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Winhost = "C:\\Windows\\svhost.exe" svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Winhost = "C:\\Windows\\svhost.exe" a437cac1caf64a4e1992a548a8c43ec0N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\svhost.exe svhost.exe File created C:\Windows\svhost.exe a437cac1caf64a4e1992a548a8c43ec0N.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2292 a437cac1caf64a4e1992a548a8c43ec0N.exe Token: SeDebugPrivilege 3012 svhost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2036 2292 a437cac1caf64a4e1992a548a8c43ec0N.exe 31 PID 2292 wrote to memory of 2036 2292 a437cac1caf64a4e1992a548a8c43ec0N.exe 31 PID 2292 wrote to memory of 2036 2292 a437cac1caf64a4e1992a548a8c43ec0N.exe 31 PID 2292 wrote to memory of 2036 2292 a437cac1caf64a4e1992a548a8c43ec0N.exe 31 PID 2292 wrote to memory of 3012 2292 a437cac1caf64a4e1992a548a8c43ec0N.exe 32 PID 2292 wrote to memory of 3012 2292 a437cac1caf64a4e1992a548a8c43ec0N.exe 32 PID 2292 wrote to memory of 3012 2292 a437cac1caf64a4e1992a548a8c43ec0N.exe 32 PID 2292 wrote to memory of 3012 2292 a437cac1caf64a4e1992a548a8c43ec0N.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\a437cac1caf64a4e1992a548a8c43ec0N.exe"C:\Users\Admin\AppData\Local\Temp\a437cac1caf64a4e1992a548a8c43ec0N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\a8j7Us8pKsvGPHE.exeC:\Users\Admin\AppData\Local\Temp\a8j7Us8pKsvGPHE.exe2⤵
- Executes dropped EXE
PID:2036
-
-
C:\Windows\svhost.exe"C:\Windows\svhost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD5b2c02a292e0605de999fb89b125e09e7
SHA1668343b7354b5bc04d87e7a2b539cf6b127694c5
SHA25634694ad0e37ef9872b55e3c4551f7eefd72a28713d876feaca27b8085d2dbb55
SHA512c9260700aa4b96b05b33e8805f6ef4a6b65faf501c7615e78fad984ae1867431bbee0678a1a43f44116a4b6c19d9128c274303568da2ee2f91537ae99f5918ae
-
Filesize
16KB
MD55e7c375139b7453abd0b91a8a220f8e5
SHA188a3d645fab0f4129c1e485c90b593ab60e469ae
SHA25636ec99991653fa54be6f638d0b95eeac3e3f5e3006e4320318c4aa6fc2e330a8
SHA5120805763fe788e0edeb69747d2f419842dc093c2d871d39f25afe2cd27867d54f90fa15892ff5e8c7148280c1ca9b90a0a375f56c277e5d442257c9e77295f1b2
-
Filesize
73KB
MD52ffc9a24492c0a1af4d562f0c7608aa5
SHA11fd5ff6136fba36e9ee22598ecd250af3180ee53
SHA25669828c857d4824b9f850b1e0597d2c134c91114b7a0774c41dffe33b0eb23721
SHA51203806d162931b1dcf036a51e753ff073a43664491a3cd2e649e55dd77d5e910f7bcf1e217eb0889ef606457b679428640e975ee227de941a200f652417bc6d5d