Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 20:26
Static task
static1
Behavioral task
behavioral1
Sample
04ef94dfa5299d98f396f53ccc066410N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
04ef94dfa5299d98f396f53ccc066410N.exe
Resource
win10v2004-20240709-en
General
-
Target
04ef94dfa5299d98f396f53ccc066410N.exe
-
Size
41KB
-
MD5
04ef94dfa5299d98f396f53ccc066410
-
SHA1
80410c41508021bd4035281fffa51d0feb8dcb02
-
SHA256
c6c6d8b82ee0b6bf0da349afaaca9c3716b4db9cdbfec38bd05d18d46221ad02
-
SHA512
00f3307b46cae42356cf378c9d3d9dc1aa432c482c608f716c0446cd43f3fa3df2337ab050def8f74af5d2841884c9383a50e2392e70f6ba787037e70a9ec511
-
SSDEEP
768:ljjAQ+BzWPEwnE+KHM2/FML/fOB+h5dc0jo4kWvMqkV45bMO78iW6M+i0GwbtQ:ljj3x85+Ks2O/fOU5qI55FIF0GytQ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1848 XvVfnGMw9Fl4Tgp.exe 3356 svhost.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Winhost = "C:\\Windows\\svhost.exe" 04ef94dfa5299d98f396f53ccc066410N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Winhost = "C:\\Windows\\svhost.exe" svhost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\svhost.exe 04ef94dfa5299d98f396f53ccc066410N.exe File created C:\Windows\svhost.exe svhost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3168 04ef94dfa5299d98f396f53ccc066410N.exe Token: SeDebugPrivilege 3356 svhost.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3168 wrote to memory of 1848 3168 04ef94dfa5299d98f396f53ccc066410N.exe 85 PID 3168 wrote to memory of 1848 3168 04ef94dfa5299d98f396f53ccc066410N.exe 85 PID 3168 wrote to memory of 3356 3168 04ef94dfa5299d98f396f53ccc066410N.exe 87 PID 3168 wrote to memory of 3356 3168 04ef94dfa5299d98f396f53ccc066410N.exe 87 PID 3168 wrote to memory of 3356 3168 04ef94dfa5299d98f396f53ccc066410N.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\04ef94dfa5299d98f396f53ccc066410N.exe"C:\Users\Admin\AppData\Local\Temp\04ef94dfa5299d98f396f53ccc066410N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\XvVfnGMw9Fl4Tgp.exeC:\Users\Admin\AppData\Local\Temp\XvVfnGMw9Fl4Tgp.exe2⤵
- Executes dropped EXE
PID:1848
-
-
C:\Windows\svhost.exe"C:\Windows\svhost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3356
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
339KB
MD5e8aa2d0dd8a05844317835f4d5e0a2ea
SHA192afc3086949752fe514171167993e3294bb9655
SHA25657903b219ad94c45ab1ed2c1239add79689be7d6f767445971a6a06143359707
SHA5122988193508185ab958531b37c98135685b6fe750bed2552fb9898734af0bc9e3bda7ea115a59aa96598ba3352f083e728be615cd73f8ddfccf5d0caf3574601e
-
Filesize
25KB
MD5abbd49c180a2f8703f6306d6fa731fdc
SHA1d63f4bfe7f74936b2fbace803e3da6103fbf6586
SHA2565f411c0bd9ed9a42b0f07ed568c7d0cf358a83063b225a1f8f7da3296dde90f1
SHA512290dd984acc451b778f3db8c510bae7aec1d9547c3ad0a1829df731c136e4ecc9a37dc6a786cf8f1ecc4d14339aed1288af25055f450f6f953138c8d4d5c36e9
-
Filesize
16KB
MD55e7c375139b7453abd0b91a8a220f8e5
SHA188a3d645fab0f4129c1e485c90b593ab60e469ae
SHA25636ec99991653fa54be6f638d0b95eeac3e3f5e3006e4320318c4aa6fc2e330a8
SHA5120805763fe788e0edeb69747d2f419842dc093c2d871d39f25afe2cd27867d54f90fa15892ff5e8c7148280c1ca9b90a0a375f56c277e5d442257c9e77295f1b2