Analysis
-
max time kernel
147s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/08/2024, 13:52
Static task
static1
Behavioral task
behavioral1
Sample
9b8a53cada45aaa02c1a0917fcaaccf94239941161989602fa6c2ed81b4f539b.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
9b8a53cada45aaa02c1a0917fcaaccf94239941161989602fa6c2ed81b4f539b.exe
Resource
win10v2004-20240802-en
General
-
Target
9b8a53cada45aaa02c1a0917fcaaccf94239941161989602fa6c2ed81b4f539b.exe
-
Size
1.2MB
-
MD5
dfd90e6a25d9c49cec178caa36e5002e
-
SHA1
c04ede1be313be83c449a349cb1da61b43fe4b71
-
SHA256
9b8a53cada45aaa02c1a0917fcaaccf94239941161989602fa6c2ed81b4f539b
-
SHA512
a8ffc320e3a7e864cf75d88f5ec0c3cc0e02bc244afc620dd5779a5c408c595eb1604b9b20c3f215181e580fc351a9e5c80f8d1b8a3111f80c3c714af26ba4ba
-
SSDEEP
24576:zqDEvCTbMWu7rQYlBQcBiT6rprG8aA5QGfP5Fmf4nzUZrbZ8n:zTvC/MTQYxsWR7aASYmfcA/
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 2512 set thread context of 4852 2512 9b8a53cada45aaa02c1a0917fcaaccf94239941161989602fa6c2ed81b4f539b.exe 86 PID 4852 set thread context of 3476 4852 svchost.exe 56 PID 4852 set thread context of 5104 4852 svchost.exe 90 PID 5104 set thread context of 3476 5104 clip.exe 56 PID 5104 set thread context of 4320 5104 clip.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language clip.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9b8a53cada45aaa02c1a0917fcaaccf94239941161989602fa6c2ed81b4f539b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
description ioc Process Key created \Registry\User\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 clip.exe -
Suspicious behavior: EnumeratesProcesses 54 IoCs
pid Process 4852 svchost.exe 4852 svchost.exe 4852 svchost.exe 4852 svchost.exe 4852 svchost.exe 4852 svchost.exe 4852 svchost.exe 4852 svchost.exe 4852 svchost.exe 4852 svchost.exe 4852 svchost.exe 4852 svchost.exe 4852 svchost.exe 4852 svchost.exe 4852 svchost.exe 4852 svchost.exe 5104 clip.exe 5104 clip.exe 5104 clip.exe 5104 clip.exe 5104 clip.exe 5104 clip.exe 5104 clip.exe 5104 clip.exe 5104 clip.exe 5104 clip.exe 5104 clip.exe 5104 clip.exe 5104 clip.exe 5104 clip.exe 5104 clip.exe 5104 clip.exe 5104 clip.exe 5104 clip.exe 5104 clip.exe 5104 clip.exe 5104 clip.exe 5104 clip.exe 5104 clip.exe 5104 clip.exe 5104 clip.exe 5104 clip.exe 5104 clip.exe 5104 clip.exe 5104 clip.exe 5104 clip.exe 5104 clip.exe 5104 clip.exe 5104 clip.exe 5104 clip.exe 5104 clip.exe 5104 clip.exe 5104 clip.exe 5104 clip.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 2512 9b8a53cada45aaa02c1a0917fcaaccf94239941161989602fa6c2ed81b4f539b.exe 4852 svchost.exe 4852 svchost.exe 5104 clip.exe 5104 clip.exe 5104 clip.exe 5104 clip.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2512 9b8a53cada45aaa02c1a0917fcaaccf94239941161989602fa6c2ed81b4f539b.exe 2512 9b8a53cada45aaa02c1a0917fcaaccf94239941161989602fa6c2ed81b4f539b.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2512 9b8a53cada45aaa02c1a0917fcaaccf94239941161989602fa6c2ed81b4f539b.exe 2512 9b8a53cada45aaa02c1a0917fcaaccf94239941161989602fa6c2ed81b4f539b.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3476 Explorer.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2512 wrote to memory of 4852 2512 9b8a53cada45aaa02c1a0917fcaaccf94239941161989602fa6c2ed81b4f539b.exe 86 PID 2512 wrote to memory of 4852 2512 9b8a53cada45aaa02c1a0917fcaaccf94239941161989602fa6c2ed81b4f539b.exe 86 PID 2512 wrote to memory of 4852 2512 9b8a53cada45aaa02c1a0917fcaaccf94239941161989602fa6c2ed81b4f539b.exe 86 PID 2512 wrote to memory of 4852 2512 9b8a53cada45aaa02c1a0917fcaaccf94239941161989602fa6c2ed81b4f539b.exe 86 PID 4852 wrote to memory of 5104 4852 svchost.exe 90 PID 4852 wrote to memory of 5104 4852 svchost.exe 90 PID 4852 wrote to memory of 5104 4852 svchost.exe 90 PID 5104 wrote to memory of 4320 5104 clip.exe 91 PID 5104 wrote to memory of 4320 5104 clip.exe 91
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
PID:3476 -
C:\Users\Admin\AppData\Local\Temp\9b8a53cada45aaa02c1a0917fcaaccf94239941161989602fa6c2ed81b4f539b.exe"C:\Users\Admin\AppData\Local\Temp\9b8a53cada45aaa02c1a0917fcaaccf94239941161989602fa6c2ed81b4f539b.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\9b8a53cada45aaa02c1a0917fcaaccf94239941161989602fa6c2ed81b4f539b.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\SysWOW64\clip.exe"C:\Windows\SysWOW64\clip.exe"4⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"5⤵PID:4320
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD530fbdd77d9b332ff9025d85c94abb7e1
SHA1e891860b37e1adf3484a319d6d438f33c856ffa8
SHA2568e7235e2c57214df8ecc8d845c8fe53173f8a116b530e17917085505cbf763df
SHA5126add05d5c8c7b0b35d45e6c27abf537b40d89d6071644c76b511359517a6bc2c229ae684c3af01326651e644592ad6662f8bf9658899468d680ec402971a6657