Analysis

  • max time kernel
    96s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/09/2024, 00:51

General

  • Target

    b4c8879ce5ac6c3c97838e6748c4e008bbc88d64395aca0279147ec2270f239b.exe

  • Size

    17KB

  • MD5

    ffe4c9fdf4309c84e2c574e059d45362

  • SHA1

    bd8403556d7d2a061f33765d38af6e9baa539726

  • SHA256

    b4c8879ce5ac6c3c97838e6748c4e008bbc88d64395aca0279147ec2270f239b

  • SHA512

    b97a54fb518403fcdf84ba3aa1e58b3b358046d92dc4c11b2d4fcd66f870544d2cce131021abbb3af652a5111c0c725b0a27dbd88165a1409550cceb05b0e39b

  • SSDEEP

    192:WWj5dBkqyIfgm64++u6gzYMzZ0dqsEq65+O0I5L0pJ/WDvd0EtITbKH62RTs2/f+:WWjjfoQ+DfYMzKdPEsOuubuEG3KHM2/G

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b4c8879ce5ac6c3c97838e6748c4e008bbc88d64395aca0279147ec2270f239b.exe
    "C:\Users\Admin\AppData\Local\Temp\b4c8879ce5ac6c3c97838e6748c4e008bbc88d64395aca0279147ec2270f239b.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3720
    • C:\Windows\svhost.exe
      "C:\Windows\svhost.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:3484

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xml

    Filesize

    339KB

    MD5

    ea1e47488871ae565e62ee1eac3dc0d1

    SHA1

    c54b2da4f4f06451e48179153e26dd2a210df31d

    SHA256

    02a3fc860e27a759d505f5b4032ad4be5b1313eb2453e40df95dfbba48adfa15

    SHA512

    af048f7a4e7c504b12f35b87dac8eb052570e5f1bd40f175b836f735783a5e90c3f4b2ae617311532a32fbf068a3077a142bee1074a6414198040e1b0e4d7a03

  • C:\Users\Admin\AppData\Local\Temp\0YoavbZ5HpHFA2v.exe

    Filesize

    17KB

    MD5

    c001b684e132fe7bacc2774327d5c2ae

    SHA1

    f6d85425e476c4811a0b3fde4662f5c8de52b20d

    SHA256

    9e5c79c2a2c2268b6a113a634a37516d1de8adef9d2c3461ef41007d53bc5b0a

    SHA512

    b96fe0ad4ae8f71c4c181d6476cdf110b53f8d4f236b65efaa7ec2df2671b5ef90d199124794d83d999c324dedd677bdb812a146e4eb74e0a4a44d155f45742a

  • C:\Windows\svhost.exe

    Filesize

    16KB

    MD5

    5e7c375139b7453abd0b91a8a220f8e5

    SHA1

    88a3d645fab0f4129c1e485c90b593ab60e469ae

    SHA256

    36ec99991653fa54be6f638d0b95eeac3e3f5e3006e4320318c4aa6fc2e330a8

    SHA512

    0805763fe788e0edeb69747d2f419842dc093c2d871d39f25afe2cd27867d54f90fa15892ff5e8c7148280c1ca9b90a0a375f56c277e5d442257c9e77295f1b2