Analysis
-
max time kernel
119s -
max time network
63s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 11:10
Static task
static1
Behavioral task
behavioral1
Sample
d64c3dcc9167ffd0c85b56f632a20760N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d64c3dcc9167ffd0c85b56f632a20760N.exe
Resource
win10v2004-20240802-en
General
-
Target
d64c3dcc9167ffd0c85b56f632a20760N.exe
-
Size
165KB
-
MD5
d64c3dcc9167ffd0c85b56f632a20760
-
SHA1
f569350ce9d24f32e3a640d0daa254339498def8
-
SHA256
f5f41418b145d2a919ee182a0d7023ac42f04dcf9bfdcc0a8f2e978daa697064
-
SHA512
4e17ebcc9d41ce9d3b9a65daaf54ea602044ccc4125d411566655cd3051b12341ffdb3e7af958ef8251f260c8b87c637411ed9dbfecaab09ac69cd78f0e6a83f
-
SSDEEP
3072:W4D2XlE8/xXR3HSBSsXGpMSYbJw+6WBMkZFb0rI79AlbAtid2+rBmrkdtC:W4iXlf/xXRiBNoWfxBRdClbAtm2WBm
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1652-2-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2972-7-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2972-5-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/1652-15-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/1652-80-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2376-82-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/1652-194-0x0000000000400000-0x0000000000445000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" d64c3dcc9167ffd0c85b56f632a20760N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d64c3dcc9167ffd0c85b56f632a20760N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d64c3dcc9167ffd0c85b56f632a20760N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d64c3dcc9167ffd0c85b56f632a20760N.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1652 wrote to memory of 2972 1652 d64c3dcc9167ffd0c85b56f632a20760N.exe 30 PID 1652 wrote to memory of 2972 1652 d64c3dcc9167ffd0c85b56f632a20760N.exe 30 PID 1652 wrote to memory of 2972 1652 d64c3dcc9167ffd0c85b56f632a20760N.exe 30 PID 1652 wrote to memory of 2972 1652 d64c3dcc9167ffd0c85b56f632a20760N.exe 30 PID 1652 wrote to memory of 2376 1652 d64c3dcc9167ffd0c85b56f632a20760N.exe 33 PID 1652 wrote to memory of 2376 1652 d64c3dcc9167ffd0c85b56f632a20760N.exe 33 PID 1652 wrote to memory of 2376 1652 d64c3dcc9167ffd0c85b56f632a20760N.exe 33 PID 1652 wrote to memory of 2376 1652 d64c3dcc9167ffd0c85b56f632a20760N.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\d64c3dcc9167ffd0c85b56f632a20760N.exe"C:\Users\Admin\AppData\Local\Temp\d64c3dcc9167ffd0c85b56f632a20760N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\d64c3dcc9167ffd0c85b56f632a20760N.exeC:\Users\Admin\AppData\Local\Temp\d64c3dcc9167ffd0c85b56f632a20760N.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2972
-
-
C:\Users\Admin\AppData\Local\Temp\d64c3dcc9167ffd0c85b56f632a20760N.exeC:\Users\Admin\AppData\Local\Temp\d64c3dcc9167ffd0c85b56f632a20760N.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:2376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59210e28d7806d930936d45385e740315
SHA1751dba8aed712e1705bfe059e120c87617335ef3
SHA256d8a4471b5c71200a11ff8decb9cdb14b8f029bd0633f3e07cd68301cf5761b24
SHA512ec603d413ebdf069691d3b147b337816488eefea561db5168a5d85f1fe7140bbe8df1a233c40dd388b2061802f821fe43b07f9eea2d4d1b17e2e35b3396670b9
-
Filesize
600B
MD5824709fca3d0f143f1864981219779da
SHA1b2a47ea4f7a77d914575dcdda2c86116093fd8c4
SHA2567058a6ac2037e5e8e1b844608066dd3021ef4ae9f2fed26cefb372ff10cc7fdb
SHA51273f5b7d5e41feb5db016c298bddc21049099552021616e45fe08f7568c0d3268f9acb6b69ac429797968d896258fae0eb2b849fdd5ed992a3c4f1450028af8fd
-
Filesize
996B
MD5da94ade952e7e1947330c4cff58a861d
SHA158d585374d42c3c44dc1bc85236edd3c932766bf
SHA25658fce2b9418d511e63e4caeca62c1ce59b8e22db95e22c952668f25a647140d5
SHA5120cb51f142e69957a4f801c291e61dc26bccd235263452ec77f255730f10f761ea460f5331d3d75ada9686c923d2d79315c21127b5daa113f3199cd4028ba0688