Analysis

  • max time kernel
    145s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    17-10-2024 18:54

General

  • Target

    16c7368a03629d421a298d675f64cc94a338be75f8a7dc676b2e7562128c1427.exe

  • Size

    874KB

  • MD5

    01c875521f3c15d155e80017c296e884

  • SHA1

    cbff30d3c3a83613ede4be222138ac1222120262

  • SHA256

    16c7368a03629d421a298d675f64cc94a338be75f8a7dc676b2e7562128c1427

  • SHA512

    b41f0aac37cff7cdb173aa69bf0a0a023fca549266216a6fb5d2a97a30e449018a26d6b2ecffc720b95edc1de1ce2ad3df46fe152387d6e691167ae00f12c70d

  • SSDEEP

    24576:ksFmJ1R7GQLSCjtIu6P339SSgT7cu6P339SSgT7:pmJ1RGtCjyvNSFTwvNSFT

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\16c7368a03629d421a298d675f64cc94a338be75f8a7dc676b2e7562128c1427.exe
    "C:\Users\Admin\AppData\Local\Temp\16c7368a03629d421a298d675f64cc94a338be75f8a7dc676b2e7562128c1427.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1056
    • C:\Users\Admin\AppData\Local\Temp\eqsC6D8.tmp
      "C:\Users\Admin\AppData\Local\Temp\16c7368a03629d421a298d675f64cc94a338be75f8a7dc676b2e7562128c1427.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2256

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ose.exe

    Filesize

    643KB

    MD5

    dea8102a839d89d673a269324f58e03d

    SHA1

    8f9736d8d032f890053ca6a48e5b3aa9c7527b19

    SHA256

    e2211fe03771502a16c75e68939119955776ec70d750239a2bba4259f2697b63

    SHA512

    e461390e1575aa5acd26ddba0da980c5bac48fdf77f95a7969a9027d43d28402f65e777fa183f7350ad038a99ace3681b515bfda2d5572006b6c5e43d4434e8c

  • C:\Program Files\7-Zip\RCX130B.tmp

    Filesize

    12KB

    MD5

    31ca51862b31bcf129556d16f467af09

    SHA1

    5a211b99259a8b98aba5b281f57d2dbd6cf3325f

    SHA256

    c02959bf05c6802755bda953e649cbdb7cdb03ba0a4f458a84e575dcee0e907c

    SHA512

    ceb6864b90a5f8eb8192f4de5914a3aca6788dbca27d724be07484f18cb4d8c6cf6c5adeac6956d21ad15f695b959d1d6712a2ca876b50e24f4591e6e8b6f47f

  • \Users\Admin\AppData\Local\Temp\eqsC6D8.tmp

    Filesize

    377KB

    MD5

    cf6153a55aee80753afea53021a6e266

    SHA1

    4df435f5781db6c125e2ec084f629a71a67efe05

    SHA256

    992424b87abe32006b0d40ced3c4d9917affc29d62db28c69cc002e1df89e536

    SHA512

    0d733961e15d21da74c050924d30b7209d415044fab35c5e68ffd6a8052d1016497f0c3180a4f12e641c136cb272d2f952124cdfd62cdff71f7b6dc6ce3cf8b6