Analysis

  • max time kernel
    119s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 11:40

General

  • Target

    cbf539751e6ef7624de831aae2f1855870b11b47b15572536749349f65e9f5c7.exe

  • Size

    472KB

  • MD5

    d133cbea72078419724b6f11cc0e36f7

  • SHA1

    2b2b850902e51f39d76c5a032b431e3ed675e5e3

  • SHA256

    cbf539751e6ef7624de831aae2f1855870b11b47b15572536749349f65e9f5c7

  • SHA512

    c77c247c2502be6aea421153f57939b8cd89f69c7143f97d399dbc626746126340d4713906da5a12e0541635da122d9bf804f85b76b56a50ef2436a51907dda2

  • SSDEEP

    6144:ppMMVVbsmffCpJipqLXRTvczBZBH6wGFzfw3DThRtUA7c50M5iDcp/h8CAM:UtmfaXioLXpUzPBaws7w3vV5KV5iDZM

Malware Config

Signatures

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cbf539751e6ef7624de831aae2f1855870b11b47b15572536749349f65e9f5c7.exe
    "C:\Users\Admin\AppData\Local\Temp\cbf539751e6ef7624de831aae2f1855870b11b47b15572536749349f65e9f5c7.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3684
    • C:\Program Files\Internet Explorer\IEXPLORE.exe
      "C:\Program Files\Internet Explorer\IEXPLORE" 212.33.237.86/images/1/report.php
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4160
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4160 CREDAT:17410 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2376

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\7-Zip\7z.exe

    Filesize

    1017KB

    MD5

    81837b9fa0c91072d9e7fefed37d1e4b

    SHA1

    b873f206fb093201ba590e2c5a1af35a21274824

    SHA256

    9e7117016c87076a31c5f78cb10f00eaa830d50cb5a8a198b00bc4014a5a3665

    SHA512

    9e8831ece7fc7e1f17aa76f7c66004dd1725cf1e966fba9304ae2c3679cfd0d193750ed6380026a75fc1c9804f301c83cf62f44cbb0e5096a52be5afa7d4efbc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    55e40aa7a274d26f0bb8e2117239d1bd

    SHA1

    3174d1748da1dea0226e5b485400c5a139b6dd9f

    SHA256

    1d11d5b7b9240006ea7860d39703d111fefaae92f3c67259f0c743417e634a8e

    SHA512

    4b6de1f6ed69e04740b16428e984e1476c0e3ebb37ab8893454a1c271c2fce65fb5c4a355f1db0eb00560a6f951ee8102fb9629abfff5fd1ab363ef53cd2253d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    c0ccd66b128967e12b18a087654a66a4

    SHA1

    1276303498329edb01bf12e302f8cdcacfb3a2ab

    SHA256

    fc393714e0618c452a4f3bac1711b044702c012ac6e634b722b5e859e5f5b916

    SHA512

    b8bedac564df312ef7a49f188e7cecbc6a6f88be8c8e491caa2817e3ebf403f73d9b2af3eff1579cdea104a7a3a6141b715a62106007fe4040f01ebaef440ff5

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\GPUS7TYC\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee