Analysis

  • max time kernel
    62s
  • max time network
    13s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    18/08/2021, 03:07

General

  • Target

    RunSomeAware.exe

  • Size

    11KB

  • MD5

    defb1faf5a77b823116112dac2e084e2

  • SHA1

    423a42138ef0244d18c5502d3af26650521295ed

  • SHA256

    df5991f1866b6ba4ca5e6dd81ff50bd4857df9d8eea740850e9abc0f42e15fcd

  • SHA512

    5143190d851abe515ebc30e7ac8c096e9a39c9d53de776f950929ac56f8f83bb2147690ba15464558469b4978e3a701031485a588847c27d46d2f44619da2aab

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RunSomeAware.exe
    "C:\Users\Admin\AppData\Local\Temp\RunSomeAware.exe"
    1⤵
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:1084
  • C:\Windows\system32\NOTEPAD.EXE
    "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\Urgent Notice.txt
    1⤵
      PID:536

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/536-63-0x000007FEFBD91000-0x000007FEFBD93000-memory.dmp

      Filesize

      8KB

    • memory/1084-60-0x0000000001350000-0x0000000001351000-memory.dmp

      Filesize

      4KB

    • memory/1084-62-0x000000001A890000-0x000000001A892000-memory.dmp

      Filesize

      8KB