Resubmissions

12-10-2021 16:28

211012-ty57eacgd8 7

12-10-2021 11:11

211012-nae3esccb9 10

Analysis

  • max time kernel
    1200s
  • max time network
    1197s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    12-10-2021 16:28

General

  • Target

    eb20f12dd433c5c9174bc138d1c44266cc3a36f59fae9ddae8c0f246943c8801.exe

  • Size

    1.2MB

  • MD5

    6e667db54814bbf9cde7c00a1f9ccaad

  • SHA1

    a2feadc2e292c60436f63cdc17a7a61ed78b9859

  • SHA256

    eb20f12dd433c5c9174bc138d1c44266cc3a36f59fae9ddae8c0f246943c8801

  • SHA512

    c77f5395a188feae436ac88d675d215d220bbd0fdd659522d99140c5add8edfa17f8447ce8f56f17ff22f51a2aac21ca393c01b8c46093c1c5080f9f4f3427ba

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Uses Tor communications 1 TTPs

    Malware can proxy its traffic through Tor for more anonymity.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eb20f12dd433c5c9174bc138d1c44266cc3a36f59fae9ddae8c0f246943c8801.exe
    "C:\Users\Admin\AppData\Local\Temp\eb20f12dd433c5c9174bc138d1c44266cc3a36f59fae9ddae8c0f246943c8801.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1500
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Windows\system32\svchost.exe"
      2⤵
        PID:1648

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1500-53-0x0000000075FC1000-0x0000000075FC3000-memory.dmp

      Filesize

      8KB

    • memory/1500-54-0x0000000077740000-0x00000000778E9000-memory.dmp

      Filesize

      1.7MB

    • memory/1648-56-0x0000000000400000-0x0000000000480000-memory.dmp

      Filesize

      512KB