Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    21-10-2021 18:54

General

  • Target

    a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe

  • Size

    776KB

  • MD5

    ceb48ce5b9a02866e9ee5e5e77dd7340

  • SHA1

    64b3aaf77c2a549ef652c0ddafb8aa921f3e905f

  • SHA256

    a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1

  • SHA512

    2835e65fbaba58729c34624cb3cfecdd37019a30d951e043db7db1e975a0c16a0105210e29bcee35e845e0ffef797695f1d18008cfd8cbe5fb467126c8ffbe51

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe
    "C:\Users\Admin\AppData\Local\Temp\a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1100
    • C:\Users\Admin\AppData\Local\Temp\a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe
      "C:\Users\Admin\AppData\Local\Temp\a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe"
      2⤵
        PID:1468

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Credential Access

    Credentials in Files

    1
    T1081

    Collection

    Data from Local System

    1
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1100-55-0x0000000000320000-0x0000000000321000-memory.dmp
      Filesize

      4KB

    • memory/1100-56-0x00000000005B0000-0x000000000062B000-memory.dmp
      Filesize

      492KB

    • memory/1100-58-0x00000000029B0000-0x0000000002B30000-memory.dmp
      Filesize

      1.5MB

    • memory/1468-57-0x0000000000000000-mapping.dmp
    • memory/1468-59-0x00000000001B0000-0x00000000001B1000-memory.dmp
      Filesize

      4KB

    • memory/1468-60-0x0000000000400000-0x0000000000448000-memory.dmp
      Filesize

      288KB

    • memory/1468-61-0x00000000768A1000-0x00000000768A3000-memory.dmp
      Filesize

      8KB