Analysis

  • max time kernel
    119s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220310-en
  • submitted
    10-04-2022 19:21

General

  • Target

    c2933015714c4b4b43a276d5df369c871c61db73b8b1e.exe

  • Size

    344KB

  • MD5

    7fc9a3dd696dc8ce44958e2270d9a1e5

  • SHA1

    a0502988f3912827cad02f25b68aa3d18594e841

  • SHA256

    c2933015714c4b4b43a276d5df369c871c61db73b8b1ea724a3d9d9b8dabd92f

  • SHA512

    64334cacf9ac0d74fc5fccdccf2780f1e9541c0e4159849859a39e088e815e72bd2029dcf5c909c65aa2433f6cfe62a0452969a392547de9dbc469ebaa314f83

Malware Config

Signatures

  • Meta Stealer Stealer

    Meta Stealer steals passwords stored in browsers, written in C++.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c2933015714c4b4b43a276d5df369c871c61db73b8b1e.exe
    "C:\Users\Admin\AppData\Local\Temp\c2933015714c4b4b43a276d5df369c871c61db73b8b1e.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1388

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1388-134-0x0000000000667000-0x0000000000691000-memory.dmp

    Filesize

    168KB

  • memory/1388-135-0x0000000000667000-0x0000000000691000-memory.dmp

    Filesize

    168KB

  • memory/1388-136-0x00000000005D0000-0x0000000000607000-memory.dmp

    Filesize

    220KB

  • memory/1388-137-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/1388-138-0x0000000004C50000-0x00000000051F4000-memory.dmp

    Filesize

    5.6MB

  • memory/1388-139-0x0000000005200000-0x0000000005818000-memory.dmp

    Filesize

    6.1MB

  • memory/1388-140-0x00000000027E0000-0x00000000027F2000-memory.dmp

    Filesize

    72KB

  • memory/1388-141-0x0000000005820000-0x000000000592A000-memory.dmp

    Filesize

    1.0MB

  • memory/1388-142-0x0000000005970000-0x00000000059AC000-memory.dmp

    Filesize

    240KB

  • memory/1388-143-0x0000000000A50000-0x0000000000A60000-memory.dmp

    Filesize

    64KB

  • memory/1388-144-0x0000000005C50000-0x0000000005CC6000-memory.dmp

    Filesize

    472KB

  • memory/1388-145-0x0000000005CD0000-0x0000000005D62000-memory.dmp

    Filesize

    584KB

  • memory/1388-146-0x0000000005DF0000-0x0000000005E0E000-memory.dmp

    Filesize

    120KB

  • memory/1388-147-0x0000000005F70000-0x0000000005FD6000-memory.dmp

    Filesize

    408KB

  • memory/1388-148-0x00000000074C0000-0x0000000007682000-memory.dmp

    Filesize

    1.8MB

  • memory/1388-149-0x0000000007690000-0x0000000007BBC000-memory.dmp

    Filesize

    5.2MB