Analysis

  • max time kernel
    600s
  • max time network
    510s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220721-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-08-2022 20:17

General

  • Target

    maui_3.exe

  • Size

    763KB

  • MD5

    2d02f5499d35a8dffb4c8bc0b7fec5c2

  • SHA1

    870ccd59ad2d3808c014c7c1dcc8a54de375db0c

  • SHA256

    830207029d83fd46a4a89cd623103ba2321b866428aa04360376e6a390063570

  • SHA512

    a498ae7e85f3aed239b6e7c27ab9f4dd352973706cfbe07d821f7bfae39a5637b3a15acd45e272c669e9674f6ae4fb3a18dcf9276816f376e1fb32ec17d68791

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 5 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\maui_3.exe
    C:\Users\Admin\AppData\Local\Temp\maui_3.exe c:\
    1⤵
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    PID:3820

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\dgo88D2.tmp

    Filesize

    480B

    MD5

    4527be1283a15c0b34e071283357b5cb

    SHA1

    6892373d9a0fd5872adaf0dbbc5acc9ee5c49585

    SHA256

    359ad2423d8236b1f0f32685a2ed29b07f780249d0ffbaefcff5f17f91ecdec4

    SHA512

    6f537eb6e5cc834eb1c5165ef0843182f1f27fd756d78c72fc8e88bd57c1293e033b009554107e3a5f4bda069ff054c1e0c8a61b49a414782fbf7d8126d5ef39