Analysis

  • max time kernel
    250s
  • max time network
    274s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    18/09/2022, 10:25

General

  • Target

    c54d2aacce9189738b999d035cf4b25e99827423c09dcc536d47ee8f7c03c8c9.exe

  • Size

    5.1MB

  • MD5

    4453f603eae9deaddd8c832a9d1dd567

  • SHA1

    c6ad9363c5068123cfad3e508697aed16901cd57

  • SHA256

    c54d2aacce9189738b999d035cf4b25e99827423c09dcc536d47ee8f7c03c8c9

  • SHA512

    af50f0702523eaced58f4337089ddb02683a0cbd76cb914e24804e8917fd68c63fbbe35daa26a06b44cb5be6400b55a40e846e1c10889f7c2e91a7677e4fe7bd

  • SSDEEP

    98304:HnbAD7HxVesWFT3xEDb0Ctk5bBEAtzaTDZvdoorFyw+J0NktM2EkeWheU2zDq0T:MDrx7W7Wb8BoRyz1M2EkeWheUAq0

Score
8/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c54d2aacce9189738b999d035cf4b25e99827423c09dcc536d47ee8f7c03c8c9.exe
    "C:\Users\Admin\AppData\Local\Temp\c54d2aacce9189738b999d035cf4b25e99827423c09dcc536d47ee8f7c03c8c9.exe"
    1⤵
      PID:1480

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1480-54-0x0000000000380000-0x0000000001647000-memory.dmp

      Filesize

      18.8MB

    • memory/1480-55-0x0000000000380000-0x0000000001647000-memory.dmp

      Filesize

      18.8MB

    • memory/1480-56-0x0000000000380000-0x0000000001647000-memory.dmp

      Filesize

      18.8MB