Analysis

  • max time kernel
    50s
  • max time network
    175s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    21-09-2022 22:27

General

  • Target

    edfefa4e334b6dc4252b079850d0666f30c5c8bcebc289faa06161c334faf723.exe

  • Size

    5.1MB

  • MD5

    f83e21f51ee83b616b053ca7e19695a5

  • SHA1

    62af9e5657773b77401bc002b38b11fbb1f52e1e

  • SHA256

    edfefa4e334b6dc4252b079850d0666f30c5c8bcebc289faa06161c334faf723

  • SHA512

    3af1b0e1bd3e3614eee8c3b3332a409b6fa2f200c67999cc4749b8932ead9cc5e2dcf90ea683208566dc949939d1b3985cb5359e82fefe0617584751ff58737b

  • SSDEEP

    98304:0UwOhsGK16l/Xg7dIVcBrn305ia9WnUXSCkp77rN0lcI:0whsgaBIKn3m92Fr6W

Score
8/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

Processes

  • C:\Users\Admin\AppData\Local\Temp\edfefa4e334b6dc4252b079850d0666f30c5c8bcebc289faa06161c334faf723.exe
    "C:\Users\Admin\AppData\Local\Temp\edfefa4e334b6dc4252b079850d0666f30c5c8bcebc289faa06161c334faf723.exe"
    1⤵
      PID:4808

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4808-120-0x00000000008A0000-0x0000000001B5E000-memory.dmp

      Filesize

      18.7MB

    • memory/4808-121-0x00000000008A0000-0x0000000001B5E000-memory.dmp

      Filesize

      18.7MB

    • memory/4808-122-0x00000000008A0000-0x0000000001B5E000-memory.dmp

      Filesize

      18.7MB