Analysis

  • max time kernel
    24s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01/10/2022, 20:49

General

  • Target

    29ab3c5b4f258151dacc6a04525b9d1a48a44f9a38f0c79acf82db5824343944.exe

  • Size

    376KB

  • MD5

    6ca8d6bd5cfdcfeb75a6abacbce2e219

  • SHA1

    0e2b3e6a74d273f35c43e0c1abe451dd9181e90c

  • SHA256

    29ab3c5b4f258151dacc6a04525b9d1a48a44f9a38f0c79acf82db5824343944

  • SHA512

    9477a9eb650ff4083ff38c9cc692161271b13b78cd38be83531402f32fb76525723b4739d50a6417f852623329b41e7c917352e829c74dce9a7cda7f96ba9fc5

  • SSDEEP

    6144:TdrJLe2ZHPhs03nlPQ5sEdX8XbP6rEsjxjxsHWOIk+MzdQg14iKQ2Wl7:KqHPhLPQ5sT6YKxjxs2O8MZFKQ2Wx

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\29ab3c5b4f258151dacc6a04525b9d1a48a44f9a38f0c79acf82db5824343944.exe
    "C:\Users\Admin\AppData\Local\Temp\29ab3c5b4f258151dacc6a04525b9d1a48a44f9a38f0c79acf82db5824343944.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1480
    • C:\Users\Admin\AppData\Local\Temp\29ab3c5b4f258151dacc6a04525b9d1a48a44f9a38f0c79acf82db5824343944.exe
      "C:\Users\Admin\AppData\Local\Temp\29ab3c5b4f258151dacc6a04525b9d1a48a44f9a38f0c79acf82db5824343944.exe"
      2⤵
        PID:836

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/836-55-0x0000000000400000-0x0000000000458000-memory.dmp

      Filesize

      352KB

    • memory/836-59-0x0000000000400000-0x0000000000458000-memory.dmp

      Filesize

      352KB

    • memory/836-60-0x0000000000400000-0x0000000000458000-memory.dmp

      Filesize

      352KB

    • memory/836-61-0x0000000000400000-0x0000000000458000-memory.dmp

      Filesize

      352KB

    • memory/1480-54-0x0000000076831000-0x0000000076833000-memory.dmp

      Filesize

      8KB