Analysis

  • max time kernel
    43s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    02/10/2022, 08:00

General

  • Target

    ebc3cb7fb47e4680b48e8951fcee6d60d1c9f30aab110cc77a122f65f4fe2694.exe

  • Size

    58KB

  • MD5

    7005c454bb652c62da02da60f1205b77

  • SHA1

    0cf302ee60e42cb12b56c394983d53d56fc3c2d1

  • SHA256

    ebc3cb7fb47e4680b48e8951fcee6d60d1c9f30aab110cc77a122f65f4fe2694

  • SHA512

    ae9de19c672c80977e009b2e03d577e1c2625843b9dc47179b03fe0e48281010334df47c5b8ecab77788387a635dab1954b4b77ddc21b2f97700d95977d1d759

  • SSDEEP

    1536:PaHLtZfHy0O/JuSkZWeGkqbT3ckFqtLUNCdJ:PaHzHY/JBOQksAkItZJ

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 7 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1192
      • C:\Users\Admin\AppData\Local\Temp\ebc3cb7fb47e4680b48e8951fcee6d60d1c9f30aab110cc77a122f65f4fe2694.exe
        "C:\Users\Admin\AppData\Local\Temp\ebc3cb7fb47e4680b48e8951fcee6d60d1c9f30aab110cc77a122f65f4fe2694.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Modifies Internet Explorer settings
        • Modifies Internet Explorer start page
        • Suspicious use of WriteProcessMemory
        PID:620
        • C:\Users\Admin\AppData\Local\Temp\ebc3cb7fb47e4680b48e8951fcee6d60d1c9f30aab110cc77a122f65f4fe2694.exe
          C:\Users\Admin\AppData\Local\Temp\ebc3cb7fb47e4680b48e8951fcee6d60d1c9f30aab110cc77a122f65f4fe2694.exe
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1708

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1192-63-0x000000007FFF0000-0x000000007FFF7000-memory.dmp

            Filesize

            28KB

          • memory/1708-54-0x0000000000400000-0x0000000000409000-memory.dmp

            Filesize

            36KB

          • memory/1708-55-0x0000000000400000-0x0000000000409000-memory.dmp

            Filesize

            36KB

          • memory/1708-58-0x0000000000400000-0x0000000000409000-memory.dmp

            Filesize

            36KB

          • memory/1708-57-0x0000000000400000-0x0000000000409000-memory.dmp

            Filesize

            36KB

          • memory/1708-61-0x0000000000400000-0x0000000000408960-memory.dmp

            Filesize

            34KB

          • memory/1708-62-0x0000000075711000-0x0000000075713000-memory.dmp

            Filesize

            8KB

          • memory/1708-66-0x0000000010000000-0x0000000010013000-memory.dmp

            Filesize

            76KB