Analysis

  • max time kernel
    157s
  • max time network
    174s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/10/2022, 00:59

General

  • Target

    8c3178d4686c1b9795d1ee0f4608ac2b9a1eca9992ce065306d27afbf411f751.exe

  • Size

    810KB

  • MD5

    0742f2206be50e882f03ee038ce26f76

  • SHA1

    b692894af5c801dcaa5116ac2a8ebed7312f6894

  • SHA256

    8c3178d4686c1b9795d1ee0f4608ac2b9a1eca9992ce065306d27afbf411f751

  • SHA512

    5dc37ed1a3781cab4760cf8dfcf5d64ae8d2dac80621919957729240b2c8c058d46ff133531eaeabfae91e2ac47bb88813c4be6685055a8cffd1eaab8da84d30

  • SSDEEP

    12288:cMESNLegtgtrRww0y9IKNEONfwazSMCWgmBeuU1HecXuoGZg2+q9N8V:iSNpt8AEII1zDsgeuU1HecXpUg2

Malware Config

Signatures

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8c3178d4686c1b9795d1ee0f4608ac2b9a1eca9992ce065306d27afbf411f751.exe
    "C:\Users\Admin\AppData\Local\Temp\8c3178d4686c1b9795d1ee0f4608ac2b9a1eca9992ce065306d27afbf411f751.exe"
    1⤵
    • Adds Run key to start application
    PID:1292

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1292-132-0x0000000000400000-0x0000000000633000-memory.dmp

          Filesize

          2.2MB

        • memory/1292-134-0x0000000000400000-0x0000000000633000-memory.dmp

          Filesize

          2.2MB

        • memory/1292-135-0x0000000000400000-0x0000000000633000-memory.dmp

          Filesize

          2.2MB

        • memory/1292-136-0x0000000000400000-0x0000000000633000-memory.dmp

          Filesize

          2.2MB