Analysis

  • max time kernel
    152s
  • max time network
    160s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2022, 14:26

General

  • Target

    699268e5506732baa32fc4ee865cd81b0a385a103decfc4c0fcb36066dedfa8a.exe

  • Size

    829KB

  • MD5

    52c100e5600bcd0176de1d89e52f6af0

  • SHA1

    bdebd0e131633e4d7d51503b800100433257860e

  • SHA256

    699268e5506732baa32fc4ee865cd81b0a385a103decfc4c0fcb36066dedfa8a

  • SHA512

    d58f316ac9550aa492a459ccb567ac43b0bfb7577d05bd36d24cb220f68349600a9f449c19b4a993cfa3a8298e9d03dd50cab9a461b539c79770f4c70fc92aff

  • SSDEEP

    24576:+kLdGAW13n/NxXb+5WUZQbzRpZkmqwGbA:+kLdZ4FxL+5M97kIG

Malware Config

Signatures

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\699268e5506732baa32fc4ee865cd81b0a385a103decfc4c0fcb36066dedfa8a.exe
    "C:\Users\Admin\AppData\Local\Temp\699268e5506732baa32fc4ee865cd81b0a385a103decfc4c0fcb36066dedfa8a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetWindowsHookEx
    PID:908

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/908-55-0x0000000000400000-0x000000000063E000-memory.dmp

    Filesize

    2.2MB

  • memory/908-54-0x0000000000400000-0x000000000063E000-memory.dmp

    Filesize

    2.2MB

  • memory/908-56-0x0000000075131000-0x0000000075133000-memory.dmp

    Filesize

    8KB

  • memory/908-57-0x0000000000400000-0x000000000063E000-memory.dmp

    Filesize

    2.2MB

  • memory/908-58-0x0000000000400000-0x000000000063E000-memory.dmp

    Filesize

    2.2MB