Analysis

  • max time kernel
    151s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2022, 17:35

General

  • Target

    db25589051ddb1965933ff10b8c19cd2ca05b640d10ff03c37b74c6e36dd1650.exe

  • Size

    782KB

  • MD5

    633429fee3cb57e635194b6230a7ec50

  • SHA1

    f934dbe9aac544684affd75d71da8177fa2f9015

  • SHA256

    db25589051ddb1965933ff10b8c19cd2ca05b640d10ff03c37b74c6e36dd1650

  • SHA512

    15fd2414a0ec1f13b3b806e160f2cd5659cec1e35d56474f9f78d509ebc6e96594edcb3db8a38e4b3e3ebaf2eb5eb25edb27faa2ba53b2e685c87f4252b13fd4

  • SSDEEP

    12288:lDCACrKt/Cth2VV4ewIzbhLLaDLKSX1Q5dWSjYpADqyzJrOVKu4LySalr7vx0cwT:lI3E4xebRL7SXGWSmAT6Ku4LHal/mPFb

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

Processes

  • C:\Users\Admin\AppData\Local\Temp\db25589051ddb1965933ff10b8c19cd2ca05b640d10ff03c37b74c6e36dd1650.exe
    "C:\Users\Admin\AppData\Local\Temp\db25589051ddb1965933ff10b8c19cd2ca05b640d10ff03c37b74c6e36dd1650.exe"
    1⤵
    • Adds Run key to start application
    PID:768

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/768-54-0x0000000000400000-0x0000000000623000-memory.dmp

    Filesize

    2.1MB

  • memory/768-55-0x0000000000400000-0x0000000000623000-memory.dmp

    Filesize

    2.1MB

  • memory/768-57-0x0000000076871000-0x0000000076873000-memory.dmp

    Filesize

    8KB

  • memory/768-58-0x0000000001F70000-0x0000000002193000-memory.dmp

    Filesize

    2.1MB

  • memory/768-59-0x0000000000400000-0x0000000000623000-memory.dmp

    Filesize

    2.1MB

  • memory/768-60-0x0000000000400000-0x0000000000623000-memory.dmp

    Filesize

    2.1MB