Analysis

  • max time kernel
    151s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    30/10/2022, 02:58

General

  • Target

    0cfb019323baead727c02379fc5fe206ad328dbc50143610f2a1fa7f3942d136.exe

  • Size

    348KB

  • MD5

    a3a921c784125bf429841b0da5634086

  • SHA1

    926dffdef5ad155c1b04c405035be2ea575603a4

  • SHA256

    0cfb019323baead727c02379fc5fe206ad328dbc50143610f2a1fa7f3942d136

  • SHA512

    bdd1444516f40c3519a3b0a0081e1e302d7a5a4d87edf5a04fee167c645050283e3acc96ae276d35a23f3b7cea77fc8131a3de19297d98656787a9a2b11b9c2e

  • SSDEEP

    6144:qTX4MTAj8olritKpGmgXIaik9gvrmQGfMcIZnpYAHIe+cg/fpR:qTriEKGLXIJkwrmrrIZpYAHnkf

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0cfb019323baead727c02379fc5fe206ad328dbc50143610f2a1fa7f3942d136.exe
    "C:\Users\Admin\AppData\Local\Temp\0cfb019323baead727c02379fc5fe206ad328dbc50143610f2a1fa7f3942d136.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:836
    • C:\Users\Admin\AppData\Local\Temp\0cfb019323baead727c02379fc5fe206ad328dbc50143610f2a1fa7f3942d136.ogr
      C:\Users\Admin\AppData\Local\Temp\0cfb019323baead727c02379fc5fe206ad328dbc50143610f2a1fa7f3942d136.ogr
      2⤵
      • Executes dropped EXE
      PID:1960

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\0cfb019323baead727c02379fc5fe206ad328dbc50143610f2a1fa7f3942d136.ogr

    Filesize

    288KB

    MD5

    e5f457e3d89281b97b099a757b4d9577

    SHA1

    aa8a49a5cfff30f5cdd23a7659b1c3ecdc734711

    SHA256

    ebcfea076a3bdca680525b5ce11e7d918cf574f800971a4ddd081f5a6069f0b8

    SHA512

    ffbb2880e10084c187a8dd3c42198782bc50a24886b2a8ee523b4c70a2dbb0b46ee1aa799f44bdd5129935d9d12b3c09e9566278b2f088ede8a39c6ec203663e

  • C:\Users\Admin\AppData\Local\Temp\0cfb019323baead727c02379fc5fe206ad328dbc50143610f2a1fa7f3942d136.ogr

    Filesize

    288KB

    MD5

    e5f457e3d89281b97b099a757b4d9577

    SHA1

    aa8a49a5cfff30f5cdd23a7659b1c3ecdc734711

    SHA256

    ebcfea076a3bdca680525b5ce11e7d918cf574f800971a4ddd081f5a6069f0b8

    SHA512

    ffbb2880e10084c187a8dd3c42198782bc50a24886b2a8ee523b4c70a2dbb0b46ee1aa799f44bdd5129935d9d12b3c09e9566278b2f088ede8a39c6ec203663e

  • \Users\Admin\AppData\Local\Temp\0cfb019323baead727c02379fc5fe206ad328dbc50143610f2a1fa7f3942d136.ogr

    Filesize

    288KB

    MD5

    e5f457e3d89281b97b099a757b4d9577

    SHA1

    aa8a49a5cfff30f5cdd23a7659b1c3ecdc734711

    SHA256

    ebcfea076a3bdca680525b5ce11e7d918cf574f800971a4ddd081f5a6069f0b8

    SHA512

    ffbb2880e10084c187a8dd3c42198782bc50a24886b2a8ee523b4c70a2dbb0b46ee1aa799f44bdd5129935d9d12b3c09e9566278b2f088ede8a39c6ec203663e

  • memory/836-59-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/836-60-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/1960-57-0x0000000075A11000-0x0000000075A13000-memory.dmp

    Filesize

    8KB