Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/11/2022, 09:22

General

  • Target

    f68f92055bda147f44627c526b3ffc411bbbfbe6ea57ba69ce6e6caaef5729eb.exe

  • Size

    30KB

  • MD5

    0e14225a47501ef15281b1e289338908

  • SHA1

    a73d7487e1463ed152bbea7780d398d9c53f82bb

  • SHA256

    f68f92055bda147f44627c526b3ffc411bbbfbe6ea57ba69ce6e6caaef5729eb

  • SHA512

    d99e7f0a35ed5baca648098ef95255c8fdf8fe4455238bc8bfed0acae8b66363679d06562a89e1c600526570dbd25ceddfbd7779e555210a0b581ae8c155c80a

  • SSDEEP

    768:tMboL8fTmVcS7bWm83bjmuiH8e3DHkZnklXc:qYATmJ7inb0H8EIj

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:2804
      • C:\Users\Admin\AppData\Local\Temp\f68f92055bda147f44627c526b3ffc411bbbfbe6ea57ba69ce6e6caaef5729eb.exe
        "C:\Users\Admin\AppData\Local\Temp\f68f92055bda147f44627c526b3ffc411bbbfbe6ea57ba69ce6e6caaef5729eb.exe"
        2⤵
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: RenamesItself
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:4244

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4244-132-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB