Analysis

  • max time kernel
    153s
  • max time network
    105s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    07/11/2022, 11:27

General

  • Target

    9e0af26fa89bc926adc76f08572a89a7db54ca08807db9bb8c7163c09b47b8ff.exe

  • Size

    823KB

  • MD5

    0ce5b9ec8f0eb0ae2d92ca289f1eb7e6

  • SHA1

    1a288fa3810d79ab9b794a29de0418f187600c75

  • SHA256

    9e0af26fa89bc926adc76f08572a89a7db54ca08807db9bb8c7163c09b47b8ff

  • SHA512

    beb25b03e05aaeeff35da3ca559d4cbf77deb2a11365e67c4c260209e7214cd4dc1071f4dcb746bce7cfb8d49ecf777df37bfe414fdbbe40a5387434471af5da

  • SSDEEP

    12288:PolKvFyneJ8jV+dhkWdCTgLqjC7YOaotguoWn+kM+Thl98/fCX:PosACeYqpcGjCvy+Thlq/aX

Malware Config

Signatures

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9e0af26fa89bc926adc76f08572a89a7db54ca08807db9bb8c7163c09b47b8ff.exe
    "C:\Users\Admin\AppData\Local\Temp\9e0af26fa89bc926adc76f08572a89a7db54ca08807db9bb8c7163c09b47b8ff.exe"
    1⤵
    • Adds Run key to start application
    PID:1568

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1568-54-0x0000000076831000-0x0000000076833000-memory.dmp

    Filesize

    8KB

  • memory/1568-55-0x0000000000400000-0x00000000007AC000-memory.dmp

    Filesize

    3.7MB

  • memory/1568-57-0x0000000000400000-0x00000000007AC000-memory.dmp

    Filesize

    3.7MB

  • memory/1568-58-0x0000000000400000-0x00000000007AC000-memory.dmp

    Filesize

    3.7MB

  • memory/1568-59-0x0000000000400000-0x00000000007AC000-memory.dmp

    Filesize

    3.7MB