Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 12:51

General

  • Target

    e41fd0dfd1b73384b7359f533f370c8522e2cf86ba2c7f64578c86dbd6996f55.exe

  • Size

    798KB

  • MD5

    ffd647b1391552e773c05ebb9cb0b86e

  • SHA1

    ebf045d13a306afbe5d26ce6e0649eefd32af72f

  • SHA256

    e41fd0dfd1b73384b7359f533f370c8522e2cf86ba2c7f64578c86dbd6996f55

  • SHA512

    5dac945345e54b4b673e7ba08cf92a36f2d10573dc63138d48421f5912b13e7043c010102e8e702d999a9b9b06c31e40cd813deb30c5a088475bd8c58820d4ff

  • SSDEEP

    24576:S9DWyUMTbl9Txa1eA/w+yrfIXtzroTkfaDBk:S96ytTbEYfoUQfkq

Malware Config

Signatures

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e41fd0dfd1b73384b7359f533f370c8522e2cf86ba2c7f64578c86dbd6996f55.exe
    "C:\Users\Admin\AppData\Local\Temp\e41fd0dfd1b73384b7359f533f370c8522e2cf86ba2c7f64578c86dbd6996f55.exe"
    1⤵
    • Adds Run key to start application
    PID:1932

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1932-54-0x0000000075981000-0x0000000075983000-memory.dmp

    Filesize

    8KB

  • memory/1932-55-0x0000000000400000-0x0000000000624000-memory.dmp

    Filesize

    2.1MB

  • memory/1932-56-0x0000000000400000-0x0000000000624000-memory.dmp

    Filesize

    2.1MB

  • memory/1932-57-0x0000000000400000-0x0000000000624000-memory.dmp

    Filesize

    2.1MB

  • memory/1932-58-0x0000000000400000-0x0000000000624000-memory.dmp

    Filesize

    2.1MB