Analysis

  • max time kernel
    164s
  • max time network
    172s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 13:41

General

  • Target

    8e44bfabd86296863da209f44b2a0b90494e664bf874e8c629c353f4f33c524b.exe

  • Size

    101KB

  • MD5

    f8399fad84cb44e99d39c6c0591c2743

  • SHA1

    9195dd103308462a9750d7a200186ff012accd80

  • SHA256

    8e44bfabd86296863da209f44b2a0b90494e664bf874e8c629c353f4f33c524b

  • SHA512

    cdd12a353d2a85c1f354788fe5ccdf4bed5e65c9406e099055e5e1f032f605909a9db86639502e629c83be5a54b90fc076c272cc9c7b4a2177859bff7c512ba0

  • SSDEEP

    3072:qMa1XnOUgJ1OTsUKBJmkPlzcQGJBW+XCXuY:qT1XLuOTmfmkPlzc9JB5y+

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8e44bfabd86296863da209f44b2a0b90494e664bf874e8c629c353f4f33c524b.exe
    "C:\Users\Admin\AppData\Local\Temp\8e44bfabd86296863da209f44b2a0b90494e664bf874e8c629c353f4f33c524b.exe"
    1⤵
    • Modifies WinLogon for persistence
    PID:1656

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1656-132-0x0000000000990000-0x00000000009A7000-memory.dmp

    Filesize

    92KB

  • memory/1656-133-0x00000000009B0000-0x0000000000A25000-memory.dmp

    Filesize

    468KB