Analysis

  • max time kernel
    151s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 14:41

General

  • Target

    2e68a9c2a35663f4260a4c815afc3041b0237c858661394a1d7b56ccb4a92da5.exe

  • Size

    871KB

  • MD5

    3aff01c41db37ff0d1d1f1e56bb402e6

  • SHA1

    2746a2e258dbc58dd2379849c2858633405a2738

  • SHA256

    2e68a9c2a35663f4260a4c815afc3041b0237c858661394a1d7b56ccb4a92da5

  • SHA512

    fd6a4df9eb1a695af5d276ecee770413c282990076250a1e025711aadea5018843d76942d2e5f43c575cbee5494344161fc1c394eec890c41ac8369a7128876a

  • SSDEEP

    12288:Eb3af4Y8CxixTmNCOQaXrZG8WUmaY0PrXG62IGy49lnBtTNpMyqtS2:Een8Cij7GZmU7ljXv2IGHJtTNCHS2

Malware Config

Signatures

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2e68a9c2a35663f4260a4c815afc3041b0237c858661394a1d7b56ccb4a92da5.exe
    "C:\Users\Admin\AppData\Local\Temp\2e68a9c2a35663f4260a4c815afc3041b0237c858661394a1d7b56ccb4a92da5.exe"
    1⤵
    • Adds Run key to start application
    PID:1600

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1600-55-0x0000000000400000-0x000000000060B000-memory.dmp

    Filesize

    2.0MB

  • memory/1600-54-0x0000000000400000-0x000000000060B000-memory.dmp

    Filesize

    2.0MB

  • memory/1600-56-0x0000000076461000-0x0000000076463000-memory.dmp

    Filesize

    8KB

  • memory/1600-57-0x0000000000400000-0x000000000060B000-memory.dmp

    Filesize

    2.0MB

  • memory/1600-58-0x0000000000400000-0x000000000060B000-memory.dmp

    Filesize

    2.0MB