Analysis

  • max time kernel
    150s
  • max time network
    185s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 15:42

General

  • Target

    f0c719aecbcf89c0d232877f60c6242b667aa703f413d8c65bd080745ee384d7.exe

  • Size

    811KB

  • MD5

    b0250e27941d871cb41b48ea29a64e39

  • SHA1

    2a01d2f35aee5167e0993baa5ec3216bfeed0f5f

  • SHA256

    f0c719aecbcf89c0d232877f60c6242b667aa703f413d8c65bd080745ee384d7

  • SHA512

    a25a90d2a849a97f2d1b91f37baf3d342ef86def63dfbd674a261c8cf61e9d8010e9870f5c5da45785d26f67296633733ac76af6a27663d6156fb8b990c656d3

  • SSDEEP

    12288:byrOQCTepqK5JbQtZWhQx2tb7Pbwv2ndejXxQMcKZcNZVlFslMchF41pj/+/ALAJ:ggTOXstZIP9Ccdejx5ZcR9chFR

Malware Config

Signatures

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f0c719aecbcf89c0d232877f60c6242b667aa703f413d8c65bd080745ee384d7.exe
    "C:\Users\Admin\AppData\Local\Temp\f0c719aecbcf89c0d232877f60c6242b667aa703f413d8c65bd080745ee384d7.exe"
    1⤵
    • Adds Run key to start application
    PID:1340

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1340-54-0x0000000000400000-0x000000000063D000-memory.dmp

    Filesize

    2.2MB

  • memory/1340-56-0x0000000000400000-0x000000000063D000-memory.dmp

    Filesize

    2.2MB

  • memory/1340-57-0x0000000075E61000-0x0000000075E63000-memory.dmp

    Filesize

    8KB

  • memory/1340-58-0x0000000000400000-0x000000000063D000-memory.dmp

    Filesize

    2.2MB

  • memory/1340-59-0x0000000000400000-0x000000000063D000-memory.dmp

    Filesize

    2.2MB