Analysis

  • max time kernel
    151s
  • max time network
    175s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 15:42

General

  • Target

    b5c258ab292d70e268ba935d90913337b42d11fbe744a14b7b72395ef380415f.exe

  • Size

    809KB

  • MD5

    5f66c1c091d305a349f2f8a4e85b7333

  • SHA1

    539569c1b03a76517c7b27635f41c991d8e1883c

  • SHA256

    b5c258ab292d70e268ba935d90913337b42d11fbe744a14b7b72395ef380415f

  • SHA512

    bfea46d7c2fed512fe357087022af5ffb1ce6e5ff4d668cb2b67dd34d41a25b331eefb80bc0b5a6e48b555878ca0c8aca9ba0a7541fc11270135cb90dbd74846

  • SSDEEP

    12288:P38/0lL9s/s/10cYjbOYjG5AWqXNJ9LrZEdytHpzTbJNhkIE4fD9tVYk856WYA2h:P88/9GcYjbOBATXPfEduH1fuOA2

Malware Config

Signatures

  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b5c258ab292d70e268ba935d90913337b42d11fbe744a14b7b72395ef380415f.exe
    "C:\Users\Admin\AppData\Local\Temp\b5c258ab292d70e268ba935d90913337b42d11fbe744a14b7b72395ef380415f.exe"
    1⤵
    • Adds Run key to start application
    PID:1880

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1880-54-0x0000000076DC1000-0x0000000076DC3000-memory.dmp

    Filesize

    8KB

  • memory/1880-55-0x0000000000400000-0x000000000063E000-memory.dmp

    Filesize

    2.2MB

  • memory/1880-57-0x0000000000400000-0x000000000063E000-memory.dmp

    Filesize

    2.2MB

  • memory/1880-58-0x0000000000400000-0x000000000063E000-memory.dmp

    Filesize

    2.2MB

  • memory/1880-59-0x0000000000400000-0x000000000063E000-memory.dmp

    Filesize

    2.2MB

  • memory/1880-60-0x0000000000400000-0x000000000063E000-memory.dmp

    Filesize

    2.2MB