Analysis

  • max time kernel
    57s
  • max time network
    60s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2022 15:13

General

  • Target

    b51f5a69e945186cbb1ba652f35f43e66db01ea58662ad6d6b37c67ae6e0ad9e.exe

  • Size

    1.0MB

  • MD5

    f458b9071e57da4f63496d92aa16fb9d

  • SHA1

    4fdaa70763372548b687559e29496861e40d1a45

  • SHA256

    b51f5a69e945186cbb1ba652f35f43e66db01ea58662ad6d6b37c67ae6e0ad9e

  • SHA512

    825dce0a753b1b7cb1a45b49ad911c3d79519a7a024d0f5769a350b5b943bd36d36d27bad9b8bc5f0ddde4b22e178289b8247b47486f19b320c59b5ec1d6e8be

  • SSDEEP

    12288:Hs05EW5k2yfDLuLtc7YI4QcOTLCQhiv0KxjeU/S23v38Q5buN3W5pK7:HT5EWU+LtKYIX3CTxJeU/vh5buNmG7

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b51f5a69e945186cbb1ba652f35f43e66db01ea58662ad6d6b37c67ae6e0ad9e.exe
    "C:\Users\Admin\AppData\Local\Temp\b51f5a69e945186cbb1ba652f35f43e66db01ea58662ad6d6b37c67ae6e0ad9e.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1428
    • C:\Users\Admin\AppData\Local\Temp\b51f5a69e945186cbb1ba652f35f43e66db01ea58662ad6d6b37c67ae6e0ad9e.exe
      "C:\Users\Admin\AppData\Local\Temp\b51f5a69e945186cbb1ba652f35f43e66db01ea58662ad6d6b37c67ae6e0ad9e.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:880

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/880-54-0x0000000000400000-0x00000000004F5000-memory.dmp

    Filesize

    980KB

  • memory/880-55-0x0000000000400000-0x00000000004F5000-memory.dmp

    Filesize

    980KB

  • memory/880-57-0x0000000000400000-0x00000000004F5000-memory.dmp

    Filesize

    980KB

  • memory/880-61-0x0000000000400000-0x00000000004F5000-memory.dmp

    Filesize

    980KB

  • memory/880-59-0x0000000000400000-0x00000000004F5000-memory.dmp

    Filesize

    980KB

  • memory/880-63-0x0000000000400000-0x00000000004F5000-memory.dmp

    Filesize

    980KB

  • memory/880-65-0x0000000000400000-0x00000000004F5000-memory.dmp

    Filesize

    980KB

  • memory/880-66-0x000000000045B592-mapping.dmp

  • memory/880-68-0x0000000075071000-0x0000000075073000-memory.dmp

    Filesize

    8KB

  • memory/880-69-0x0000000000400000-0x00000000004F5000-memory.dmp

    Filesize

    980KB

  • memory/880-70-0x0000000000400000-0x00000000004F5000-memory.dmp

    Filesize

    980KB