Analysis

  • max time kernel
    42s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 16:42

General

  • Target

    file.exe

  • Size

    2.4MB

  • MD5

    458ac39a481ac9ed07487ee9986d2fe9

  • SHA1

    31dc51c7c1e2a5e8b4ca34b6f217c60ce757dbe5

  • SHA256

    3882c65e9a7a8bfb85793f6ddfce465089a3b1b99b14e16aad7f71b93ccf3d91

  • SHA512

    247c4386c53fa64606c31e97416ade7462c50e1c0ed8f7250a7591e675b268304f40e6987402e7d3ce87feda412fe3f47be7f5352aaf4dce6931dd5591eab9d9

  • SSDEEP

    49152:yWSA/E1kQVibIswlJ/gTTF3OLJL0+jYbGvb4jIg5tfJVRo:yjSI3fJ/gF+LJL0+EbGT4Ug5tfJVRo

Score
8/10

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:968
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\file.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1628
      • C:\Windows\system32\choice.exe
        choice /C Y /N /D Y /T 0
        3⤵
          PID:1520

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/968-56-0x0000000000E60000-0x0000000001642000-memory.dmp

      Filesize

      7.9MB