Analysis

  • max time kernel
    166s
  • max time network
    196s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2022 21:03

General

  • Target

    d16252f2f50c4de305f9fbc3ec622f6c273ced080da7824e3552e5a058a9d416.exe

  • Size

    1.4MB

  • MD5

    ddc8af4bf7834642dc00cd0ad8aae7ba

  • SHA1

    55a0c0e22c4eec9622e6b4027a8ddc0179a350bb

  • SHA256

    d16252f2f50c4de305f9fbc3ec622f6c273ced080da7824e3552e5a058a9d416

  • SHA512

    f3d40bedfadc0e54f463b7c1916d68180dabd1a7d98f8206e207f7a2f75b2cec4262e44a40e3b43200f563dc3cdd1cf0756198ee526ef55c0c5bbbbc61974ae3

  • SSDEEP

    12288:BdTUP+GnzU4f6Rkl5iP1WA4prXIO2DAvEPCHoAucEmm/TJm38J3jjZZJL2yWT8fD:BZ860FA4TMAs9WYJm38JTnwyW8ou

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d16252f2f50c4de305f9fbc3ec622f6c273ced080da7824e3552e5a058a9d416.exe
    "C:\Users\Admin\AppData\Local\Temp\d16252f2f50c4de305f9fbc3ec622f6c273ced080da7824e3552e5a058a9d416.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:960

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/960-54-0x0000000000400000-0x000000000063E000-memory.dmp

    Filesize

    2.2MB

  • memory/960-55-0x0000000075761000-0x0000000075763000-memory.dmp

    Filesize

    8KB

  • memory/960-56-0x0000000000400000-0x000000000063E000-memory.dmp

    Filesize

    2.2MB

  • memory/960-57-0x0000000000400000-0x000000000063E000-memory.dmp

    Filesize

    2.2MB