Analysis

  • max time kernel
    174s
  • max time network
    197s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/11/2022, 21:03

General

  • Target

    d16252f2f50c4de305f9fbc3ec622f6c273ced080da7824e3552e5a058a9d416.exe

  • Size

    1.4MB

  • MD5

    ddc8af4bf7834642dc00cd0ad8aae7ba

  • SHA1

    55a0c0e22c4eec9622e6b4027a8ddc0179a350bb

  • SHA256

    d16252f2f50c4de305f9fbc3ec622f6c273ced080da7824e3552e5a058a9d416

  • SHA512

    f3d40bedfadc0e54f463b7c1916d68180dabd1a7d98f8206e207f7a2f75b2cec4262e44a40e3b43200f563dc3cdd1cf0756198ee526ef55c0c5bbbbc61974ae3

  • SSDEEP

    12288:BdTUP+GnzU4f6Rkl5iP1WA4prXIO2DAvEPCHoAucEmm/TJm38J3jjZZJL2yWT8fD:BZ860FA4TMAs9WYJm38JTnwyW8ou

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d16252f2f50c4de305f9fbc3ec622f6c273ced080da7824e3552e5a058a9d416.exe
    "C:\Users\Admin\AppData\Local\Temp\d16252f2f50c4de305f9fbc3ec622f6c273ced080da7824e3552e5a058a9d416.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies Internet Explorer settings
    PID:4112

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4112-132-0x0000000000400000-0x000000000063E000-memory.dmp

          Filesize

          2.2MB

        • memory/4112-133-0x0000000000400000-0x000000000063E000-memory.dmp

          Filesize

          2.2MB

        • memory/4112-134-0x0000000000400000-0x000000000063E000-memory.dmp

          Filesize

          2.2MB

        • memory/4112-135-0x0000000000400000-0x000000000063E000-memory.dmp

          Filesize

          2.2MB