Analysis

  • max time kernel
    266s
  • max time network
    352s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    29/11/2022, 05:17

General

  • Target

    9306afcee1aff2cf3316ed9eff6a2df6014ed0b18da748ae6582c773fc3f16e6.exe

  • Size

    800KB

  • MD5

    219b52b444403d89ca3095a12dd0323f

  • SHA1

    1b5244791930c0c5067682c9cc0788b9673eb96d

  • SHA256

    9306afcee1aff2cf3316ed9eff6a2df6014ed0b18da748ae6582c773fc3f16e6

  • SHA512

    3461aafa090be28aef3d1a0c6c4e68b9d1e9589943b6b88508ce66ae0c1ffb889a8a05a6c35019331ae7c586cce8a7d9ab9d1ceb873221c03493e478ee80d844

  • SSDEEP

    24576:a2m2x07lFq+IOsaK20yeUAt91pdu3T/d3Dypy2:XFx0R4+IOsaK20/tW3T/dmpy2

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9306afcee1aff2cf3316ed9eff6a2df6014ed0b18da748ae6582c773fc3f16e6.exe
    "C:\Users\Admin\AppData\Local\Temp\9306afcee1aff2cf3316ed9eff6a2df6014ed0b18da748ae6582c773fc3f16e6.exe"
    1⤵
    • Adds Run key to start application
    PID:940

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/940-54-0x0000000076391000-0x0000000076393000-memory.dmp

          Filesize

          8KB

        • memory/940-55-0x00000000009E0000-0x0000000000AAC000-memory.dmp

          Filesize

          816KB

        • memory/940-56-0x0000000000B50000-0x0000000000C0D000-memory.dmp

          Filesize

          756KB

        • memory/940-57-0x0000000001000000-0x0000000001204000-memory.dmp

          Filesize

          2.0MB

        • memory/940-58-0x0000000001000000-0x0000000001204000-memory.dmp

          Filesize

          2.0MB