Analysis

  • max time kernel
    152s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    29-11-2022 09:07

General

  • Target

    534bf5cfd03f13481e1003eee930265c4bbfc4a3142568ac2d0c4b7cb6ff9365.exe

  • Size

    1.1MB

  • MD5

    bb9fd47e821263f6ea548bdf3e989678

  • SHA1

    aba9bceaeadb38a41be5e0007bfb6bb4fe996aae

  • SHA256

    534bf5cfd03f13481e1003eee930265c4bbfc4a3142568ac2d0c4b7cb6ff9365

  • SHA512

    6e351633ca7c5640c4a52c7caabbae5c5d7fb6c7aafa26b74397dfb6bc2f2202aa8cbddc6f1562db78f444b6a070d1991575c66b5665e13447241b34dfcbea2d

  • SSDEEP

    24576:4MWCx9Q6feZYzM8Al5Hb1q2wJfImF9ZlmgaQe45P:9xSgeZYQ8Al57IdfIC/l55P

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

Processes

  • C:\Users\Admin\AppData\Local\Temp\534bf5cfd03f13481e1003eee930265c4bbfc4a3142568ac2d0c4b7cb6ff9365.exe
    "C:\Users\Admin\AppData\Local\Temp\534bf5cfd03f13481e1003eee930265c4bbfc4a3142568ac2d0c4b7cb6ff9365.exe"
    1⤵
    • Adds Run key to start application
    PID:960

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/960-54-0x00000000757A1000-0x00000000757A3000-memory.dmp

    Filesize

    8KB

  • memory/960-55-0x0000000000400000-0x00000000006CB000-memory.dmp

    Filesize

    2.8MB

  • memory/960-57-0x0000000000400000-0x00000000006CB000-memory.dmp

    Filesize

    2.8MB

  • memory/960-58-0x0000000000400000-0x00000000006CB000-memory.dmp

    Filesize

    2.8MB