Analysis

  • max time kernel
    147s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/11/2022, 11:06

General

  • Target

    069a4ac95599fdc07a4bcee35a4fcf339d40f33b690f8016a88a9bdfb8faa89f.exe

  • Size

    1.0MB

  • MD5

    add618444843b6dec500a6a3d1e86b3a

  • SHA1

    313ada3cf60a9a85a99e35ac3e81bed1bdb8be3a

  • SHA256

    069a4ac95599fdc07a4bcee35a4fcf339d40f33b690f8016a88a9bdfb8faa89f

  • SHA512

    db6fbc6ebf9e66ef837a7ec2b8ac4e73bc0f73867d7f54aefc42630ae7dc979288f68148f855e7a7db01e3916991a4499ef71adce9258e721a1098beb4222173

  • SSDEEP

    24576:LB8+mu4DXEz/XVsR0FJc78OhJBgRPflYm8CcP2FRGmbl+aoNt+2:LOgWe+EYmEaoNN

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\069a4ac95599fdc07a4bcee35a4fcf339d40f33b690f8016a88a9bdfb8faa89f.exe
    "C:\Users\Admin\AppData\Local\Temp\069a4ac95599fdc07a4bcee35a4fcf339d40f33b690f8016a88a9bdfb8faa89f.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1268
    • C:\Users\Admin\AppData\Local\Temp\069a4ac95599fdc07a4bcee35a4fcf339d40f33b690f8016a88a9bdfb8faa89f.exe
      "C:\Users\Admin\AppData\Local\Temp\069a4ac95599fdc07a4bcee35a4fcf339d40f33b690f8016a88a9bdfb8faa89f.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2140

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2140-133-0x0000000000400000-0x00000000004F5000-memory.dmp

    Filesize

    980KB

  • memory/2140-134-0x0000000000400000-0x00000000004F5000-memory.dmp

    Filesize

    980KB

  • memory/2140-135-0x0000000000400000-0x00000000004F5000-memory.dmp

    Filesize

    980KB

  • memory/2140-136-0x0000000000400000-0x00000000004F5000-memory.dmp

    Filesize

    980KB

  • memory/2140-137-0x0000000000400000-0x00000000004F5000-memory.dmp

    Filesize

    980KB