Analysis

  • max time kernel
    122s
  • max time network
    68s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    01-12-2022 01:03

General

  • Target

    8d9e64e25fda112ed83f34a12ae795c5b4e5c820dd6cbdf64cd19b59999dc4ec.exe

  • Size

    177KB

  • MD5

    3a8f12b1ff49d955726d07b1f61ae45d

  • SHA1

    6a7ad4009ca314c95978245d945108b6843627cc

  • SHA256

    8d9e64e25fda112ed83f34a12ae795c5b4e5c820dd6cbdf64cd19b59999dc4ec

  • SHA512

    b8c998515bbe63382343d5f02ea6422714da108970682bc03c8a934a29b450a0fab0d73cf735a9dec5fbd64626988773f609f0d83b024ae25303f59eaf646f95

  • SSDEEP

    3072:mMUNYUYRdZcw4TBQ8iwREthGiuFrrSSygvtpiC+/P+Etfe1xi8pGqQtjxy5B:oYRAwE28iyEthJuSSygvt5+H+Etfe1dF

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d9e64e25fda112ed83f34a12ae795c5b4e5c820dd6cbdf64cd19b59999dc4ec.exe
    "C:\Users\Admin\AppData\Local\Temp\8d9e64e25fda112ed83f34a12ae795c5b4e5c820dd6cbdf64cd19b59999dc4ec.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\Users\Admin\AppData\Local\Temp\8d9e64e25fda112ed83f34a12ae795c5b4e5c820dd6cbdf64cd19b59999dc4ec.exe
      C:\Users\Admin\AppData\Local\Temp\8d9e64e25fda112ed83f34a12ae795c5b4e5c820dd6cbdf64cd19b59999dc4ec.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft
      2⤵
        PID:1620
      • C:\Users\Admin\AppData\Local\Temp\8d9e64e25fda112ed83f34a12ae795c5b4e5c820dd6cbdf64cd19b59999dc4ec.exe
        C:\Users\Admin\AppData\Local\Temp\8d9e64e25fda112ed83f34a12ae795c5b4e5c820dd6cbdf64cd19b59999dc4ec.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp
        2⤵
          PID:1532

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1532-64-0x000000000059D000-0x00000000005B8000-memory.dmp

        Filesize

        108KB

      • memory/1532-63-0x0000000000400000-0x000000000046E000-memory.dmp

        Filesize

        440KB

      • memory/1620-58-0x000000000053D000-0x0000000000558000-memory.dmp

        Filesize

        108KB

      • memory/1620-57-0x0000000000400000-0x000000000046E000-memory.dmp

        Filesize

        440KB

      • memory/2028-54-0x00000000759F1000-0x00000000759F3000-memory.dmp

        Filesize

        8KB

      • memory/2028-59-0x0000000000400000-0x000000000046E000-memory.dmp

        Filesize

        440KB

      • memory/2028-60-0x000000000053D000-0x0000000000558000-memory.dmp

        Filesize

        108KB

      • memory/2028-65-0x000000000053D000-0x0000000000558000-memory.dmp

        Filesize

        108KB