Analysis

  • max time kernel
    148s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/12/2022, 05:27

General

  • Target

    45bca5ced156f13b31ae08d5112c88d26358eef84d53c56c150905135baa3cd3.exe

  • Size

    1.0MB

  • MD5

    d188b1ccd8b9a14a1137feb35ae86505

  • SHA1

    e9c59a5a6f3d5c0ce1f7db5c7196f95fec1fdc75

  • SHA256

    45bca5ced156f13b31ae08d5112c88d26358eef84d53c56c150905135baa3cd3

  • SHA512

    b00f4758c4a5c7ecbd3cf10a721c6666d4e4b64bc12e5ec87f83079a31ab01ec2163b730b59ba0a8d23326e129f1059df0a2afd4e4d7d1b35ce763f65af5aa7a

  • SSDEEP

    24576:BB8+mu4DXEz/XVsR0FJc78OhJBgRPflYm8CcP2FRGmbl+aoNtbg:BOgWe+EYmEaoNS

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\45bca5ced156f13b31ae08d5112c88d26358eef84d53c56c150905135baa3cd3.exe
    "C:\Users\Admin\AppData\Local\Temp\45bca5ced156f13b31ae08d5112c88d26358eef84d53c56c150905135baa3cd3.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3704
    • C:\Users\Admin\AppData\Local\Temp\45bca5ced156f13b31ae08d5112c88d26358eef84d53c56c150905135baa3cd3.exe
      "C:\Users\Admin\AppData\Local\Temp\45bca5ced156f13b31ae08d5112c88d26358eef84d53c56c150905135baa3cd3.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3960
  • C:\Windows\system32\WerFault.exe
    C:\Windows\system32\WerFault.exe -pss -s 456 -p 1572 -ip 1572
    1⤵
      PID:3412
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 1572 -s 1748
      1⤵
      • Program crash
      PID:4316

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3960-133-0x0000000000400000-0x00000000004F5000-memory.dmp

      Filesize

      980KB

    • memory/3960-134-0x0000000000400000-0x00000000004F5000-memory.dmp

      Filesize

      980KB

    • memory/3960-135-0x0000000000400000-0x00000000004F5000-memory.dmp

      Filesize

      980KB

    • memory/3960-136-0x0000000000400000-0x00000000004F5000-memory.dmp

      Filesize

      980KB

    • memory/3960-137-0x0000000000400000-0x00000000004F5000-memory.dmp

      Filesize

      980KB