Analysis

  • max time kernel
    187s
  • max time network
    191s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 20:27

General

  • Target

    a009e78d029f2cca113d1e909d96f573acc5cf4355829a5481e9602312eb7888.exe

  • Size

    944KB

  • MD5

    b530155cbf04746b2168f00996c89c7b

  • SHA1

    0d9341d96bf79226b295319d818ec37264f5ddc7

  • SHA256

    a009e78d029f2cca113d1e909d96f573acc5cf4355829a5481e9602312eb7888

  • SHA512

    781ecaf6d744da7a4c3d355e75d6122bcc5c65b2cce6f6d457df5729b7b068a1e6965380afebe5e6caf5df05645367f47b81774e1307cfa89d676965663dc993

  • SSDEEP

    12288:7IO+qEOQi6tdm4FShXcCpZqP7SEumOrvwcZzU5nzTBw9bOy6PjTGfbBjNkruFDN:7n+eQis9ShMCT5FPzcnZwdOfG1hkr6

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a009e78d029f2cca113d1e909d96f573acc5cf4355829a5481e9602312eb7888.exe
    "C:\Users\Admin\AppData\Local\Temp\a009e78d029f2cca113d1e909d96f573acc5cf4355829a5481e9602312eb7888.exe"
    1⤵
    • Adds Run key to start application
    PID:1716

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1716-54-0x0000000000400000-0x0000000000648000-memory.dmp

          Filesize

          2.3MB

        • memory/1716-55-0x0000000074F01000-0x0000000074F03000-memory.dmp

          Filesize

          8KB

        • memory/1716-56-0x0000000000400000-0x0000000000648000-memory.dmp

          Filesize

          2.3MB

        • memory/1716-58-0x0000000000400000-0x0000000000648000-memory.dmp

          Filesize

          2.3MB

        • memory/1716-59-0x0000000000400000-0x0000000000648000-memory.dmp

          Filesize

          2.3MB