Analysis

  • max time kernel
    245s
  • max time network
    358s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 19:41

General

  • Target

    abde6bdb932dbea438a175a53e61d69a64a29fceb08ec0134faaa723183fa49a.exe

  • Size

    866KB

  • MD5

    66e282fdf2179975da104c3f6f3abc4a

  • SHA1

    83e9d98ad82a5c00fba7783905c2cdf9f9a61535

  • SHA256

    abde6bdb932dbea438a175a53e61d69a64a29fceb08ec0134faaa723183fa49a

  • SHA512

    6f2be21d5a03f170538cefa4c426d89fe4c934f326980bba0f53aca9e9c5dfd6983cdb4ed694fe5a65811de8e2f98d9cae026ea7bcfa17afae702423f45a10ac

  • SSDEEP

    24576:ZisxtfbBXl8LRB7yChzgQQFzGWpROslGZP:ZTHfbtWRBe8uTpIslG

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

Processes

  • C:\Users\Admin\AppData\Local\Temp\abde6bdb932dbea438a175a53e61d69a64a29fceb08ec0134faaa723183fa49a.exe
    "C:\Users\Admin\AppData\Local\Temp\abde6bdb932dbea438a175a53e61d69a64a29fceb08ec0134faaa723183fa49a.exe"
    1⤵
    • Adds Run key to start application
    • Checks processor information in registry
    PID:528

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/528-54-0x0000000075E81000-0x0000000075E83000-memory.dmp

          Filesize

          8KB

        • memory/528-55-0x00000000009D0000-0x0000000000AA8000-memory.dmp

          Filesize

          864KB

        • memory/528-56-0x0000000000B50000-0x0000000000C1E000-memory.dmp

          Filesize

          824KB

        • memory/528-57-0x0000000000F60000-0x00000000011AF000-memory.dmp

          Filesize

          2.3MB

        • memory/528-58-0x0000000000F60000-0x00000000011AF000-memory.dmp

          Filesize

          2.3MB