Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 04:28

General

  • Target

    cf9ba937ee7caf9161b3a88e8d2f443e317d0169724188412f1dbe35d8b7c964.exe

  • Size

    850KB

  • MD5

    a950e01438cb234722148d7a42244c78

  • SHA1

    f47231973f5e9786e1f8437bcefec7b980ee2009

  • SHA256

    cf9ba937ee7caf9161b3a88e8d2f443e317d0169724188412f1dbe35d8b7c964

  • SHA512

    4c36176f7028fe424e869362ac153cc1c431531c106d378d280c3f5092e4c3d53405b04d47d7346f30c6c87d720ffa4922f4b2ce72bc584c00e2a627a7e15b45

  • SSDEEP

    12288:qCerSTtUCSTPLE6FmX9ONFU6Wtb4bzKmf4BaQSdE7EQHV5V5Fo92hYAqRLIA5Y3C:qxD4ftIKb6zKkzXQ7V5FhYVLnmp9QF

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cf9ba937ee7caf9161b3a88e8d2f443e317d0169724188412f1dbe35d8b7c964.exe
    "C:\Users\Admin\AppData\Local\Temp\cf9ba937ee7caf9161b3a88e8d2f443e317d0169724188412f1dbe35d8b7c964.exe"
    1⤵
    • Adds Run key to start application
    • Checks processor information in registry
    • Enumerates system info in registry
    PID:1204

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1204-54-0x0000000074DE1000-0x0000000074DE3000-memory.dmp

          Filesize

          8KB

        • memory/1204-55-0x0000000002010000-0x00000000020E0000-memory.dmp

          Filesize

          832KB

        • memory/1204-56-0x00000000020E0000-0x00000000021AF000-memory.dmp

          Filesize

          828KB

        • memory/1204-57-0x0000000000210000-0x000000000045F000-memory.dmp

          Filesize

          2.3MB