Analysis

  • max time kernel
    158s
  • max time network
    174s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 04:07

General

  • Target

    d4c27a80307c22cbd4f78c612c74b02f63a52133913dae68bc79abe5486765ae.exe

  • Size

    948KB

  • MD5

    80ec22227be4084f8a1602a7b03c6953

  • SHA1

    7d59089b380147ca135543f7d9bd3fa2e27132fd

  • SHA256

    d4c27a80307c22cbd4f78c612c74b02f63a52133913dae68bc79abe5486765ae

  • SHA512

    0728f71009afe6bef5486a72ad41b0040d32c4c9e5091baab3ce5fb1abd2a472ec395bf0204a64d5ff484270b9387fe916fc50008c9fddb17ca75974e4816634

  • SSDEEP

    24576:L1GxKpjKISzqvSkmKiC1BdGBbm/YPRMTMLSeI9:yiKHumKZ1aCgOgLLu

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d4c27a80307c22cbd4f78c612c74b02f63a52133913dae68bc79abe5486765ae.exe
    "C:\Users\Admin\AppData\Local\Temp\d4c27a80307c22cbd4f78c612c74b02f63a52133913dae68bc79abe5486765ae.exe"
    1⤵
    • Adds Run key to start application
    • Modifies Internet Explorer settings
    PID:4088

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4088-132-0x0000000000400000-0x000000000065E000-memory.dmp

    Filesize

    2.4MB

  • memory/4088-134-0x0000000000400000-0x000000000065E000-memory.dmp

    Filesize

    2.4MB

  • memory/4088-135-0x0000000000400000-0x000000000065E000-memory.dmp

    Filesize

    2.4MB