Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 14:19

General

  • Target

    bb91c5f02cdd8a52b58b557fc296906cf8f0680ac5330c060a7be8de5e1e001d.exe

  • Size

    854KB

  • MD5

    6c87d5162538f6c5c57ec04ede8469a6

  • SHA1

    0697520f233eeb19dab49d7ba0999a874d322860

  • SHA256

    bb91c5f02cdd8a52b58b557fc296906cf8f0680ac5330c060a7be8de5e1e001d

  • SHA512

    6af1ad5a59e86ecc26c61d87a5bba038b3c2abfdbd75e4d963193b35c780182e30246ebcd3b2c159056f10fcd1b52505f4101b234d0becad3c240826488f56de

  • SSDEEP

    24576:j+qzkT/ZAivqXWz+8UVJww6MListxS7L1eQ:jy/ZAiVzxG6miv7Z

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

Processes

  • C:\Users\Admin\AppData\Local\Temp\bb91c5f02cdd8a52b58b557fc296906cf8f0680ac5330c060a7be8de5e1e001d.exe
    "C:\Users\Admin\AppData\Local\Temp\bb91c5f02cdd8a52b58b557fc296906cf8f0680ac5330c060a7be8de5e1e001d.exe"
    1⤵
    • Adds Run key to start application
    • Checks processor information in registry
    PID:564

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/564-54-0x0000000074AD1000-0x0000000074AD3000-memory.dmp

          Filesize

          8KB

        • memory/564-56-0x0000000000A40000-0x0000000000B0F000-memory.dmp

          Filesize

          828KB

        • memory/564-57-0x0000000000EC0000-0x000000000110A000-memory.dmp

          Filesize

          2.3MB

        • memory/564-55-0x0000000000960000-0x0000000000A3D000-memory.dmp

          Filesize

          884KB

        • memory/564-58-0x0000000000EC0000-0x000000000110A000-memory.dmp

          Filesize

          2.3MB