Analysis

  • max time kernel
    74s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03-12-2022 20:31

General

  • Target

    9a34ce7dcaec0789fe78aeec4f6d09c0b14ef4ee7ff33ccd3ea4cca2035abc3f.exe

  • Size

    44KB

  • MD5

    57b12273ea91592fd08136185b7fe0e9

  • SHA1

    eaaa3f879b6cb63f289e316aa9e3dd18d75da092

  • SHA256

    9a34ce7dcaec0789fe78aeec4f6d09c0b14ef4ee7ff33ccd3ea4cca2035abc3f

  • SHA512

    7fb8594736243793bbd5e0bf8af15b3001aeb9396d639ba5f19c246d32a0e4d503c2707d1fade90c5631dfaab1954d8c094391d94b1b94b4ad869c81607cc002

  • SSDEEP

    384:sRgZ6jHsQSpG2sn/0bjDoCJWyEdDhQy/Nod2M3y3qOxx83R3/f2T2i3V9ZB3+9PW:siz9sn4qdDha/3y6KE3WLV9ZBOD6D

Score
7/10

Malware Config

Signatures

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9a34ce7dcaec0789fe78aeec4f6d09c0b14ef4ee7ff33ccd3ea4cca2035abc3f.exe
    "C:\Users\Admin\AppData\Local\Temp\9a34ce7dcaec0789fe78aeec4f6d09c0b14ef4ee7ff33ccd3ea4cca2035abc3f.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:792
    • C:\Users\Admin\AppData\Local\Temp\9a34ce7dcaec0789fe78aeec4f6d09c0b14ef4ee7ff33ccd3ea4cca2035abc3f.exe
      C:\Users\Admin\AppData\Local\Temp\9a34ce7dcaec0789fe78aeec4f6d09c0b14ef4ee7ff33ccd3ea4cca2035abc3f.exe
      2⤵
        PID:1744

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1744-59-0x0000000000400000-0x0000000000408000-memory.dmp

      Filesize

      32KB

    • memory/1744-61-0x0000000000400000-0x0000000000408000-memory.dmp

      Filesize

      32KB

    • memory/1744-57-0x0000000000400000-0x0000000000408000-memory.dmp

      Filesize

      32KB

    • memory/1744-60-0x0000000000400000-0x0000000000408000-memory.dmp

      Filesize

      32KB

    • memory/1744-56-0x0000000000400000-0x0000000000408000-memory.dmp

      Filesize

      32KB

    • memory/1744-62-0x0000000000400000-0x0000000000408000-memory.dmp

      Filesize

      32KB

    • memory/1744-65-0x0000000074AD1000-0x0000000074AD3000-memory.dmp

      Filesize

      8KB

    • memory/1744-66-0x0000000000400000-0x0000000000408000-memory.dmp

      Filesize

      32KB

    • memory/1744-67-0x0000000000400000-0x0000000000408000-memory.dmp

      Filesize

      32KB