Analysis

  • max time kernel
    151s
  • max time network
    171s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 14:45

General

  • Target

    4ad436499f286a20552965f022ea7238bdbc4c27fcf7b58644151d4e03a60383.exe

  • Size

    1.1MB

  • MD5

    8e2650c6a302c36d1f99e5178e03726a

  • SHA1

    4d217c0b419d2e02d3e03bdc46e6afdd9c9a9de7

  • SHA256

    4ad436499f286a20552965f022ea7238bdbc4c27fcf7b58644151d4e03a60383

  • SHA512

    dc8f0f828a89d22f8dbf1ca0add6e938cdc42d398de008b881291f3bff936df035eb31e40932a20b78751cf76a2f79a64ad31eb0a559108a6e4bf8ab319f5d7c

  • SSDEEP

    24576:RUd5LNQ4WBv7rLta331vvoilEbrwWRyDuc:Rk5h67rL2vvovbz4y

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ad436499f286a20552965f022ea7238bdbc4c27fcf7b58644151d4e03a60383.exe
    "C:\Users\Admin\AppData\Local\Temp\4ad436499f286a20552965f022ea7238bdbc4c27fcf7b58644151d4e03a60383.exe"
    1⤵
    • Adds Run key to start application
    PID:1224

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1224-54-0x0000000075C41000-0x0000000075C43000-memory.dmp

          Filesize

          8KB

        • memory/1224-55-0x0000000000400000-0x00000000006D3000-memory.dmp

          Filesize

          2.8MB

        • memory/1224-56-0x0000000000400000-0x00000000006D3000-memory.dmp

          Filesize

          2.8MB

        • memory/1224-58-0x0000000000400000-0x00000000006D3000-memory.dmp

          Filesize

          2.8MB

        • memory/1224-59-0x0000000000400000-0x00000000006D3000-memory.dmp

          Filesize

          2.8MB