Analysis

  • max time kernel
    237s
  • max time network
    304s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    06-12-2022 10:56

General

  • Target

    2ad62c0a470e7f6f349e8dd99657298ebebc4ed7b9822d3c1618e6aec133eba6.exe

  • Size

    821KB

  • MD5

    e4f22e321ee3289590ac916b070645b6

  • SHA1

    a368432d678de3602287bbe96739435c1d9197cd

  • SHA256

    2ad62c0a470e7f6f349e8dd99657298ebebc4ed7b9822d3c1618e6aec133eba6

  • SHA512

    2cc4fdca4e6bbcfc1633b9a561fde52e5fc94fa05a1b992fabbad04a38f2f7b850009efd9ffba3e07a09a2bbaf4855f3976c3a502591cd5de64a8e2f301e2839

  • SSDEEP

    24576:ThEnpKZA8ohPmxePtShxHp/tU4ronokKBpV:ThEnB8ohPmxeFShxHAFno9D

Malware Config

Signatures

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ad62c0a470e7f6f349e8dd99657298ebebc4ed7b9822d3c1618e6aec133eba6.exe
    "C:\Users\Admin\AppData\Local\Temp\2ad62c0a470e7f6f349e8dd99657298ebebc4ed7b9822d3c1618e6aec133eba6.exe"
    1⤵
    • Adds Run key to start application
    PID:960

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/960-54-0x0000000000400000-0x00000000007A8000-memory.dmp

    Filesize

    3.7MB

  • memory/960-56-0x0000000000400000-0x00000000007A8000-memory.dmp

    Filesize

    3.7MB

  • memory/960-57-0x0000000075FF1000-0x0000000075FF3000-memory.dmp

    Filesize

    8KB

  • memory/960-58-0x0000000000400000-0x00000000007A8000-memory.dmp

    Filesize

    3.7MB

  • memory/960-59-0x0000000000400000-0x00000000007A8000-memory.dmp

    Filesize

    3.7MB