Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06/12/2022, 13:34

General

  • Target

    netskyP.exe

  • Size

    28KB

  • MD5

    3018e99857f31a59e0777396ae634a8f

  • SHA1

    7031cfe76ee7b2c925f2c00372fb9ef7f983f60c

  • SHA256

    c8fffb2e737514c551b2d7bcaf8baa459564b059cab1a35a3cec4b3c270d4525

  • SHA512

    4604c98f765be26d4a0a33f54cc777810cae7fab5153ee637b4fc8057492fd40de6fdf9d88dc4f7f34f45dd174bae54a2b39e0f0e5f1f5997820b9bccf47686a

  • SSDEEP

    768:vWkliAnUQYkYKzqbjC5RqHjrYReyZx+l0oKriCPRDL:+ySsz6jGeyZx+l0TR

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\netskyP.exe
    "C:\Users\Admin\AppData\Local\Temp\netskyP.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Drops file in Windows directory
    PID:1928

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1928-54-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/1928-55-0x0000000010000000-0x000000001002E000-memory.dmp

    Filesize

    184KB

  • memory/1928-56-0x00000000762B1000-0x00000000762B3000-memory.dmp

    Filesize

    8KB

  • memory/1928-57-0x0000000010000000-0x000000001002E000-memory.dmp

    Filesize

    184KB