Analysis

  • max time kernel
    150s
  • max time network
    170s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06/12/2022, 20:20

General

  • Target

    52630ec084ca0c916c89b44816d6bd733fe498bd04a30484c4bd34ec7f1a588a.exe

  • Size

    819KB

  • MD5

    b4d5629d28f1f9ace74397c2d9ccafb5

  • SHA1

    2ce0b62ceb52895b401374f42b81d79f83be873f

  • SHA256

    52630ec084ca0c916c89b44816d6bd733fe498bd04a30484c4bd34ec7f1a588a

  • SHA512

    3a4c5602286d834c23abe06e3a36c75c27c97c8a5c40f97fd07acc21f6efe9f1585aaaa84190c3cd212c3c5dd118e5422657bbdcb46e17b7ab18b9379b66f569

  • SSDEEP

    12288:+yKsh9KBX/RBrIo4DIauscGKY0nY2uGAJIP7YDSglrrWwZ+y/D7+5yDtTvR5:VXcvjQAscGfGAecuIr1+s65yDtLR5

Malware Config

Signatures

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

Processes

  • C:\Users\Admin\AppData\Local\Temp\52630ec084ca0c916c89b44816d6bd733fe498bd04a30484c4bd34ec7f1a588a.exe
    "C:\Users\Admin\AppData\Local\Temp\52630ec084ca0c916c89b44816d6bd733fe498bd04a30484c4bd34ec7f1a588a.exe"
    1⤵
    • Adds Run key to start application
    PID:1904

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1904-54-0x0000000075501000-0x0000000075503000-memory.dmp

    Filesize

    8KB

  • memory/1904-55-0x0000000000400000-0x00000000007A9000-memory.dmp

    Filesize

    3.7MB

  • memory/1904-56-0x0000000000400000-0x00000000007A9000-memory.dmp

    Filesize

    3.7MB

  • memory/1904-57-0x0000000000400000-0x00000000007A9000-memory.dmp

    Filesize

    3.7MB

  • memory/1904-58-0x0000000000400000-0x00000000007A9000-memory.dmp

    Filesize

    3.7MB