Analysis

  • max time kernel
    303s
  • max time network
    315s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/02/2023, 18:14

General

  • Target

    file.exe

  • Size

    385KB

  • MD5

    dfd4a5fc7dc081d9e6a1af88f62b7d87

  • SHA1

    8189c986400e13d5ebd29d43e1ed26b3a5638022

  • SHA256

    f2a65ee9f937a7937fd4bb47a67a87f4c0619fabb192612837d020c9712f1533

  • SHA512

    6a13393e914f86fc5e800d069e1bb082e4da99a21531200eb46444f3da8b8ac079a4af945aa9c95bd859d4cc83452b288fd0ad944c548c465111521d83b1708a

  • SSDEEP

    6144:C60ylp0UilWqMz71lFGErL8uPQpunfW7J:C7WqMHZ8cnfW

Malware Config

Signatures

  • Downloads MZ/PE file
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    PID:4728

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4728-132-0x00000000008CD000-0x00000000008E3000-memory.dmp

    Filesize

    88KB

  • memory/4728-133-0x0000000002250000-0x0000000002265000-memory.dmp

    Filesize

    84KB

  • memory/4728-134-0x0000000000400000-0x0000000000628000-memory.dmp

    Filesize

    2.2MB

  • memory/4728-135-0x00000000008CD000-0x00000000008E3000-memory.dmp

    Filesize

    88KB

  • memory/4728-136-0x0000000002250000-0x0000000002265000-memory.dmp

    Filesize

    84KB

  • memory/4728-137-0x0000000000400000-0x0000000000628000-memory.dmp

    Filesize

    2.2MB

  • memory/4728-138-0x0000000061E00000-0x0000000061EF3000-memory.dmp

    Filesize

    972KB