Analysis
-
max time kernel
109s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13/04/2023, 18:55
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
General
-
Target
tmp.exe
-
Size
1009KB
-
MD5
c556ab520a754e6f12d47f4f44ad0175
-
SHA1
12da84ee12f2d6eeaeea146239ce9b09265ae0b8
-
SHA256
e5928b7778cd9f4230ca1debd22a9182e77967c6f9dc8b7dbb502fe7ec329483
-
SHA512
25e0a48137c4d833ca71956120428362e7dd0368bfeecc66d6a7ac3fa6f8147bb5ce70967282a62ab2cc16652f23afdd91f99ca1290a4036fa6cad37bffa1f99
-
SSDEEP
24576:zqDEvCTbMWu7rQYlBQcBiT6rprG8a8nYz0DpaP:zTvC/MTQYxsWR7a8nU0Dpa
Malware Config
Signatures
-
Downloads MZ/PE file
-
Loads dropped DLL 1 IoCs
pid Process 2072 tmp.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:{impersonationLevel=impersonate}!\root\cimv2 tmp.exe -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 11 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 35 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 2072 tmp.exe 2072 tmp.exe 2072 tmp.exe 2072 tmp.exe 2072 tmp.exe 2072 tmp.exe 2072 tmp.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 2072 tmp.exe 2072 tmp.exe 2072 tmp.exe 2072 tmp.exe 2072 tmp.exe 2072 tmp.exe 2072 tmp.exe
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
858KB
MD5c7719f774bb859240eb6dfa91a1f10be
SHA1be1461e770333eb13e0fe66d378e3fac4f1112b5
SHA256b3ce811fb696b94f9117ee7fe725ae6b907d695636beceeb1672d5d5eeb81df4
SHA5128a561e927a7a65f5211c76b488bed2a3cc0525ecd9775d25e1863b52ff532349c125b76a51eb63ea2e4479a567e8fac6b8ae38b7fd1970bad2556befe9e3b529