Analysis

  • max time kernel
    43s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    01/05/2023, 19:19

General

  • Target

    f4cc73efb0bff5720c6fb6453270b88a4272ea4e53fad02d1920f20e76c0dfe2.exe

  • Size

    352KB

  • MD5

    8d8aa9d635aa21dea310a4622b12385e

  • SHA1

    b9d2acf1ed756a67d65d198251dd3121b4574658

  • SHA256

    f4cc73efb0bff5720c6fb6453270b88a4272ea4e53fad02d1920f20e76c0dfe2

  • SHA512

    070fec5dbfc3250c8612ce32f547cdf15f1165ab5aea348ad57689aec3592f7b8fedc5a56ac629a920a698f039757366b9b42e544169a200b715de0cb94f8219

  • SSDEEP

    6144:AHB/Q5HMfc+Y4hjOJd1iZe76I2Fc3BUc4SAM2:AG5HP+Y4harieeI2e3h

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f4cc73efb0bff5720c6fb6453270b88a4272ea4e53fad02d1920f20e76c0dfe2.exe
    "C:\Users\Admin\AppData\Local\Temp\f4cc73efb0bff5720c6fb6453270b88a4272ea4e53fad02d1920f20e76c0dfe2.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1344

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1344-55-0x00000000048F0000-0x000000000492C000-memory.dmp

    Filesize

    240KB

  • memory/1344-56-0x0000000004930000-0x000000000496A000-memory.dmp

    Filesize

    232KB

  • memory/1344-57-0x0000000004930000-0x0000000004965000-memory.dmp

    Filesize

    212KB

  • memory/1344-58-0x0000000004930000-0x0000000004965000-memory.dmp

    Filesize

    212KB

  • memory/1344-60-0x0000000004930000-0x0000000004965000-memory.dmp

    Filesize

    212KB

  • memory/1344-62-0x0000000004930000-0x0000000004965000-memory.dmp

    Filesize

    212KB

  • memory/1344-66-0x0000000004930000-0x0000000004965000-memory.dmp

    Filesize

    212KB

  • memory/1344-64-0x0000000004930000-0x0000000004965000-memory.dmp

    Filesize

    212KB

  • memory/1344-68-0x0000000004930000-0x0000000004965000-memory.dmp

    Filesize

    212KB

  • memory/1344-70-0x0000000004930000-0x0000000004965000-memory.dmp

    Filesize

    212KB

  • memory/1344-72-0x0000000004930000-0x0000000004965000-memory.dmp

    Filesize

    212KB

  • memory/1344-76-0x0000000004930000-0x0000000004965000-memory.dmp

    Filesize

    212KB

  • memory/1344-74-0x0000000004930000-0x0000000004965000-memory.dmp

    Filesize

    212KB

  • memory/1344-78-0x0000000004930000-0x0000000004965000-memory.dmp

    Filesize

    212KB

  • memory/1344-82-0x0000000004930000-0x0000000004965000-memory.dmp

    Filesize

    212KB

  • memory/1344-86-0x0000000004930000-0x0000000004965000-memory.dmp

    Filesize

    212KB

  • memory/1344-84-0x0000000004930000-0x0000000004965000-memory.dmp

    Filesize

    212KB

  • memory/1344-80-0x0000000004930000-0x0000000004965000-memory.dmp

    Filesize

    212KB

  • memory/1344-88-0x0000000004930000-0x0000000004965000-memory.dmp

    Filesize

    212KB

  • memory/1344-94-0x0000000004930000-0x0000000004965000-memory.dmp

    Filesize

    212KB

  • memory/1344-96-0x0000000004930000-0x0000000004965000-memory.dmp

    Filesize

    212KB

  • memory/1344-92-0x0000000004930000-0x0000000004965000-memory.dmp

    Filesize

    212KB

  • memory/1344-90-0x0000000004930000-0x0000000004965000-memory.dmp

    Filesize

    212KB

  • memory/1344-98-0x0000000004930000-0x0000000004965000-memory.dmp

    Filesize

    212KB

  • memory/1344-100-0x0000000004930000-0x0000000004965000-memory.dmp

    Filesize

    212KB

  • memory/1344-102-0x0000000004930000-0x0000000004965000-memory.dmp

    Filesize

    212KB

  • memory/1344-110-0x0000000004930000-0x0000000004965000-memory.dmp

    Filesize

    212KB

  • memory/1344-108-0x0000000004930000-0x0000000004965000-memory.dmp

    Filesize

    212KB

  • memory/1344-112-0x0000000004930000-0x0000000004965000-memory.dmp

    Filesize

    212KB

  • memory/1344-106-0x0000000004930000-0x0000000004965000-memory.dmp

    Filesize

    212KB

  • memory/1344-116-0x0000000004930000-0x0000000004965000-memory.dmp

    Filesize

    212KB

  • memory/1344-114-0x0000000004930000-0x0000000004965000-memory.dmp

    Filesize

    212KB

  • memory/1344-104-0x0000000004930000-0x0000000004965000-memory.dmp

    Filesize

    212KB

  • memory/1344-120-0x0000000004930000-0x0000000004965000-memory.dmp

    Filesize

    212KB

  • memory/1344-118-0x0000000004930000-0x0000000004965000-memory.dmp

    Filesize

    212KB

  • memory/1344-469-0x0000000000220000-0x0000000000266000-memory.dmp

    Filesize

    280KB

  • memory/1344-471-0x0000000007040000-0x0000000007080000-memory.dmp

    Filesize

    256KB

  • memory/1344-473-0x0000000007040000-0x0000000007080000-memory.dmp

    Filesize

    256KB

  • memory/1344-475-0x0000000007040000-0x0000000007080000-memory.dmp

    Filesize

    256KB

  • memory/1344-853-0x0000000007040000-0x0000000007080000-memory.dmp

    Filesize

    256KB

  • memory/1344-855-0x0000000007040000-0x0000000007080000-memory.dmp

    Filesize

    256KB

  • memory/1344-856-0x0000000007040000-0x0000000007080000-memory.dmp

    Filesize

    256KB

  • memory/1344-857-0x0000000007040000-0x0000000007080000-memory.dmp

    Filesize

    256KB

  • memory/1344-858-0x0000000007040000-0x0000000007080000-memory.dmp

    Filesize

    256KB