Resubmissions

18-07-2023 04:51

230718-fg3s3ahb3t 7

18-07-2023 02:30

230718-cy9fdsfh72 7

Analysis

  • max time kernel
    143s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-07-2023 04:51

General

  • Target

    012063e0b7b4f7f3ce50574797112f95492772a9b75fc3d0934a91cc60faa240.exe

  • Size

    17KB

  • MD5

    150e53a8c852ac5f23f47aceef452542

  • SHA1

    a6b272f822b6205526ba56eee936afae1e695b0e

  • SHA256

    012063e0b7b4f7f3ce50574797112f95492772a9b75fc3d0934a91cc60faa240

  • SHA512

    acf3b6877d695943208b049566e253cbd822f364e8e161b0f06963aad2d07d0cf9f7314801eebcfa021a11284b313a0ed2688bf03dc82ff0120fdb03bc11a3ba

  • SSDEEP

    384:Kz+m1kuPZXHcaYbT1AnoKRiwWy8PG8Xj6r:KzrOeZXHYbxcPRixy8e8XjS

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\012063e0b7b4f7f3ce50574797112f95492772a9b75fc3d0934a91cc60faa240.exe
    "C:\Users\Admin\AppData\Local\Temp\012063e0b7b4f7f3ce50574797112f95492772a9b75fc3d0934a91cc60faa240.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2996

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Public\Pictures\lykkdapooop.zip

    Filesize

    370B

    MD5

    37f03a5299050fb90a62e427271eea6f

    SHA1

    59eeeb25ee520549d698224cd38b7d7dc2ae1a4b

    SHA256

    10250177d354a30fbd0a6425c6e968e18da9aeafa9ca855724de0f22e4baa36c

    SHA512

    417cf911660262f71cd505c5afc2aba4c2673742cf09a4fce64a3f720f761b9288834be1bc218f50821b3c352401ac0dfc56ce35fc29bbca4d67bead87b9c678

  • C:\Users\Public\Pictures\lykkdapooop.zip

    Filesize

    38KB

    MD5

    1ed69f9825cf9bcf80bc0c277f088759

    SHA1

    e03bc40c795c830fae79b4f7bfaef828a4c268c6

    SHA256

    6c5e20918fdd9c52332a3f744bbdcf0ab8a3eaff9d5ca513f5e6eee26d76a0ad

    SHA512

    7904260c36738c215d83ba16e0ad29b9394b1367d322a5095b594d21f12899ec84a9d09857bb1c2792dbdb17b3f236ac6c1bd3c486896f481e27da32b5dc02a6

  • memory/2996-133-0x0000014998490000-0x0000014998498000-memory.dmp

    Filesize

    32KB

  • memory/2996-134-0x000001499A040000-0x000001499A052000-memory.dmp

    Filesize

    72KB

  • memory/2996-136-0x00007FF985830000-0x00007FF9862F1000-memory.dmp

    Filesize

    10.8MB

  • memory/2996-135-0x000001499A020000-0x000001499A02A000-memory.dmp

    Filesize

    40KB

  • memory/2996-138-0x000001499A010000-0x000001499A020000-memory.dmp

    Filesize

    64KB

  • memory/2996-169-0x00007FF985830000-0x00007FF9862F1000-memory.dmp

    Filesize

    10.8MB

  • memory/2996-170-0x000001499A010000-0x000001499A020000-memory.dmp

    Filesize

    64KB