Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
21/08/2023, 21:47
Static task
static1
Behavioral task
behavioral1
Sample
15b7a19da88dff979917f0977079fb3bbcff35307d40daf9ba7eb543320e49d8.exe
Resource
win7-20230712-en
General
-
Target
15b7a19da88dff979917f0977079fb3bbcff35307d40daf9ba7eb543320e49d8.exe
-
Size
7.6MB
-
MD5
6693204e07630a56940284c492ad3355
-
SHA1
027d46ead036b614c8ebf566e628e267d4e26bf1
-
SHA256
15b7a19da88dff979917f0977079fb3bbcff35307d40daf9ba7eb543320e49d8
-
SHA512
67703590d0a48408e0283404841cd8f4a46417ca467b0c8e94f1f329634e28ee1ccf3c20d436a6e44fd0fee4b32acb8fd39ad7af04941a2d3d0e81c50137159a
-
SSDEEP
196608:nkfN6ftJRNx3Kqt3RPcZWrduzuUr/BWeP2paKpVOFhy5+6GZTb:nkfN6ftTvmYduzuUH24SQ6Gh
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\TypedURLs 15b7a19da88dff979917f0977079fb3bbcff35307d40daf9ba7eb543320e49d8.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1744 15b7a19da88dff979917f0977079fb3bbcff35307d40daf9ba7eb543320e49d8.exe 1744 15b7a19da88dff979917f0977079fb3bbcff35307d40daf9ba7eb543320e49d8.exe 1744 15b7a19da88dff979917f0977079fb3bbcff35307d40daf9ba7eb543320e49d8.exe 1744 15b7a19da88dff979917f0977079fb3bbcff35307d40daf9ba7eb543320e49d8.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\15b7a19da88dff979917f0977079fb3bbcff35307d40daf9ba7eb543320e49d8.exepack.tmp
Filesize2KB
MD5c8949c4771b05014686973462edb8c12
SHA11860190f3b3b27b41d7272ce19f20c9f661201b9
SHA25627bdd4667ed8c29a2978384b180f934619e6fd51dac5e08e330692be1ae75924
SHA51254b1583c404e794d4b3e059965fde45f3d7c30850d346ec929240974d3fcd7891b983297a8cf3ad9a6c44990b0eec15dfa94d808869a84d083b8cee07a7afe3a
-
Filesize
1KB
MD5907d20fdf5d5bca71376188a3f562b7a
SHA1e267a99dcf6a59e606b863885bfea970556fbe8d
SHA2565706de3d1df4d51fd7e7fa94e545f054247340c8155621a64e7f128108666a14
SHA5122fa383719ff3fd75a5a825b30cd2acb77e2508a6684d0d832871e8e97d946e4c2d1f664593c57eb6d7d9c94575bcfd6c480c6e314164e6eb8381571b8cf764b1
-
Filesize
1KB
MD546cd6e1ea405e3e658a34b118a21c245
SHA1f9a9b6da7361cbbf5443bc8b4d42ffb26652892a
SHA256f8c3393b8725ba15c6461bb07953b5ab34ad2ef383482245acc363dcc8dfa36e
SHA512875c570682a145414448b08573a15427cfe4310beb8123461897928b3dae4e562d1dda9aca4bac61a03477e5b25430c5ed7083b90305b6089e32ef2a7a39e9e6