Analysis

  • max time kernel
    127s
  • max time network
    137s
  • platform
    windows10-1703_x64
  • resource
    win10-20230915-en
  • resource tags

    arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system
  • submitted
    16-10-2023 22:21

General

  • Target

    a2b67a646410e2cc28d317dcc062ad158f03be2639db5efec993fcdb3886de1a.exe

  • Size

    1.4MB

  • MD5

    a6f75b1e5f8b4265869f7e5bdcaa3314

  • SHA1

    b4bedd3e71ef041c399413e6bcdd03db37d80d2f

  • SHA256

    a2b67a646410e2cc28d317dcc062ad158f03be2639db5efec993fcdb3886de1a

  • SHA512

    53c8bcbc89df212277a9c63d322b03faf273cc133177205b1c2179db7c5e13a16db6d1ad800baf7b44e9f48291786f065f741f62521ae3df99fa488f2fbaf952

  • SSDEEP

    24576:m1W8VSHsqxNkHROM62DbJByw9mgIkBKMAyisV5+n2n3dcCwSl/JRFIvx:W3SMAAlVD+w9RIk0MA1sEOcCbl/Jsx

Malware Config

Signatures

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a2b67a646410e2cc28d317dcc062ad158f03be2639db5efec993fcdb3886de1a.exe
    "C:\Users\Admin\AppData\Local\Temp\a2b67a646410e2cc28d317dcc062ad158f03be2639db5efec993fcdb3886de1a.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:3048

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3048-0-0x0000000000170000-0x00000000002DF000-memory.dmp

    Filesize

    1.4MB

  • memory/3048-1-0x0000000002400000-0x0000000002481000-memory.dmp

    Filesize

    516KB

  • memory/3048-6-0x0000000000170000-0x00000000002DF000-memory.dmp

    Filesize

    1.4MB