Analysis

  • max time kernel
    136s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    24-12-2023 22:53

General

  • Target

    17468c80bd2c1d73b45e1c491bf8fa7a.exe

  • Size

    1.1MB

  • MD5

    17468c80bd2c1d73b45e1c491bf8fa7a

  • SHA1

    5a0e1161b62a1673c7029f7f5b893cf66f0a9382

  • SHA256

    42dce116d47b59e9b34fd5018e6c557f59184242f8b8f95f2971b0759cfe9508

  • SHA512

    9e433b04bbdb20150f35d1e99718f1cf656a652805c6b6df6d3801e3abebb927aaf0f7dbdf271a2ed24af8a4ed185021df6a23dda4de08bd9047c2154d746f52

  • SSDEEP

    24576:cT501BqJN4rVEhikAj4sERD9+iT+Ol3i5I1+gyyl:cS1Bqq4sM4iTz3i5cV

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\17468c80bd2c1d73b45e1c491bf8fa7a.exe
    "C:\Users\Admin\AppData\Local\Temp\17468c80bd2c1d73b45e1c491bf8fa7a.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:2224

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ish259398556\images\progress-bg.png

    Filesize

    2KB

    MD5

    32a6846fe53388eb03be3ada2221297f

    SHA1

    1c1baec7b7fe7a420ccf68d3112384b44f8ba89e

    SHA256

    5c6d20c98c106bc6df49447b9939a90ba6a5e3c20d89ca0621677a7501bdb127

    SHA512

    79c4f3a72467b61c27d6e93415bae3fc61a9fde62aae4202ba8ed1de6328f5facc48092bfe57db70338a0a4b50f571d501eed04aed8b047d20aa28ee7446ce98

  • memory/2224-152-0x0000000000400000-0x0000000000517000-memory.dmp

    Filesize

    1.1MB

  • memory/2224-149-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/2224-154-0x0000000000400000-0x0000000000517000-memory.dmp

    Filesize

    1.1MB

  • memory/2224-148-0x0000000000400000-0x0000000000517000-memory.dmp

    Filesize

    1.1MB

  • memory/2224-155-0x0000000000400000-0x0000000000517000-memory.dmp

    Filesize

    1.1MB

  • memory/2224-150-0x0000000000400000-0x0000000000517000-memory.dmp

    Filesize

    1.1MB

  • memory/2224-151-0x0000000000400000-0x0000000000517000-memory.dmp

    Filesize

    1.1MB

  • memory/2224-156-0x0000000000400000-0x0000000000517000-memory.dmp

    Filesize

    1.1MB

  • memory/2224-147-0x0000000000400000-0x0000000000517000-memory.dmp

    Filesize

    1.1MB

  • memory/2224-34-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/2224-0-0x0000000000400000-0x0000000000517000-memory.dmp

    Filesize

    1.1MB

  • memory/2224-157-0x0000000000400000-0x0000000000517000-memory.dmp

    Filesize

    1.1MB

  • memory/2224-158-0x0000000000400000-0x0000000000517000-memory.dmp

    Filesize

    1.1MB

  • memory/2224-159-0x0000000000400000-0x0000000000517000-memory.dmp

    Filesize

    1.1MB

  • memory/2224-160-0x0000000000400000-0x0000000000517000-memory.dmp

    Filesize

    1.1MB

  • memory/2224-161-0x0000000000400000-0x0000000000517000-memory.dmp

    Filesize

    1.1MB

  • memory/2224-162-0x0000000000400000-0x0000000000517000-memory.dmp

    Filesize

    1.1MB