Analysis

  • max time kernel
    122s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2023 01:20

General

  • Target

    200c63ea4c0a4b4e47cd400834aab95f.exe

  • Size

    632KB

  • MD5

    200c63ea4c0a4b4e47cd400834aab95f

  • SHA1

    eaab2dc3ba3f06b278b340401e2d3e4ce42e4e1d

  • SHA256

    f4a77f5eaabb5ef5f0d7e4586733e5e2b85d5da8a99e0e968b4f83c27f300d25

  • SHA512

    7f85cb5fd034500e8a298f7f26ac643af36e7d9b1d174c1ff7001fb5ff2ec37c8415928ff79883976d1aa2d84d447436cd751da7e99e95032d4ff50437429486

  • SSDEEP

    12288:DHxuG8aA+JdZweA6YQBaZ5Oe6FP3Mhd44STy1dOKLRvib:RA+JdZwBR9Z5l6F/odqy1Icdib

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\200c63ea4c0a4b4e47cd400834aab95f.exe
    "C:\Users\Admin\AppData\Local\Temp\200c63ea4c0a4b4e47cd400834aab95f.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2716
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\41.bat
      2⤵
        PID:2796

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\403515.exe

      Filesize

      632KB

      MD5

      200c63ea4c0a4b4e47cd400834aab95f

      SHA1

      eaab2dc3ba3f06b278b340401e2d3e4ce42e4e1d

      SHA256

      f4a77f5eaabb5ef5f0d7e4586733e5e2b85d5da8a99e0e968b4f83c27f300d25

      SHA512

      7f85cb5fd034500e8a298f7f26ac643af36e7d9b1d174c1ff7001fb5ff2ec37c8415928ff79883976d1aa2d84d447436cd751da7e99e95032d4ff50437429486

    • C:\Users\Admin\AppData\Local\Temp\41.bat

      Filesize

      176B

      MD5

      864c5d098ecc85d7a942c1e5e634c7bf

      SHA1

      2f1b7f8a8f2d04fa2f9059d457a4ff0b9b06f56d

      SHA256

      b7d1052099b7e4999789c4b8fce672e47e1179585e6c27b9abe0859e3f389cff

      SHA512

      6573c2a6d352f9f6cf3ab4fc1dce097f61b2ad79dcc69b655b2497a1975d37a39e1e40acfdc39f3ca32a693eacc898fd44b5e323765570aacfc4f9fa12e2bbae

    • memory/2716-0-0x0000000010000000-0x000000001011D000-memory.dmp

      Filesize

      1.1MB