Analysis

  • max time kernel
    142s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 03:33

General

  • Target

    034c765777a259d37ce8b1d99d05f591.exe

  • Size

    176KB

  • MD5

    034c765777a259d37ce8b1d99d05f591

  • SHA1

    552ae3967e50390f06223ceb6f40c06ca45cc9b4

  • SHA256

    58972b9fb856a756ce1e738c42bc15e17df4aa378c4e05aea6f2253d0c3038bc

  • SHA512

    46ee2b3ac6d9d6749bca0a61ce5bdb39d4cea18bc0f5e8ae87a0bd0f903cab8846b8e729523030cf5eca9b57787c4c6082017e3a10b6bef55c40fdb07f22723c

  • SSDEEP

    3072:xWVQsT+LfbtELxHiDRTlTb1W2suH/ufpwEbpCaY6rXAyd4y8JoZSpLcC4jErjO:nsTObtELxH8n13/HGfrp7Y67Ayd4y8Jk

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\034c765777a259d37ce8b1d99d05f591.exe
    "C:\Users\Admin\AppData\Local\Temp\034c765777a259d37ce8b1d99d05f591.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Suspicious use of WriteProcessMemory
    PID:2312
    • C:\Users\Admin\AppData\Local\Temp\034c765777a259d37ce8b1d99d05f591.exe
      C:\Users\Admin\AppData\Local\Temp\034c765777a259d37ce8b1d99d05f591.exe startC:\Program Files (x86)\LP\71E1\5CD.exe%C:\Program Files (x86)\LP\71E1
      2⤵
        PID:2832
      • C:\Users\Admin\AppData\Local\Temp\034c765777a259d37ce8b1d99d05f591.exe
        C:\Users\Admin\AppData\Local\Temp\034c765777a259d37ce8b1d99d05f591.exe startC:\Program Files (x86)\75CA5\lvvm.exe%C:\Program Files (x86)\75CA5
        2⤵
          PID:1080

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\17F75\5CA5.7F7

        Filesize

        996B

        MD5

        ed343d3183f47f870520ee780804ac4d

        SHA1

        75795351b9d7eb82a7a4416f48d97c3433a043f5

        SHA256

        b89d55894493a0408a0c5f2c269fb54344ae812eb40621462fa56ff3137c49a6

        SHA512

        ca66b37efc9c81a8fadf0afbebe4e2eea342a6aebd2c534a9780b8767ecc9f41c798c6af30d341b9d1cfebd15faec19c064eebf2f9f5eda34ad7aac9308ad91a

      • C:\Users\Admin\AppData\Roaming\17F75\5CA5.7F7

        Filesize

        600B

        MD5

        5c86abfbc24975887418e977d09ff104

        SHA1

        184f591c069c46519fc72d45938dafd64d8775a6

        SHA256

        9869172a06a08c4caad9b6ed2862d3f26cf39dee4e3a96fb4a2e61b3635a894b

        SHA512

        e5f2886e10a583946e17046400aa2e64e14d7482c5016c0d5830fbe27647b8c23a7e817ab4eb3f7b3bd6c94f93c872f58724ad410deff91cb811d59d102e95b0

      • C:\Users\Admin\AppData\Roaming\17F75\5CA5.7F7

        Filesize

        1KB

        MD5

        d46d1d57282bd92de4b429423bfaf518

        SHA1

        3ebdd4107f3b99222ca161bc560991531399838b

        SHA256

        abcb9081ddeaa56168a9d2ce69208dbf7d55ca6cde1ad16c2ed04adadd2e65f6

        SHA512

        171fac235a80ad969b894ae8a8e7f533f6a3eb7667494c09cb43c177f2814c266746cd6c462ebd8da7b245a1b39015a0d04edaf1d168c6b195e2b633e1e3df91

      • C:\Users\Admin\AppData\Roaming\17F75\5CA5.7F7

        Filesize

        300B

        MD5

        1135d1ce37d26c34be82491ee6a444e5

        SHA1

        15eba933473f64cf0d8b6aaee5237b64753deff0

        SHA256

        f7f29f2008d875fd37977ec957ab2e8b21527a79f692e8ac81a526b3d48df47b

        SHA512

        49431140082dde9eb45850ed36e9307708605388ac0442f34e8aa0951d841f3b525f020c5a39c8795c70d3b3ac484ceb347989bf44ccfd9a6b5a4773d371e6b2

      • memory/1080-117-0x0000000000400000-0x0000000000491000-memory.dmp

        Filesize

        580KB

      • memory/1080-222-0x0000000001E00000-0x0000000001F00000-memory.dmp

        Filesize

        1024KB

      • memory/1080-118-0x0000000001E00000-0x0000000001F00000-memory.dmp

        Filesize

        1024KB

      • memory/2312-219-0x0000000001D30000-0x0000000001E30000-memory.dmp

        Filesize

        1024KB

      • memory/2312-15-0x0000000000400000-0x0000000000491000-memory.dmp

        Filesize

        580KB

      • memory/2312-119-0x0000000000400000-0x0000000000491000-memory.dmp

        Filesize

        580KB

      • memory/2312-1-0x0000000000400000-0x0000000000491000-memory.dmp

        Filesize

        580KB

      • memory/2312-2-0x0000000001D30000-0x0000000001E30000-memory.dmp

        Filesize

        1024KB

      • memory/2312-271-0x0000000000400000-0x0000000000491000-memory.dmp

        Filesize

        580KB

      • memory/2312-272-0x0000000000400000-0x0000000000491000-memory.dmp

        Filesize

        580KB

      • memory/2832-13-0x0000000000400000-0x0000000000491000-memory.dmp

        Filesize

        580KB

      • memory/2832-14-0x0000000001DF0000-0x0000000001E69000-memory.dmp

        Filesize

        484KB