Analysis

  • max time kernel
    121s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2023 19:18

General

  • Target

    375c167fb1318b4d6df4820b73437cce.exe

  • Size

    605KB

  • MD5

    375c167fb1318b4d6df4820b73437cce

  • SHA1

    54f75637bc5cfbde5ad7d9420bc80d318a86ca8b

  • SHA256

    116e16389fc582618a35b36523b9705662b58f19566f66d58d2b81eb63e3a949

  • SHA512

    e2682d3063c4a7003e171e6e061e9ae1825f0a2fa8f1b2b1672148ed859ddf0c3dde7d972f0e7d82bf2fc499e397eb71762461fe1d6b2d1793769b1c5c852bcc

  • SSDEEP

    12288:IXlv+76kqxQ4zQIZ806w0TG+yCcBtOeLorSqlz+YBJTE5yR5kLqcFmqzociLH1:AQ4z9Z806FTGlT+e5YBJ1kL3Qmi1

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\375c167fb1318b4d6df4820b73437cce.exe
    "C:\Users\Admin\AppData\Local\Temp\375c167fb1318b4d6df4820b73437cce.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2532
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\74.bat
      2⤵
        PID:2732

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\43489.exe

      Filesize

      605KB

      MD5

      375c167fb1318b4d6df4820b73437cce

      SHA1

      54f75637bc5cfbde5ad7d9420bc80d318a86ca8b

      SHA256

      116e16389fc582618a35b36523b9705662b58f19566f66d58d2b81eb63e3a949

      SHA512

      e2682d3063c4a7003e171e6e061e9ae1825f0a2fa8f1b2b1672148ed859ddf0c3dde7d972f0e7d82bf2fc499e397eb71762461fe1d6b2d1793769b1c5c852bcc

    • C:\Users\Admin\AppData\Local\Temp\74.bat

      Filesize

      174B

      MD5

      5e79df682dcb14268533aa377c2612ba

      SHA1

      1656d9d82efd4e0811bf29a85d3e71e7edb98533

      SHA256

      a312a6a46fa0cf6ead77416d8b9f0db423cbae008cc5488d8651bfccf735d8bc

      SHA512

      677382e83f698e5da173fa3438988ae4b3d56584eb548aa1a600299abbb0a02ef732ffb747d0af99105d49833d39b359765588ebb4124b7162a69f854bdbe03d

    • memory/2532-0-0x0000000010000000-0x0000000010130000-memory.dmp

      Filesize

      1.2MB