Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-12-2023 08:18

General

  • Target

    5f3cdc324eaefcd41a9f2371324a26be.exe

  • Size

    537KB

  • MD5

    5f3cdc324eaefcd41a9f2371324a26be

  • SHA1

    da70e3b6fc5f6bd45c01fff7311101b0b97292fa

  • SHA256

    e54c3bd97cfd1ac62501125d935336cb3b14da35df4a86233bdeac7d1bb2046c

  • SHA512

    482ab71e7aa6fbc734bff6c7f6c2dd8a2aec1407bd1aace03df3d9b8e27c03b2e19bc1b60ec135da22cd53af913f92db9f33ec3a3951303801a6e405c746ecaf

  • SSDEEP

    12288:+kwmrSeHxLzib69z4DiS9sknYTgtmZe9MaP/53vCMMjY:hCesb0zo7NYTgwebP/5aMMjY

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 19 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5f3cdc324eaefcd41a9f2371324a26be.exe
    "C:\Users\Admin\AppData\Local\Temp\5f3cdc324eaefcd41a9f2371324a26be.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    PID:2416

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2416-0-0x0000000000400000-0x0000000000513000-memory.dmp

    Filesize

    1.1MB

  • memory/2416-2-0x0000000000400000-0x0000000000513000-memory.dmp

    Filesize

    1.1MB

  • memory/2416-15-0x0000000000B00000-0x0000000000B01000-memory.dmp

    Filesize

    4KB

  • memory/2416-1-0x0000000000400000-0x0000000000513000-memory.dmp

    Filesize

    1.1MB

  • memory/2416-157-0x0000000000400000-0x0000000000513000-memory.dmp

    Filesize

    1.1MB

  • memory/2416-158-0x0000000000400000-0x0000000000513000-memory.dmp

    Filesize

    1.1MB

  • memory/2416-160-0x0000000000400000-0x0000000000513000-memory.dmp

    Filesize

    1.1MB

  • memory/2416-159-0x0000000000400000-0x0000000000513000-memory.dmp

    Filesize

    1.1MB

  • memory/2416-161-0x0000000000B00000-0x0000000000B01000-memory.dmp

    Filesize

    4KB

  • memory/2416-162-0x0000000000400000-0x0000000000513000-memory.dmp

    Filesize

    1.1MB

  • memory/2416-163-0x0000000000400000-0x0000000000513000-memory.dmp

    Filesize

    1.1MB

  • memory/2416-164-0x0000000000400000-0x0000000000513000-memory.dmp

    Filesize

    1.1MB

  • memory/2416-166-0x0000000000400000-0x0000000000513000-memory.dmp

    Filesize

    1.1MB

  • memory/2416-167-0x0000000000400000-0x0000000000513000-memory.dmp

    Filesize

    1.1MB

  • memory/2416-168-0x0000000000400000-0x0000000000513000-memory.dmp

    Filesize

    1.1MB

  • memory/2416-169-0x0000000000400000-0x0000000000513000-memory.dmp

    Filesize

    1.1MB

  • memory/2416-170-0x0000000000400000-0x0000000000513000-memory.dmp

    Filesize

    1.1MB

  • memory/2416-171-0x0000000000400000-0x0000000000513000-memory.dmp

    Filesize

    1.1MB

  • memory/2416-172-0x0000000000400000-0x0000000000513000-memory.dmp

    Filesize

    1.1MB

  • memory/2416-173-0x0000000000400000-0x0000000000513000-memory.dmp

    Filesize

    1.1MB

  • memory/2416-174-0x0000000000400000-0x0000000000513000-memory.dmp

    Filesize

    1.1MB