Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 15:49

General

  • Target

    7a3ed6fba808a21b9039707576fa44b7.exe

  • Size

    94KB

  • MD5

    7a3ed6fba808a21b9039707576fa44b7

  • SHA1

    7566fe21985336c405de9f0c9ec4bc6edd51e61a

  • SHA256

    55ec448013b3a80bd06e0621065671e90135679d284a9179fc7c05421e8292ee

  • SHA512

    79c09d53eca88767d663d9d291243c1fe9fe115ab6d0447e1ca0fc8fd52240b126081edb74ccf3b62068fd18afea60dfdccb6a12c3d74fbf4e18b8821fa15005

  • SSDEEP

    1536:5lrsicagdzn8K2ariPOcjk+XQuPVN72NMScBLf9B2Zc9Mgblffsi2tX:5JjcF8KfCOcjk+guPVjS4rPbygbtfsnX

Score
7/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7a3ed6fba808a21b9039707576fa44b7.exe
    "C:\Users\Admin\AppData\Local\Temp\7a3ed6fba808a21b9039707576fa44b7.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    PID:2280

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\macromd\AIM Account Stealer.exe

    Filesize

    75KB

    MD5

    d563d7a644f801a130833e32e241e5e5

    SHA1

    f9ce0749703c91c166c70284e0b542682af4c63c

    SHA256

    ccb4a86606de6f730ae270029de40b936b01a8b274a6d2163307ff738e148878

    SHA512

    299c1fa57d2654b50dace0a75787bef008425a46c9f834100198fc55084ae84d6c9ece854a3aad4b14f9a10da485f372aa54e8310afa258c0ecc713845d026bd

  • memory/2280-0-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/2280-34-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB