Analysis

  • max time kernel
    140s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 01:13

General

  • Target

    09b58aa45b6f20e01306ed429c389dc0.exe

  • Size

    1.0MB

  • MD5

    09b58aa45b6f20e01306ed429c389dc0

  • SHA1

    6cdc0c487ecb7d6dc216ae9e9db84fe8e6282178

  • SHA256

    14357c3c693fc3d373615e7404659f3c74430e5172f38d40b29b679568593d5c

  • SHA512

    a7a4183ac69ad1e4f5bbea6544b3fb101f9978d615961f6b14f07ed72cd4cb22666f567724257a01f4f46db4c36bbc21a4192a215d1ff81d49cb52cb2f5a6477

  • SSDEEP

    24576:KUDrUESIbjror2ahLIYOPJPiKY2houGHox6Hk+UcwlyV0:gpI7ohUYOPcL2hbkKYUO

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 36 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\09b58aa45b6f20e01306ed429c389dc0.exe
    "C:\Users\Admin\AppData\Local\Temp\09b58aa45b6f20e01306ed429c389dc0.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1248

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\deprecated.cookie

          Filesize

          91B

          MD5

          99bde3452748e34d6c50275110a6a8d4

          SHA1

          e79cb2a8db7d8490523529d3861f95ba73a20c23

          SHA256

          d07311acf641866e7e84823d2962f593bb655792301dc61ad6f0c6869d9c5937

          SHA512

          19fd529c6fe60bbbe3710fed93f14d723a13ad427431f855ed84f5e5e496b9f3eb8a6e8c31d740239eb225753d52a4f464b489fdbdeff4477480026263d0f691

        • memory/1248-0-0x00000000002E0000-0x0000000000587000-memory.dmp

          Filesize

          2.7MB

        • memory/1248-2-0x00000000002E0000-0x0000000000587000-memory.dmp

          Filesize

          2.7MB

        • memory/1248-12-0x00000000002E0000-0x0000000000587000-memory.dmp

          Filesize

          2.7MB

        • memory/1248-13-0x00000000002E0000-0x0000000000587000-memory.dmp

          Filesize

          2.7MB

        • memory/1248-14-0x00000000002E0000-0x0000000000587000-memory.dmp

          Filesize

          2.7MB

        • memory/1248-15-0x00000000002E0000-0x0000000000587000-memory.dmp

          Filesize

          2.7MB

        • memory/1248-16-0x00000000002E0000-0x0000000000587000-memory.dmp

          Filesize

          2.7MB

        • memory/1248-21-0x00000000002E0000-0x0000000000587000-memory.dmp

          Filesize

          2.7MB

        • memory/1248-22-0x00000000002E0000-0x0000000000587000-memory.dmp

          Filesize

          2.7MB