Analysis

  • max time kernel
    0s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-01-2024 05:01

General

  • Target

    42d222cfe08a8e609a71630308920e58.exe

  • Size

    194KB

  • MD5

    42d222cfe08a8e609a71630308920e58

  • SHA1

    764114e089c49036c692a898fbffa02a6b911e8a

  • SHA256

    ddb4a02eb9092efaf14750423a5d1c2b76e34c586ef6499891e1d1875770ce08

  • SHA512

    32c2b6da0d26b1efd534b1b6492854dd44da339d1b27d2604b9f7f1d3c5c519cc3bd8b7d1ee33daa96816e073e8fca613dfcd80a577e10262a8df051bd562a60

  • SSDEEP

    3072:hn1/uEAgDPdkBlyFZ+ScjaiKWbETBquAEXlqsUUTzwQRvEZ9yu:h1OgDPdkBAFZWjadD4s5TzHELP

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\42d222cfe08a8e609a71630308920e58.exe
    "C:\Users\Admin\AppData\Local\Temp\42d222cfe08a8e609a71630308920e58.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:540
    • C:\Users\Admin\AppData\Local\Temp\7zS4B03.tmp\50fb742d02760.exe
      .\50fb742d02760.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2284

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2284-74-0x00000000744B0000-0x00000000744BA000-memory.dmp

    Filesize

    40KB