Analysis

  • max time kernel
    141s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    06/01/2024, 04:23

General

  • Target

    45458ac0ec91f87d1e40d3acb07cc8c6.exe

  • Size

    197KB

  • MD5

    45458ac0ec91f87d1e40d3acb07cc8c6

  • SHA1

    c213d5f72a5e0fbf8edea5f14d6b5b708ecc2cd0

  • SHA256

    eb11a05c6fbcc952b70fed09cbd261ad621bcb72c7a331443cf78d0f80856766

  • SHA512

    a522351cda320c3832a4c5b40bf7233fccdd011aace6259b8d54f35b5fad902f395d71bafd660e011b0c4dc57b9c21bbfd82e699e68b2afc0d34fcab2ca8e9d6

  • SSDEEP

    6144:zB2lqmTozJQgPv7x8aTyOwjoJyT1IirEiJWbx:zmUlpTPAgyTLEiJYx

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\45458ac0ec91f87d1e40d3acb07cc8c6.exe
    "C:\Users\Admin\AppData\Local\Temp\45458ac0ec91f87d1e40d3acb07cc8c6.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2108
    • C:\Users\Admin\AppData\Local\Temp\45458ac0ec91f87d1e40d3acb07cc8c6.exe
      C:\Users\Admin\AppData\Local\Temp\45458ac0ec91f87d1e40d3acb07cc8c6.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft
      2⤵
        PID:2984
      • C:\Users\Admin\AppData\Local\Temp\45458ac0ec91f87d1e40d3acb07cc8c6.exe
        C:\Users\Admin\AppData\Local\Temp\45458ac0ec91f87d1e40d3acb07cc8c6.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
        2⤵
          PID:2156

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\C02D.64E

        Filesize

        1KB

        MD5

        a05959df2533474cc59b1d560738c10f

        SHA1

        b6ea37b596a4bb04ed408df774a6b106757b05ba

        SHA256

        0cde4ea238b41f17a5fb2c689d4a7c6dacad37ff6fcdd8af679803e9d273bb4b

        SHA512

        8cb8f2afe3595093988fc3a9a6dc6b559735c1e4ab396bf1d3be995aaf7e2078b79f46f30c17f757f770054aca2504a1f8e3af074bb4947156e7ab7038c6a7ae

      • memory/2108-2-0x0000000000550000-0x0000000000650000-memory.dmp

        Filesize

        1024KB

      • memory/2108-1-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2108-70-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2108-79-0x0000000000550000-0x0000000000650000-memory.dmp

        Filesize

        1024KB

      • memory/2108-78-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2108-173-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2156-77-0x000000000029B000-0x00000000002C7000-memory.dmp

        Filesize

        176KB

      • memory/2156-76-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2984-13-0x00000000005BB000-0x00000000005E7000-memory.dmp

        Filesize

        176KB

      • memory/2984-12-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB