Analysis

  • max time kernel
    117s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    08/01/2024, 20:54

General

  • Target

    4c6e52ffb980ec98b166ece5307c4000.exe

  • Size

    379KB

  • MD5

    4c6e52ffb980ec98b166ece5307c4000

  • SHA1

    8219ad80a4a752ecef4c9d0c05fd9b1affe24e92

  • SHA256

    2da883bb2fbe127fee1ecfb7e6059e6cf4d65b047543ffb885d75debb3e0bc46

  • SHA512

    5f975c84b141631c318d21ffa48bd295c1c87903eec93bd251fdcb2128ce28aeae7aa681e7e655eb2cab3232064b35c94978b3dedf57fd68ad61632501290ab5

  • SSDEEP

    6144:G+qn/00gA1pJzXsWuTHgU9xGJRKeOGDykNwS1F8kqslg92YAoS0LE6:gs03z8tgkGJRxpw4osO2JoS0LE6

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4c6e52ffb980ec98b166ece5307c4000.exe
    "C:\Users\Admin\AppData\Local\Temp\4c6e52ffb980ec98b166ece5307c4000.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1728
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\83.bat
      2⤵
        PID:2760

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\63485.exe

            Filesize

            379KB

            MD5

            4c6e52ffb980ec98b166ece5307c4000

            SHA1

            8219ad80a4a752ecef4c9d0c05fd9b1affe24e92

            SHA256

            2da883bb2fbe127fee1ecfb7e6059e6cf4d65b047543ffb885d75debb3e0bc46

            SHA512

            5f975c84b141631c318d21ffa48bd295c1c87903eec93bd251fdcb2128ce28aeae7aa681e7e655eb2cab3232064b35c94978b3dedf57fd68ad61632501290ab5

          • C:\Users\Admin\AppData\Local\Temp\83.bat

            Filesize

            174B

            MD5

            c242727e5cab894029f63365d39e8c60

            SHA1

            886a3e2cb4e649554f47faf1ad949b61c14c367f

            SHA256

            4838fda2e608c2f1bcac30453ef00b68aa14b1a8302f7ffb3eecd7888b6c113d

            SHA512

            022c6aa4963c864a6556b8091b8c4335647247f4d4be20cb462dc6085127ec1387b725aa1e79ab091b4600908c9b3f1fa37e77c79b0f2169904af784de837004

          • memory/1728-0-0x0000000001300000-0x000000000143B000-memory.dmp

            Filesize

            1.2MB

          • memory/1728-9-0x0000000001300000-0x000000000143B000-memory.dmp

            Filesize

            1.2MB