Analysis

  • max time kernel
    134s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/01/2024, 08:23

General

  • Target

    5ac24d99b6e5d32fc10d6b0a13424fe0.exe

  • Size

    1.6MB

  • MD5

    5ac24d99b6e5d32fc10d6b0a13424fe0

  • SHA1

    4ee51df6c856c10c8db4f4828be84bd2848bebc6

  • SHA256

    66c0e1c38b514a0fd9ca718394ae0cda77073489fcc53845612a95319881f87d

  • SHA512

    0b65987f61f97ad8dadf6f431fbaade601837483ff42be84e2017f693ec3d3e14ef91ffa1045fc647ab29986cca297cb2d59131c416392564a5202dbf67c1d95

  • SSDEEP

    49152:L/fwhofLeH4si17tnyKl6ZAZ5a0mLTqmrK:LwhweHxiUMaxq

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5ac24d99b6e5d32fc10d6b0a13424fe0.exe
    "C:\Users\Admin\AppData\Local\Temp\5ac24d99b6e5d32fc10d6b0a13424fe0.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3948
    • C:\Users\Admin\AppData\Local\Temp\5ac24d99b6e5d32fc10d6b0a13424fe0.exe
      "C:\Users\Admin\AppData\Local\Temp\5ac24d99b6e5d32fc10d6b0a13424fe0.exe" /wrapper /dir="C:\Users\Admin\AppData\Local\Temp\pkg_81841d70"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:624

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\pkg_81841d70\autorun.txt

    Filesize

    102B

    MD5

    834b758065451783af53aa6a8caef456

    SHA1

    f6dcb7caddd5d1e2b4dc35978a3fa22cbed613b3

    SHA256

    d90fd675c7329618e7ca76d5f70df0e2a6163bb4d92dfe4afaa411a5d7d97f8d

    SHA512

    f641487e3334eba3dcdba2968bd08aba44bc4d520f2f9be9d2487642d81109c16f7c79c46eb47e4307689c863c277458fe675e86ae1de2eca1b42fae9e2c6b4f

  • C:\Users\Admin\AppData\Local\Temp\pkg_81841d70\wrapper.xml

    Filesize

    798B

    MD5

    1d45a29e3511b982a1f91b33c70e964f

    SHA1

    176a47b489be3f27dc354a2b9dd0b580bb2f3904

    SHA256

    0a69c29fe16727b18425df8ded1cfe9d07a380b9f23f1beb32f60fefc000b3dc

    SHA512

    c574719f56a9cc0a3c393001f0774a5826afa5972906d9d9d214a183724a9f7226483a7181a0030e0f801b481a19957761efc170a10850aec786623eb939eb69