Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25-01-2024 13:45

General

  • Target

    74d87d58cb074298a76acf835d0af98f.exe

  • Size

    48KB

  • MD5

    74d87d58cb074298a76acf835d0af98f

  • SHA1

    355be0484ce416354f196e5e41938352636f31c1

  • SHA256

    8f834e363ced478910b3238b40f59ad53ba976c3bcb6100e3528b1ed98762a92

  • SHA512

    26324a8929fcd04155a4d98139d6fa8d995059cddb59f546bf4e9d16eb90a3e1db1e1f04df369c69b3a4e334b8886c9d3d957e81021d12a2b68ce6df63667bf8

  • SSDEEP

    768:T/xb/wki9VkSGeGOWlZe9KjGUASTp6/4+wBmwdT+5Nu:T/xD0LpGedgZeUpnTp04+kf1yNu

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\74d87d58cb074298a76acf835d0af98f.exe
    "C:\Users\Admin\AppData\Local\Temp\74d87d58cb074298a76acf835d0af98f.exe"
    1⤵
    • Modifies firewall policy service
    • Checks BIOS information in registry
    PID:2068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2068-1-0x0000000000400000-0x000000000145A000-memory.dmp

    Filesize

    16.4MB

  • memory/2068-2-0x0000000000400000-0x000000000145A000-memory.dmp

    Filesize

    16.4MB

  • memory/2068-3-0x0000000000400000-0x000000000145A000-memory.dmp

    Filesize

    16.4MB

  • memory/2068-4-0x0000000000400000-0x000000000145A000-memory.dmp

    Filesize

    16.4MB

  • memory/2068-8-0x0000000000400000-0x000000000145A000-memory.dmp

    Filesize

    16.4MB

  • memory/2068-12-0x0000000000400000-0x000000000145A000-memory.dmp

    Filesize

    16.4MB

  • memory/2068-16-0x0000000000400000-0x000000000145A000-memory.dmp

    Filesize

    16.4MB