Analysis

  • max time kernel
    141s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    27-01-2024 05:12

General

  • Target

    795b658d0b24ee576ffcaecfca6e0e7d.exe

  • Size

    170KB

  • MD5

    795b658d0b24ee576ffcaecfca6e0e7d

  • SHA1

    b546d3c58eb6a3a9ca82ed18d3969706474934a1

  • SHA256

    7f5db97c477e0feb45031d61b6cb1a54da2e38afe6228db68ff0363445da8b55

  • SHA512

    4d4f8d95bd6a4fea71e761b8306d7fbd9f47f3c0d6f3a682ca52be047ecca62cf7910d41f2e29784575c5035ada0713261f4adbb935afb2029821271efe660e5

  • SSDEEP

    3072:DfLLXNjFCwEAHNcwNbBCcPcI3ZdlF1LS5aFZ0q4PMiXL8sUDIgqhloQt:bX9B1EAHawNlNp3/v1WMUtkiUW

Malware Config

Signatures

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Modifies registry class 36 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\795b658d0b24ee576ffcaecfca6e0e7d.exe
    "C:\Users\Admin\AppData\Local\Temp\795b658d0b24ee576ffcaecfca6e0e7d.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Users\Admin\AppData\Local\pw.exe
      "C:\Users\Admin\AppData\Local\pw.exe" /GAV C:\Users\Admin\AppData\Local\Temp\795b658d0b24ee576ffcaecfca6e0e7d.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1600

Network

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\pw.exe
    Filesize

    170KB

    MD5

    795b658d0b24ee576ffcaecfca6e0e7d

    SHA1

    b546d3c58eb6a3a9ca82ed18d3969706474934a1

    SHA256

    7f5db97c477e0feb45031d61b6cb1a54da2e38afe6228db68ff0363445da8b55

    SHA512

    4d4f8d95bd6a4fea71e761b8306d7fbd9f47f3c0d6f3a682ca52be047ecca62cf7910d41f2e29784575c5035ada0713261f4adbb935afb2029821271efe660e5

  • memory/1600-20-0x0000000000400000-0x0000000000535000-memory.dmp
    Filesize

    1.2MB

  • memory/1600-27-0x0000000000400000-0x0000000000535000-memory.dmp
    Filesize

    1.2MB

  • memory/1600-21-0x0000000000400000-0x0000000000535000-memory.dmp
    Filesize

    1.2MB

  • memory/1600-23-0x0000000000400000-0x0000000000535000-memory.dmp
    Filesize

    1.2MB

  • memory/1600-22-0x0000000000400000-0x0000000000535000-memory.dmp
    Filesize

    1.2MB

  • memory/1600-33-0x0000000000400000-0x0000000000535000-memory.dmp
    Filesize

    1.2MB

  • memory/1600-16-0x0000000000400000-0x0000000000535000-memory.dmp
    Filesize

    1.2MB

  • memory/1600-18-0x0000000000400000-0x0000000000535000-memory.dmp
    Filesize

    1.2MB

  • memory/1600-19-0x0000000000400000-0x0000000000535000-memory.dmp
    Filesize

    1.2MB

  • memory/1600-30-0x0000000000400000-0x0000000000535000-memory.dmp
    Filesize

    1.2MB

  • memory/1600-29-0x0000000000400000-0x0000000000535000-memory.dmp
    Filesize

    1.2MB

  • memory/1600-28-0x0000000000400000-0x0000000000535000-memory.dmp
    Filesize

    1.2MB

  • memory/1600-26-0x0000000000400000-0x0000000000535000-memory.dmp
    Filesize

    1.2MB

  • memory/1600-24-0x0000000000400000-0x0000000000535000-memory.dmp
    Filesize

    1.2MB

  • memory/1600-25-0x0000000000400000-0x0000000000535000-memory.dmp
    Filesize

    1.2MB

  • memory/1720-5-0x0000000000400000-0x0000000000535000-memory.dmp
    Filesize

    1.2MB

  • memory/1720-3-0x0000000000250000-0x0000000000276000-memory.dmp
    Filesize

    152KB

  • memory/1720-0-0x0000000000400000-0x0000000000535000-memory.dmp
    Filesize

    1.2MB

  • memory/1720-2-0x0000000000400000-0x0000000000535000-memory.dmp
    Filesize

    1.2MB

  • memory/1720-1-0x0000000000400000-0x0000000000535000-memory.dmp
    Filesize

    1.2MB

  • memory/1720-15-0x0000000002610000-0x0000000002745000-memory.dmp
    Filesize

    1.2MB