Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28-01-2024 23:47
Static task
static1
Behavioral task
behavioral1
Sample
7e52a8ea6d5e74171fc139b8a44c4f2b.exe
Resource
win7-20231215-en
General
-
Target
7e52a8ea6d5e74171fc139b8a44c4f2b.exe
-
Size
519KB
-
MD5
7e52a8ea6d5e74171fc139b8a44c4f2b
-
SHA1
bb07e01794eab7d9691862c486519706f9520122
-
SHA256
087463d769d4bacbde05c6c64d54123fc50148ef081f643b29cb057cd61771e8
-
SHA512
787f48ff7a6cb9508d9d6b7bfc627dd279533c2b56aa1ccbbbe4c96e8ed5fd1f957047d819e3354c3a281dabade90a9115bc18b57fc9c476c2ee0fc78dd1377c
-
SSDEEP
12288:XYONCsypxWpFogCZhsjMnw8opmAk8BDj/r1MywS/r3o:XRypxUoRigTobk8BDjhMy
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 freegeoip.app 5 freegeoip.app -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
7e52a8ea6d5e74171fc139b8a44c4f2b.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 7e52a8ea6d5e74171fc139b8a44c4f2b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 7e52a8ea6d5e74171fc139b8a44c4f2b.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
7e52a8ea6d5e74171fc139b8a44c4f2b.exepid process 1340 7e52a8ea6d5e74171fc139b8a44c4f2b.exe 1340 7e52a8ea6d5e74171fc139b8a44c4f2b.exe 1340 7e52a8ea6d5e74171fc139b8a44c4f2b.exe 1340 7e52a8ea6d5e74171fc139b8a44c4f2b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
7e52a8ea6d5e74171fc139b8a44c4f2b.exedescription pid process Token: SeDebugPrivilege 1340 7e52a8ea6d5e74171fc139b8a44c4f2b.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397B
MD512d7ead3760f5820a2e5bb5c8f12d906
SHA188cd1bdbef851f7584690df3c5d53b61e77feab5
SHA25654d98aa537d81c8ec8189d212c0e052c3f2dd5002557871eab4ec5915869e528
SHA51295cfba0bc74c3894e9fa3540d36933ae0bffea8c7303ef1c91a72a69401749759fda03fb233a24fbaacc3afb256f98c7b54277c54019b7ef8a4bf42dd3dbe4b7