Analysis
-
max time kernel
92s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28-01-2024 23:47
Static task
static1
Behavioral task
behavioral1
Sample
7e52a8ea6d5e74171fc139b8a44c4f2b.exe
Resource
win7-20231215-en
General
-
Target
7e52a8ea6d5e74171fc139b8a44c4f2b.exe
-
Size
519KB
-
MD5
7e52a8ea6d5e74171fc139b8a44c4f2b
-
SHA1
bb07e01794eab7d9691862c486519706f9520122
-
SHA256
087463d769d4bacbde05c6c64d54123fc50148ef081f643b29cb057cd61771e8
-
SHA512
787f48ff7a6cb9508d9d6b7bfc627dd279533c2b56aa1ccbbbe4c96e8ed5fd1f957047d819e3354c3a281dabade90a9115bc18b57fc9c476c2ee0fc78dd1377c
-
SSDEEP
12288:XYONCsypxWpFogCZhsjMnw8opmAk8BDj/r1MywS/r3o:XRypxUoRigTobk8BDjhMy
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 6 freegeoip.app 7 freegeoip.app -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
7e52a8ea6d5e74171fc139b8a44c4f2b.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 7e52a8ea6d5e74171fc139b8a44c4f2b.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 7e52a8ea6d5e74171fc139b8a44c4f2b.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
7e52a8ea6d5e74171fc139b8a44c4f2b.exepid process 3452 7e52a8ea6d5e74171fc139b8a44c4f2b.exe 3452 7e52a8ea6d5e74171fc139b8a44c4f2b.exe 3452 7e52a8ea6d5e74171fc139b8a44c4f2b.exe 3452 7e52a8ea6d5e74171fc139b8a44c4f2b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
7e52a8ea6d5e74171fc139b8a44c4f2b.exedescription pid process Token: SeDebugPrivilege 3452 7e52a8ea6d5e74171fc139b8a44c4f2b.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a393cbef7b747d4dbc567f2179aee427
SHA14992c3bbf398ab5bd126a0f1931a76553fc4f056
SHA256fe8f804d0decfec3ecd4fd6e1600944102bc6ef19766e0a89a0eb1dbcb45eefc
SHA5123f7bb515dc180a6dbc45d044bd0ea95250539edbc4a07b32087e96a3ddd2a36577b97cd0056d003f3404f48d8dd2a00e5a115fed30b9eaf169f9b893bf4963ad