Analysis

  • max time kernel
    155s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/02/2024, 07:49

General

  • Target

    86552866d14bb032a92d3d80b7b31929.exe

  • Size

    878KB

  • MD5

    86552866d14bb032a92d3d80b7b31929

  • SHA1

    66b9006323c3ada3851468bace5c1e0df7dc0b31

  • SHA256

    ae7dbd2586471669127e85f994e87b628876aac2b5f7a33738c82dc7cd4fb8b1

  • SHA512

    27c2eab6cdeb98e314e00a5e4216c1da010f9f2692153b662a04a224c937867ee1150f0ee4b3cbc3f8be313546923020970101b84ed6a6ba5b6829aafda23a27

  • SSDEEP

    24576:e3pRurPdW79gz4ptp/zLzuBDWTS3pTik2q:e3pRWy3pPzmhZTik2

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 14 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\86552866d14bb032a92d3d80b7b31929.exe
    "C:\Users\Admin\AppData\Local\Temp\86552866d14bb032a92d3d80b7b31929.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetWindowsHookEx
    PID:724

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\x3x6afp6.default-release\prefs.js

          Filesize

          6KB

          MD5

          439ce91350c31426577c56e0644e99ec

          SHA1

          9626d8f03c8913ae25e7a6cd8df614550444d98f

          SHA256

          48c22daf9bd8bc0f5acb5799832e30b18036754a92d2159388725e6602fe8e81

          SHA512

          db8efe35bae184c4dac417686a87d64c9345e0377fb8f8a873fd4902b9ab4d03c0746210a4587765c570e757510d40361bfd778f85c0267aa99ea41b887e2ab9

        • memory/724-14-0x0000000000400000-0x0000000000837000-memory.dmp

          Filesize

          4.2MB

        • memory/724-1-0x0000000000400000-0x0000000000837000-memory.dmp

          Filesize

          4.2MB

        • memory/724-3-0x0000000003150000-0x0000000003151000-memory.dmp

          Filesize

          4KB

        • memory/724-0-0x0000000000400000-0x0000000000837000-memory.dmp

          Filesize

          4.2MB

        • memory/724-6-0x0000000000400000-0x0000000000837000-memory.dmp

          Filesize

          4.2MB

        • memory/724-7-0x0000000000400000-0x0000000000837000-memory.dmp

          Filesize

          4.2MB

        • memory/724-11-0x0000000000400000-0x0000000000837000-memory.dmp

          Filesize

          4.2MB

        • memory/724-12-0x0000000000400000-0x0000000000837000-memory.dmp

          Filesize

          4.2MB

        • memory/724-2-0x0000000000400000-0x0000000000837000-memory.dmp

          Filesize

          4.2MB

        • memory/724-13-0x0000000003150000-0x0000000003151000-memory.dmp

          Filesize

          4KB

        • memory/724-5-0x0000000000400000-0x0000000000837000-memory.dmp

          Filesize

          4.2MB

        • memory/724-19-0x0000000000400000-0x0000000000837000-memory.dmp

          Filesize

          4.2MB

        • memory/724-22-0x0000000000400000-0x0000000000837000-memory.dmp

          Filesize

          4.2MB

        • memory/724-28-0x0000000000400000-0x0000000000837000-memory.dmp

          Filesize

          4.2MB

        • memory/724-31-0x0000000000400000-0x0000000000837000-memory.dmp

          Filesize

          4.2MB

        • memory/724-34-0x0000000000400000-0x0000000000837000-memory.dmp

          Filesize

          4.2MB

        • memory/724-37-0x0000000000400000-0x0000000000837000-memory.dmp

          Filesize

          4.2MB

        • memory/724-41-0x0000000000400000-0x0000000000837000-memory.dmp

          Filesize

          4.2MB

        • memory/724-49-0x0000000000400000-0x0000000000837000-memory.dmp

          Filesize

          4.2MB