Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/02/2024, 02:49

General

  • Target

    aacee852488ed2bc855ec26c70c00d36.exe

  • Size

    388KB

  • MD5

    aacee852488ed2bc855ec26c70c00d36

  • SHA1

    fd7f596874543b6b84a9a1d169dfc42f46d7e0a4

  • SHA256

    6efbae25787b0d19612ea03d71831ff744605d5eae89c385ea46be30251315c0

  • SHA512

    0af8e88dc7500e672af1d21120a99eff36057296c49b2dd22ec0c911b9e56a7ef484ea6db8318ea66f523f554b70706f9c81fccc43064d092c353117adcfd52e

  • SSDEEP

    6144:q805yHbwOUo6RwLfurlHiIsmyh5yCuCak3vSGo4cFpdc/eekNpoSHzeeg:305OyrfRHiXhquv7Ypdc/eeqpoSTeeg

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aacee852488ed2bc855ec26c70c00d36.exe
    "C:\Users\Admin\AppData\Local\Temp\aacee852488ed2bc855ec26c70c00d36.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\562.bat
      2⤵
        PID:4804

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\562.bat

            Filesize

            175B

            MD5

            165a06cb34b43671361c4a2c42f50364

            SHA1

            d8d80dbd8a44e9b92bce82dd3b5932b2387f706e

            SHA256

            ef5d777e28722c5a4a17dfd0f1fbd86f57090315e85089187b16b2090ca18078

            SHA512

            6f8c3c858b52537f5dbf92818b4d7abc4c037918f91e1e288b0a6ad4089cc05ec2bb10405d068e1a7b9b415535bd3af04b698f0399b3048830d37b01a653d7d9

          • C:\Users\Admin\AppData\Local\Temp\63485.exe

            Filesize

            388KB

            MD5

            aacee852488ed2bc855ec26c70c00d36

            SHA1

            fd7f596874543b6b84a9a1d169dfc42f46d7e0a4

            SHA256

            6efbae25787b0d19612ea03d71831ff744605d5eae89c385ea46be30251315c0

            SHA512

            0af8e88dc7500e672af1d21120a99eff36057296c49b2dd22ec0c911b9e56a7ef484ea6db8318ea66f523f554b70706f9c81fccc43064d092c353117adcfd52e

          • memory/2368-0-0x00000000002A0000-0x00000000003F0000-memory.dmp

            Filesize

            1.3MB

          • memory/2368-6-0x00000000002A0000-0x00000000003F0000-memory.dmp

            Filesize

            1.3MB