Analysis

  • max time kernel
    92s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/02/2024, 21:00

General

  • Target

    acd85327122c2ec03bc1dc278fdd5bb1.exe

  • Size

    636KB

  • MD5

    acd85327122c2ec03bc1dc278fdd5bb1

  • SHA1

    4a19ed25cb9b5a616d7d2093491382d297ba8b8b

  • SHA256

    bca8e56af03ebe6cd4f565066e6c677c696dc672577d90913471cb5964aa7540

  • SHA512

    487ed8f3914dc86e6d5dcbf4f3286c5092814f02daa212233f9bec53022e680a7e0d2ea9a8ed4b14ca3245e6bbe431371df07ba6bcf7e323b77e402651c85f39

  • SSDEEP

    6144:dZ7KogrkOsr9Pc2lrf2s6Ps/7CsEQDfKRyuMPPA6cNbdV+qjyjJNAySa:dKkOsBE2lrus6U/7CsEQQR7yjJNAy

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\acd85327122c2ec03bc1dc278fdd5bb1.exe
    "C:\Users\Admin\AppData\Local\Temp\acd85327122c2ec03bc1dc278fdd5bb1.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    PID:3952

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads