Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19-03-2024 11:04
Static task
static1
Behavioral task
behavioral1
Sample
d5f39b054b2c8a6a934da29216a022cd.exe
Resource
win7-20240221-en
General
-
Target
d5f39b054b2c8a6a934da29216a022cd.exe
-
Size
26KB
-
MD5
d5f39b054b2c8a6a934da29216a022cd
-
SHA1
388eb7449f62954c0960789fc0720477375a5e70
-
SHA256
0ccfe06ac990fdbe3f7b9d287ccf56a3be8bc11dc6c86360a4e871ab613ea098
-
SHA512
21acee5853e00f56374845f3bf30c0bb041cfe681f0aca53f1302e5bfd7e61582d2c0575556bd54e21032043aa00f9c42db9869c9ef6da4bd793ee7ebfd6c460
-
SSDEEP
384:aaOWnXTqMGDdFSUUUJ9x2GmddLSvq6redjaoa3GZXeGhVKjSDNgn76l7c3WW+W8:r3XTEDyY8ddeyMe5a3IeOMtn76l7iWH
Malware Config
Signatures
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString d5f39b054b2c8a6a934da29216a022cd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier d5f39b054b2c8a6a934da29216a022cd.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 d5f39b054b2c8a6a934da29216a022cd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3300 d5f39b054b2c8a6a934da29216a022cd.exe 3300 d5f39b054b2c8a6a934da29216a022cd.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5382d7aac9b1bd969cfb0dd6c6a6e77e2
SHA1812a48d167a0d40051617ab70025b4174ba40964
SHA25697c1fc71b4d49b953a5f7bb7a03566ebe1a1dd81eeb43c6e6e402946f1eeec93
SHA5129968706f7b7aa7805fc754425e327184e1011ca8930ea8f2b8c3893808d7a4f6e0fa0a90dc313c326657adff35956929a0cf9228e2762a1a5bc69fbba6fe834f