Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
25-03-2024 10:26
Static task
static1
Behavioral task
behavioral1
Sample
ddc8c6bfca5f5c829a21f8f313e23a47.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
ddc8c6bfca5f5c829a21f8f313e23a47.exe
Resource
win10v2004-20240226-en
General
-
Target
ddc8c6bfca5f5c829a21f8f313e23a47.exe
-
Size
96KB
-
MD5
ddc8c6bfca5f5c829a21f8f313e23a47
-
SHA1
7d18f0fccd1377c5c524a1967e2a854e99b8a5ec
-
SHA256
ba7f1a5beec90cbf6d7e595655de8db689c09d258306b4f8bb90653c4c622f89
-
SHA512
c319d9df21f8d92f2b783e2beecbfd29be57f482bf66ddf9c858601a834ad12d01e74589828794181e0bc62cc037920e8f1d419f15466363dc48d5659175b424
-
SSDEEP
1536:y1BRQnHJ51D1p7wi16a2s6vh6u3bpMg1OKQe9V+HQmcYmfzj9zgx6:yyDpEi16L33bZYzU5K6
Malware Config
Signatures
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
ddc8c6bfca5f5c829a21f8f313e23a47.exepid process 1996 ddc8c6bfca5f5c829a21f8f313e23a47.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1996-0-0x0000000000230000-0x0000000000234000-memory.dmpFilesize
16KB
-
memory/1996-1-0x0000000010000000-0x0000000010017000-memory.dmpFilesize
92KB
-
memory/1996-4-0x0000000000400000-0x0000000000507000-memory.dmpFilesize
1.0MB
-
memory/1996-7-0x0000000000230000-0x0000000000234000-memory.dmpFilesize
16KB