Analysis
-
max time kernel
131s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/03/2024, 12:23
Static task
static1
Behavioral task
behavioral1
Sample
df267ec20a646ae08d4fedeb7da12b79.exe
Resource
win7-20240221-en
General
-
Target
df267ec20a646ae08d4fedeb7da12b79.exe
-
Size
453KB
-
MD5
df267ec20a646ae08d4fedeb7da12b79
-
SHA1
b319782a52165e0f8b7265595da74f70a8ce517a
-
SHA256
20d81969a7200db8ba6cb538368cc21a5f51ab6eae687713b6b548100e159343
-
SHA512
7ea5122025e969a9e8ecc968d087a6d0600aa6f1a3b6e58fae9bd70e29f6f6a68347e8f89b9c3d2c717be417963d33e98308f2b7b8565fa6833276275cbdb53e
-
SSDEEP
12288:4QUwe7QbXs0DcW+smXWvbSed/T7Sdabv8LhbQ:4QUWXBDcs/eeN6y+hbQ
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2144 df267ec20a646ae08d4fedeb7da12b79.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA df267ec20a646ae08d4fedeb7da12b79.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD5aa91818150cfadb667ae6f914d43dca0
SHA14411bd0038ccd464ed7597f0540cfe04867b9042
SHA2562aa71646493cf47b38be0920488159b154eaf19193dc4a6ecfa0a6509196c7c5
SHA512dd1310dc52bb6cc4977341dc34fb6a273e1349602a5fb3037e0b0d087b8f0d2d7a04e2db32e2708379758266c31422d27b5a35f5ba068cd7dbdd211b07893ecd
-
Filesize
977KB
MD5e142a0e9faebdc44d4b692e30827bd0f
SHA1ff83ff5dea3e3f2b75b6f2445fd74f12cdc4f9a4
SHA256fc0ef9bd7711fe39fc075d3d239cc14b293b775ecd42e735928b853f0f5c9a70
SHA51267c700f342ee2ae0f0c7d0ec84eac40356620c949b1b3e93fe83edff954a688d847e37be6150491e3f5580a9a419c028c9b35f8baa43455519e5a076527069ae