Resubmissions

11/04/2024, 17:35

240411-v56xysbg2t 7

Analysis

  • max time kernel
    117s
  • max time network
    204s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/04/2024, 17:35

General

  • Target

    Setup.exe

  • Size

    3.2MB

  • MD5

    cbd28dd5f9bdb848926726b172124751

  • SHA1

    2854cf38e373a60a14927422c5a9de242695ce5b

  • SHA256

    275be7d414498ed841232cee005cb97dfc1c22977b841b72d674959629d5ce02

  • SHA512

    cc94dd7f248e0c539b75de318f5d9c2a25099e3d205beb437e426628c5170443ae68b275cab8870c042ea15d71367997633f592bbb761e9299a29a02f1b25fe3

  • SSDEEP

    49152:9DWX6UQASeBylX01L6FXA3XcNd2rcX9gUKkDg3PsFNBwi4clntJlMKWr/SALAqWy:9uWA+X4cjXki4clntJiKWz7LArcz

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Setup.exe
    "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    PID:4284
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:3104

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads