Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    07/05/2024, 17:44

General

  • Target

    d34293c39969319cab15fe278f8fcb7291367a1716853c858dc197c74ce8e6da.exe

  • Size

    696KB

  • MD5

    f47dc2b6eb1db9add1aa892befed2e82

  • SHA1

    a2b7d487b47a0c14c44cbe43b633f7c3f4027dc9

  • SHA256

    d34293c39969319cab15fe278f8fcb7291367a1716853c858dc197c74ce8e6da

  • SHA512

    08c917df2fbe944358a745b000f5fad9341c58e02c82c8d27d966b2a4ea34f0114ae284dee4df0b2b1a68f8e60575f1638162911fa4e4318d56f992657620f2d

  • SSDEEP

    12288:5YEV/A//ycp3oDo1muhEiMoPPSWPkLgog9v8e8:5nhA/qcp3L1GiMoHvR

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d34293c39969319cab15fe278f8fcb7291367a1716853c858dc197c74ce8e6da.exe
    "C:\Users\Admin\AppData\Local\Temp\d34293c39969319cab15fe278f8fcb7291367a1716853c858dc197c74ce8e6da.exe"
    1⤵
    • Checks computer location settings
    PID:2932

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads