Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    20/05/2024, 01:09

General

  • Target

    7834c9c965e64862326bc64f5b81eae81718b230483f1dfcffa25c2d824d8cc7.exe

  • Size

    149KB

  • MD5

    43eb1ebf94850c08c0f4bdb842586cc7

  • SHA1

    6e19ce4203e50647668a64553e663156454de876

  • SHA256

    7834c9c965e64862326bc64f5b81eae81718b230483f1dfcffa25c2d824d8cc7

  • SHA512

    7f9e1eef7c0cad98a30716f1807a3111b6131ec869a9d00d6471f67e88944c871228256fa7c502f15b338483c388d21f9786b1293e820a4bf39c1dfa66bff617

  • SSDEEP

    3072:VLzmQtOI1bffh740dJ56VNpVN+YhSdZWO1pwTDSTzTwEKptPSwQz:D1GVNpVN+YhSdZWO1pwTDSTzsEKLh

Score
9/10

Malware Config

Signatures

  • Detect binaries embedding considerable number of MFA browser extension IDs. 1 IoCs
  • Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs. 1 IoCs
  • Detects executables packed with ConfuserEx Mod 1 IoCs
  • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7834c9c965e64862326bc64f5b81eae81718b230483f1dfcffa25c2d824d8cc7.exe
    "C:\Users\Admin\AppData\Local\Temp\7834c9c965e64862326bc64f5b81eae81718b230483f1dfcffa25c2d824d8cc7.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1280

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1280-0-0x000007FEF58A3000-0x000007FEF58A4000-memory.dmp

    Filesize

    4KB

  • memory/1280-1-0x0000000000A60000-0x0000000000A8C000-memory.dmp

    Filesize

    176KB

  • memory/1280-2-0x000007FEF58A0000-0x000007FEF628C000-memory.dmp

    Filesize

    9.9MB

  • memory/1280-3-0x000007FEF58A0000-0x000007FEF628C000-memory.dmp

    Filesize

    9.9MB