Analysis

  • max time kernel
    141s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-06-2024 18:35

General

  • Target

    VirusShare_e9fb9aa84d4dce3fb2f842e55d072394.exe

  • Size

    512KB

  • MD5

    e9fb9aa84d4dce3fb2f842e55d072394

  • SHA1

    208dbcb50407f40915e063a4688ad32164925634

  • SHA256

    5d9b22e6ad1984c921cec4782695ced92fedb029fdc9a54251e006c97c734a5e

  • SHA512

    2c7a95d188d0b3aeb944b4fa4a24da0dbec97c336f819a8554c14e6a3a6498c3a77f3bda50a46853aa4e3addf62f8a1e3e8051b09d32f3351927dcc70da3e544

  • SSDEEP

    12288:aFX5C2MBw0BVwSyG/XgWU5KZDGBvQYOGaKW22RmWveNoS1:axb4NtgWUgZ6Bv5BW225

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 15 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\VirusShare_e9fb9aa84d4dce3fb2f842e55d072394.exe
    "C:\Users\Admin\AppData\Local\Temp\VirusShare_e9fb9aa84d4dce3fb2f842e55d072394.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    PID:3156

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3156-1-0x0000000000400000-0x000000000057C000-memory.dmp

    Filesize

    1.5MB

  • memory/3156-2-0x0000000000400000-0x000000000057C000-memory.dmp

    Filesize

    1.5MB

  • memory/3156-3-0x0000000000400000-0x000000000057C000-memory.dmp

    Filesize

    1.5MB

  • memory/3156-5-0x0000000000400000-0x000000000057C000-memory.dmp

    Filesize

    1.5MB

  • memory/3156-6-0x0000000000400000-0x000000000057C000-memory.dmp

    Filesize

    1.5MB

  • memory/3156-7-0x0000000000400000-0x000000000057C000-memory.dmp

    Filesize

    1.5MB

  • memory/3156-8-0x0000000000400000-0x000000000057C000-memory.dmp

    Filesize

    1.5MB

  • memory/3156-9-0x0000000000400000-0x000000000057C000-memory.dmp

    Filesize

    1.5MB

  • memory/3156-10-0x0000000000400000-0x000000000057C000-memory.dmp

    Filesize

    1.5MB

  • memory/3156-11-0x0000000000400000-0x000000000057C000-memory.dmp

    Filesize

    1.5MB

  • memory/3156-12-0x0000000000400000-0x000000000057C000-memory.dmp

    Filesize

    1.5MB

  • memory/3156-13-0x0000000000400000-0x000000000057C000-memory.dmp

    Filesize

    1.5MB

  • memory/3156-14-0x0000000000400000-0x000000000057C000-memory.dmp

    Filesize

    1.5MB

  • memory/3156-15-0x0000000000400000-0x000000000057C000-memory.dmp

    Filesize

    1.5MB

  • memory/3156-16-0x0000000000400000-0x000000000057C000-memory.dmp

    Filesize

    1.5MB