Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    05/07/2024, 18:41

General

  • Target

    a76cc5f77ac3607e1252bc4a61bd7fd036646e0585736fa88a8961edb2b73aef.exe

  • Size

    452KB

  • MD5

    7439c3808f6f807008b772efadbe1b91

  • SHA1

    6db12fae968037afc24f9877656db62e990c9ad4

  • SHA256

    a76cc5f77ac3607e1252bc4a61bd7fd036646e0585736fa88a8961edb2b73aef

  • SHA512

    ddc00b2954bc5e0d67ce27075724bd25ab647acdfcf4f6cffd7eac4054e92ee52a5927cac3c8436151fc76378bf3c750ce864a8e00630cf6729a58fbfff53c99

  • SSDEEP

    6144:xZFexLB9Na/UCKvGAEFTJWha7s7lAOWCLt1mOqqQDbmKbFccNctzeyNTC+2yEGci:xZFUNoUrBRX7lewfQmKbUayNJnEGZ

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a76cc5f77ac3607e1252bc4a61bd7fd036646e0585736fa88a8961edb2b73aef.exe
    "C:\Users\Admin\AppData\Local\Temp\a76cc5f77ac3607e1252bc4a61bd7fd036646e0585736fa88a8961edb2b73aef.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2004-0-0x00000000745AE000-0x00000000745AF000-memory.dmp

    Filesize

    4KB

  • memory/2004-1-0x00000000002B0000-0x0000000000328000-memory.dmp

    Filesize

    480KB

  • memory/2004-2-0x00000000745A0000-0x0000000074C8E000-memory.dmp

    Filesize

    6.9MB

  • memory/2004-20-0x00000000745A0000-0x0000000074C8E000-memory.dmp

    Filesize

    6.9MB