Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    12/07/2024, 06:13

General

  • Target

    Sample.Picture.exe

  • Size

    1.6MB

  • MD5

    12c2de0cf5eb38984db8b3cd8a123151

  • SHA1

    da72e21c7a345bb2af8fbe0926862d6849bff468

  • SHA256

    66949b580772fd8b822a25efb149e18e335724cd6a3858f67c2fda9ff66a0c73

  • SHA512

    db43a4690ac4a1c9b68dcd3bb980c0e15fd04b79d1434a6c3677760d7bf412147b8d58f80753328112b37aed61ed4116705207c9b6c673cce4002550b6f25aea

  • SSDEEP

    24576:iea9rqGw1QRJhAGtyjHT9dBvG30u+FIc:+9wqhAGkNGUFIc

Score
7/10

Malware Config

Signatures

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Uses the VBS compiler for execution 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Sample.Picture.exe
    "C:\Users\Admin\AppData\Local\Temp\Sample.Picture.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2524
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      2⤵
        PID:2876
    • C:\Windows\SysWOW64\DllHost.exe
      C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
      1⤵
      • Suspicious use of FindShellTrayWindow
      PID:2108

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\lg-app-store.jpg

      Filesize

      220KB

      MD5

      7c23eac058545581e7d1c03fda81bfae

      SHA1

      6656e5fc6499a59dd6ccda95ed60a6c1282217ba

      SHA256

      757043e221acddb5d463bdf18a7110564ec0ac58f9bc09db1bdb1df0287f2383

      SHA512

      9e3beaadaa6260b800312958a71d4f42d4fba772e12d322c5dcf7188e38f61ebab1b38e4c69487a4f768ff839c7f978496606cdd668c9b8151dec87466c17e80

    • memory/2108-10-0x00000000000B0000-0x00000000000B2000-memory.dmp

      Filesize

      8KB

    • memory/2524-0-0x0000000074471000-0x0000000074472000-memory.dmp

      Filesize

      4KB

    • memory/2524-1-0x0000000074470000-0x0000000074A1B000-memory.dmp

      Filesize

      5.7MB

    • memory/2524-2-0x0000000074470000-0x0000000074A1B000-memory.dmp

      Filesize

      5.7MB

    • memory/2524-8-0x0000000074470000-0x0000000074A1B000-memory.dmp

      Filesize

      5.7MB

    • memory/2876-5-0x0000000000400000-0x000000000048E000-memory.dmp

      Filesize

      568KB

    • memory/2876-7-0x0000000000400000-0x000000000048E000-memory.dmp

      Filesize

      568KB

    • memory/2876-3-0x0000000000400000-0x000000000048E000-memory.dmp

      Filesize

      568KB

    • memory/2876-9-0x0000000002450000-0x0000000002452000-memory.dmp

      Filesize

      8KB

    • memory/2876-15-0x0000000000400000-0x000000000048E000-memory.dmp

      Filesize

      568KB