Analysis

  • max time kernel
    141s
  • max time network
    23s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    24-08-2024 18:40

General

  • Target

    a6cd30326df629e4cdc9657321fccbf6d49bd26a04e7c1c76658ca2c9b879d60.exe

  • Size

    6.3MB

  • MD5

    2d37e08a8184c8793e35483e207f4ce6

  • SHA1

    adc536549c656ed3d6afae9f8be19beaa8e1119a

  • SHA256

    a6cd30326df629e4cdc9657321fccbf6d49bd26a04e7c1c76658ca2c9b879d60

  • SHA512

    847b7d6f2a4795a5b02d3e4616238230f4502ec2b6dfcc113c46d41a10735f9593f154cf8dd37fafe77bd8444fa951eb5db11d377d34995e43a7b44b320e6d8f

  • SSDEEP

    196608:gNo9IGTkY+05LzF6N5jlXCaMM+JOBmE2S+JUVx:gNo9Iot+05LzF6N3Cal+JBE2S+JM

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a6cd30326df629e4cdc9657321fccbf6d49bd26a04e7c1c76658ca2c9b879d60.exe
    "C:\Users\Admin\AppData\Local\Temp\a6cd30326df629e4cdc9657321fccbf6d49bd26a04e7c1c76658ca2c9b879d60.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:824
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 824 -s 388
      2⤵
      • Program crash
      PID:1072

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/824-0-0x0000000000400000-0x000000000106A000-memory.dmp

    Filesize

    12.4MB

  • memory/824-1-0x0000000000400000-0x000000000106A000-memory.dmp

    Filesize

    12.4MB