Analysis

  • max time kernel
    119s
  • max time network
    63s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    13/09/2024, 11:10

General

  • Target

    d64c3dcc9167ffd0c85b56f632a20760N.exe

  • Size

    165KB

  • MD5

    d64c3dcc9167ffd0c85b56f632a20760

  • SHA1

    f569350ce9d24f32e3a640d0daa254339498def8

  • SHA256

    f5f41418b145d2a919ee182a0d7023ac42f04dcf9bfdcc0a8f2e978daa697064

  • SHA512

    4e17ebcc9d41ce9d3b9a65daaf54ea602044ccc4125d411566655cd3051b12341ffdb3e7af958ef8251f260c8b87c637411ed9dbfecaab09ac69cd78f0e6a83f

  • SSDEEP

    3072:W4D2XlE8/xXR3HSBSsXGpMSYbJw+6WBMkZFb0rI79AlbAtid2+rBmrkdtC:W4iXlf/xXRiBNoWfxBRdClbAtm2WBm

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d64c3dcc9167ffd0c85b56f632a20760N.exe
    "C:\Users\Admin\AppData\Local\Temp\d64c3dcc9167ffd0c85b56f632a20760N.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1652
    • C:\Users\Admin\AppData\Local\Temp\d64c3dcc9167ffd0c85b56f632a20760N.exe
      C:\Users\Admin\AppData\Local\Temp\d64c3dcc9167ffd0c85b56f632a20760N.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2972
    • C:\Users\Admin\AppData\Local\Temp\d64c3dcc9167ffd0c85b56f632a20760N.exe
      C:\Users\Admin\AppData\Local\Temp\d64c3dcc9167ffd0c85b56f632a20760N.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2376

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\0068.D8C

    Filesize

    1KB

    MD5

    9210e28d7806d930936d45385e740315

    SHA1

    751dba8aed712e1705bfe059e120c87617335ef3

    SHA256

    d8a4471b5c71200a11ff8decb9cdb14b8f029bd0633f3e07cd68301cf5761b24

    SHA512

    ec603d413ebdf069691d3b147b337816488eefea561db5168a5d85f1fe7140bbe8df1a233c40dd388b2061802f821fe43b07f9eea2d4d1b17e2e35b3396670b9

  • C:\Users\Admin\AppData\Roaming\0068.D8C

    Filesize

    600B

    MD5

    824709fca3d0f143f1864981219779da

    SHA1

    b2a47ea4f7a77d914575dcdda2c86116093fd8c4

    SHA256

    7058a6ac2037e5e8e1b844608066dd3021ef4ae9f2fed26cefb372ff10cc7fdb

    SHA512

    73f5b7d5e41feb5db016c298bddc21049099552021616e45fe08f7568c0d3268f9acb6b69ac429797968d896258fae0eb2b849fdd5ed992a3c4f1450028af8fd

  • C:\Users\Admin\AppData\Roaming\0068.D8C

    Filesize

    996B

    MD5

    da94ade952e7e1947330c4cff58a861d

    SHA1

    58d585374d42c3c44dc1bc85236edd3c932766bf

    SHA256

    58fce2b9418d511e63e4caeca62c1ce59b8e22db95e22c952668f25a647140d5

    SHA512

    0cb51f142e69957a4f801c291e61dc26bccd235263452ec77f255730f10f761ea460f5331d3d75ada9686c923d2d79315c21127b5daa113f3199cd4028ba0688

  • memory/1652-1-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/1652-2-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/1652-15-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/1652-80-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/1652-194-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2376-82-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2972-7-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2972-5-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB