Analysis

  • max time kernel
    12s
  • max time network
    20s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2024, 18:38

General

  • Target

    $TEMP/DecodingHQ.exe

  • Size

    18KB

  • MD5

    9b0f21941d4b1d0e1b3cc53b1c3eda1f

  • SHA1

    cad7a151d3c5a34bbc2c954c2769de02177257eb

  • SHA256

    8a93e69379430dc0e3eec63c4144f244eda89c59ff86f6fb804c5aaded72c7ec

  • SHA512

    e8b82582ab4bdf082153fa84e0160880dfb533cced65e014ab16dcf7d2c67482c625ff3ef7d3cef89319d3d5da71599646fffb671cacd53acc61145006d18a5c

  • SSDEEP

    384:JVZ53Lk3hFFo9L/uD/BncqT8+cNzhiqhYIzuMoIxhy3QL5DhVZ:JVZ6CbuD/tcqpiYKuM3AE51VZ

Malware Config

Signatures

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$TEMP\DecodingHQ.exe
    "C:\Users\Admin\AppData\Local\Temp\$TEMP\DecodingHQ.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1268
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 388
      2⤵
      • Program crash
      PID:2156

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1268-0-0x0000000000403000-0x0000000000407000-memory.dmp

          Filesize

          16KB

        • memory/1268-1-0x0000000000400000-0x0000000000406BBC-memory.dmp

          Filesize

          26KB

        • memory/1268-2-0x0000000000400000-0x0000000000406BBC-memory.dmp

          Filesize

          26KB

        • memory/1268-4-0x0000000000403000-0x0000000000407000-memory.dmp

          Filesize

          16KB