Analysis
-
max time kernel
128s -
max time network
40s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
10-07-2020 21:45
Static task
static1
Behavioral task
behavioral2
Sample
dddd.exe
Resource
win10v200430
windows10_x64
0 signatures
0 seconds
General
-
Target
dddd.exe
-
Size
84KB
-
MD5
4ab065354c6156380645c905823cafde
-
SHA1
331828a86d6a174256a5721f18c02da9d4cf2268
-
SHA256
297a85bb7912f7d8e148c5036d19d32f90c36378dd8116853e9b8b6179a269a3
-
SHA512
3c0039b5179044ea431c7157fbddea0e0006659144fedd9e0b6255337f274142b76912f37e58169cfb541d936252b9fbe7876cc76ace3d01b8e82157267f810d
Score
7/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
dddd.exedescription pid process Token: SeDebugPrivilege 3264 dddd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 ip-api.com