Analysis
-
max time kernel
125s -
max time network
130s -
platform
windows10_x64 -
resource
win10 -
submitted
16-07-2020 12:10
Static task
static1
Behavioral task
behavioral1
Sample
a311beccd46c02cfbc4ef43b3a555efb14b792dab5fcadd31386e3f78ee84e80.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
General
-
Target
a311beccd46c02cfbc4ef43b3a555efb14b792dab5fcadd31386e3f78ee84e80.exe
-
Size
218KB
-
MD5
e95da9287dbc6a6f45397233b50156ae
-
SHA1
1328ca513f25230d794007cc29c46bd9f247ec85
-
SHA256
a311beccd46c02cfbc4ef43b3a555efb14b792dab5fcadd31386e3f78ee84e80
-
SHA512
3b87ee08fd3a1f2d44e5374ae263a30209c80304f120e73d834930eb019bf7b1efc145be7a77545d00669cff4662ab39127ca1f02d4a4369744ebccca85142eb
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3832 a311beccd46c02cfbc4ef43b3a555efb14b792dab5fcadd31386e3f78ee84e80.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3832 a311beccd46c02cfbc4ef43b3a555efb14b792dab5fcadd31386e3f78ee84e80.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a311beccd46c02cfbc4ef43b3a555efb14b792dab5fcadd31386e3f78ee84e80.exe"C:\Users\Admin\AppData\Local\Temp\a311beccd46c02cfbc4ef43b3a555efb14b792dab5fcadd31386e3f78ee84e80.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: RenamesItself
PID:3832