Analysis
-
max time kernel
62s -
max time network
34s -
platform
windows7_x64 -
resource
win7 -
submitted
06/08/2020, 19:22
Static task
static1
Behavioral task
behavioral1
Sample
2020-01-08 114318.bin.exe
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
2020-01-08 114318.bin.exe
Resource
win10v200722
0 signatures
0 seconds
General
-
Target
2020-01-08 114318.bin.exe
-
Size
378KB
-
MD5
54c24db7a6b6186a5727042d7094c000
-
SHA1
c5b1d7d7ee1cfedf230dcf2106986afd1ab0eb06
-
SHA256
daccb68f01c806839d025c4d8ffda45357767e1dcc467d29f59cf64159176ab9
-
SHA512
7f842cfc37fbd35bf8337019170c8ba5119bf196190f07267a17be94d6d1699f027f17ba570d5c9fc10d5134a1b33c73ba88d7f1b867b29e66d91e10a84629f1
Score
7/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run 2020-01-08 114318.bin.exe Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run\driver = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2020-01-08 114318.bin.exe" 2020-01-08 114318.bin.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.