Analysis
-
max time kernel
25s -
max time network
12s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
09/11/2020, 08:05
Static task
static1
Behavioral task
behavioral1
Sample
8892709206b1488a8859080c914f05419d1f094148bacec1abe2f1b18a0ec7b1.bin.sample.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
8892709206b1488a8859080c914f05419d1f094148bacec1abe2f1b18a0ec7b1.bin.sample.exe
Resource
win10v20201028
General
-
Target
8892709206b1488a8859080c914f05419d1f094148bacec1abe2f1b18a0ec7b1.bin.sample.exe
-
Size
966KB
-
MD5
a70c0b2b2f978a488216909f18b9a942
-
SHA1
8529c643ccc52008504baf7b55e0d37f8081fd7a
-
SHA256
8892709206b1488a8859080c914f05419d1f094148bacec1abe2f1b18a0ec7b1
-
SHA512
4e36d64233226595a2271381b6417d2e294001d98dfe21db88adad40aca205c5c2928506955d24d132fef0ee725571b96d0f65b6a423e39e080f73846ffab5ad
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 916 NOTEPAD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\8892709206b1488a8859080c914f05419d1f094148bacec1abe2f1b18a0ec7b1.bin.sample.exe"C:\Users\Admin\AppData\Local\Temp\8892709206b1488a8859080c914f05419d1f094148bacec1abe2f1b18a0ec7b1.bin.sample.exe"1⤵PID:752
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\README.TXT1⤵
- Opens file in notepad (likely ransom note)
PID:916