Analysis
-
max time kernel
61s -
max time network
124s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
22/02/2021, 11:13
Static task
static1
Behavioral task
behavioral1
Sample
frank_2021-02-22_02-03.exe
Resource
win7v20201028
0 signatures
0 seconds
General
-
Target
frank_2021-02-22_02-03.exe
-
Size
347KB
-
MD5
5ae9b47fd2a505049a7f6f405f6f512c
-
SHA1
fe53ef52e27877450865d074ef2f3e67e2af2ca3
-
SHA256
708c8e26689e83a82460bfcf611f78eaf39ee6e77e12c23ea012489deb57e72c
-
SHA512
677ea2876ddf6ba738e7eee769c100264b4eaf850ffbf92dba531d1b0351b43ac235c70500bacea8ddd502aefc133ffa0330e855ca3a9eeb35cac300dfca4ec5
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4768 set thread context of 5036 4768 frank_2021-02-22_02-03.exe 73 -
Delays execution with timeout.exe 1 IoCs
pid Process 2096 timeout.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4768 wrote to memory of 5036 4768 frank_2021-02-22_02-03.exe 73 PID 4768 wrote to memory of 5036 4768 frank_2021-02-22_02-03.exe 73 PID 4768 wrote to memory of 5036 4768 frank_2021-02-22_02-03.exe 73 PID 4768 wrote to memory of 5036 4768 frank_2021-02-22_02-03.exe 73 PID 4768 wrote to memory of 5036 4768 frank_2021-02-22_02-03.exe 73 PID 4768 wrote to memory of 5036 4768 frank_2021-02-22_02-03.exe 73 PID 4768 wrote to memory of 5036 4768 frank_2021-02-22_02-03.exe 73 PID 4768 wrote to memory of 5036 4768 frank_2021-02-22_02-03.exe 73 PID 4768 wrote to memory of 5036 4768 frank_2021-02-22_02-03.exe 73 PID 5036 wrote to memory of 3732 5036 frank_2021-02-22_02-03.exe 77 PID 5036 wrote to memory of 3732 5036 frank_2021-02-22_02-03.exe 77 PID 5036 wrote to memory of 3732 5036 frank_2021-02-22_02-03.exe 77 PID 3732 wrote to memory of 2096 3732 cmd.exe 79 PID 3732 wrote to memory of 2096 3732 cmd.exe 79 PID 3732 wrote to memory of 2096 3732 cmd.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\frank_2021-02-22_02-03.exe"C:\Users\Admin\AppData\Local\Temp\frank_2021-02-22_02-03.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\frank_2021-02-22_02-03.exe"C:\Users\Admin\AppData\Local\Temp\frank_2021-02-22_02-03.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Local\Temp\frank_2021-02-22_02-03.exe3⤵
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Windows\SysWOW64\timeout.exetimeout /t 34⤵
- Delays execution with timeout.exe
PID:2096
-
-
-