Analysis
-
max time kernel
63s -
max time network
124s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
01-03-2021 15:18
Static task
static1
Behavioral task
behavioral1
Sample
PO# PO2021020371N.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
PO# PO2021020371N.exe
-
Size
291KB
-
MD5
ce29efcf5510c0a9dcb38f62d50a5e8b
-
SHA1
eb9a28d284303663ab5bbbab9e8cc7db88cf7a2f
-
SHA256
9bec30afd640d68be28fef4e6b5abcc14d90b2c7293d7709619b8f9b9e685b7e
-
SHA512
dee3945c894c586f1a4d42581796e1ce257cc5ec8a98368de391d664328ac7318163aff9edcd5eac9b9ab4c3b3407c2448add2d07b3863a74f513bf0541a77aa
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
PO# PO2021020371N.exedescription pid process target process PID 4684 set thread context of 3668 4684 PO# PO2021020371N.exe PO# PO2021020371N.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 3304 timeout.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
PO# PO2021020371N.exePO# PO2021020371N.execmd.exedescription pid process target process PID 4684 wrote to memory of 3668 4684 PO# PO2021020371N.exe PO# PO2021020371N.exe PID 4684 wrote to memory of 3668 4684 PO# PO2021020371N.exe PO# PO2021020371N.exe PID 4684 wrote to memory of 3668 4684 PO# PO2021020371N.exe PO# PO2021020371N.exe PID 4684 wrote to memory of 3668 4684 PO# PO2021020371N.exe PO# PO2021020371N.exe PID 4684 wrote to memory of 3668 4684 PO# PO2021020371N.exe PO# PO2021020371N.exe PID 4684 wrote to memory of 3668 4684 PO# PO2021020371N.exe PO# PO2021020371N.exe PID 4684 wrote to memory of 3668 4684 PO# PO2021020371N.exe PO# PO2021020371N.exe PID 4684 wrote to memory of 3668 4684 PO# PO2021020371N.exe PO# PO2021020371N.exe PID 4684 wrote to memory of 3668 4684 PO# PO2021020371N.exe PO# PO2021020371N.exe PID 3668 wrote to memory of 3352 3668 PO# PO2021020371N.exe cmd.exe PID 3668 wrote to memory of 3352 3668 PO# PO2021020371N.exe cmd.exe PID 3668 wrote to memory of 3352 3668 PO# PO2021020371N.exe cmd.exe PID 3352 wrote to memory of 3304 3352 cmd.exe timeout.exe PID 3352 wrote to memory of 3304 3352 cmd.exe timeout.exe PID 3352 wrote to memory of 3304 3352 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO# PO2021020371N.exe"C:\Users\Admin\AppData\Local\Temp\PO# PO2021020371N.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\PO# PO2021020371N.exe"C:\Users\Admin\AppData\Local\Temp\PO# PO2021020371N.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Local\Temp\PO# PO2021020371N.exe3⤵
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Windows\SysWOW64\timeout.exetimeout /t 34⤵
- Delays execution with timeout.exe
PID:3304
-
-
-