Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
21-10-2021 18:54
Static task
static1
Behavioral task
behavioral1
Sample
a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe
Resource
win10-en-20211014
General
-
Target
a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe
-
Size
776KB
-
MD5
ceb48ce5b9a02866e9ee5e5e77dd7340
-
SHA1
64b3aaf77c2a549ef652c0ddafb8aa921f3e905f
-
SHA256
a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1
-
SHA512
2835e65fbaba58729c34624cb3cfecdd37019a30d951e043db7db1e975a0c16a0105210e29bcee35e845e0ffef797695f1d18008cfd8cbe5fb467126c8ffbe51
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 21 IoCs
Processes:
a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exepid process 1100 a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe 1100 a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe 1100 a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe 1100 a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe 1100 a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe 1100 a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe 1100 a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe 1100 a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe 1100 a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe 1100 a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe 1100 a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe 1100 a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe 1100 a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe 1100 a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe 1100 a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe 1100 a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe 1100 a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe 1100 a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe 1100 a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe 1100 a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe 1100 a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exedescription pid process target process PID 1100 wrote to memory of 1468 1100 a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe PID 1100 wrote to memory of 1468 1100 a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe PID 1100 wrote to memory of 1468 1100 a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe PID 1100 wrote to memory of 1468 1100 a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe PID 1100 wrote to memory of 1468 1100 a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe PID 1100 wrote to memory of 1468 1100 a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe PID 1100 wrote to memory of 1468 1100 a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe PID 1100 wrote to memory of 1468 1100 a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe PID 1100 wrote to memory of 1468 1100 a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe PID 1100 wrote to memory of 1468 1100 a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe PID 1100 wrote to memory of 1468 1100 a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe PID 1100 wrote to memory of 1468 1100 a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe PID 1100 wrote to memory of 1468 1100 a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe PID 1100 wrote to memory of 1468 1100 a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe"C:\Users\Admin\AppData\Local\Temp\a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe"C:\Users\Admin\AppData\Local\Temp\a74d167d5507a183e9e8ca5dc51ad047190d4ff8fa576389de5b0473dfc8c6a1.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1100-55-0x0000000000320000-0x0000000000321000-memory.dmpFilesize
4KB
-
memory/1100-56-0x00000000005B0000-0x000000000062B000-memory.dmpFilesize
492KB
-
memory/1100-58-0x00000000029B0000-0x0000000002B30000-memory.dmpFilesize
1.5MB
-
memory/1468-57-0x0000000000000000-mapping.dmp
-
memory/1468-59-0x00000000001B0000-0x00000000001B1000-memory.dmpFilesize
4KB
-
memory/1468-60-0x0000000000400000-0x0000000000448000-memory.dmpFilesize
288KB
-
memory/1468-61-0x00000000768A1000-0x00000000768A3000-memory.dmpFilesize
8KB