Analysis
-
max time kernel
121s -
max time network
144s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
11-11-2021 16:38
Static task
static1
Behavioral task
behavioral1
Sample
2ac34ae72ffb4a2edba4bee1d4bceb5d.exe
Resource
win7-en-20211014
windows7_x64
0 signatures
0 seconds
General
-
Target
2ac34ae72ffb4a2edba4bee1d4bceb5d.exe
-
Size
548KB
-
MD5
2ac34ae72ffb4a2edba4bee1d4bceb5d
-
SHA1
7df833703e8142a8662d754b11fbdd1483844885
-
SHA256
a0364ae270173830f434eb6a9c5d94f12d748e57fae764ba559e9f15dadcb810
-
SHA512
ee67edf70cfa26b614fece6e6e0fc713fe99a90699d26d17f9c34c61c33c74e100bd357beec3e44f640d010a46b675980463322433a11ff739b2352df7dd1c8c
Malware Config
Extracted
Credentials
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
alexcacapere123
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 12 checkip.dyndns.org 15 freegeoip.app 16 freegeoip.app -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
2ac34ae72ffb4a2edba4bee1d4bceb5d.exepid process 3452 2ac34ae72ffb4a2edba4bee1d4bceb5d.exe 3452 2ac34ae72ffb4a2edba4bee1d4bceb5d.exe 3452 2ac34ae72ffb4a2edba4bee1d4bceb5d.exe 3452 2ac34ae72ffb4a2edba4bee1d4bceb5d.exe 3452 2ac34ae72ffb4a2edba4bee1d4bceb5d.exe 3452 2ac34ae72ffb4a2edba4bee1d4bceb5d.exe 3452 2ac34ae72ffb4a2edba4bee1d4bceb5d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
2ac34ae72ffb4a2edba4bee1d4bceb5d.exedescription pid process Token: SeDebugPrivilege 3452 2ac34ae72ffb4a2edba4bee1d4bceb5d.exe