7zS850A099E.zip
7zS850A099E/61e7501b7eabe_Tue2344597f.exe
527KB
19-01-2022 08:14
8e0bc14c20fd607593967f164bbf08b5
f68dc21b6352302d36cb1953ac0065e30d1ca6b0
af8fbb1b23a21d1be75abcbb8d7c8447ec0c3b309fcfb407a91576a06070dcfe
Filter: none
-
Reads user/profile data of web browsers
Description
Infostealers often target stored browser data, which can include saved credentials etc.
Tags
TTPs
-
Accesses cryptocurrency files/wallets, possible credential harvesting
Tags
TTPs
-
Checks installed software on the system
Description
Looks up Uninstall key entries in the registry to enumerate software on the system.
Tags
TTPs
-
Suspicious use of SetThreadContext61e7501b7eabe_Tue2344597f.exe
Reported IOCs
description pid process target process PID 1672 set thread context of 732 1672 61e7501b7eabe_Tue2344597f.exe 61e7501b7eabe_Tue2344597f.exe -
Suspicious behavior: EnumeratesProcesses61e7501b7eabe_Tue2344597f.exe
Reported IOCs
pid process 732 61e7501b7eabe_Tue2344597f.exe -
Suspicious use of AdjustPrivilegeToken61e7501b7eabe_Tue2344597f.exe61e7501b7eabe_Tue2344597f.exe
Reported IOCs
description pid process Token: SeDebugPrivilege 1672 61e7501b7eabe_Tue2344597f.exe Token: SeDebugPrivilege 732 61e7501b7eabe_Tue2344597f.exe -
Suspicious use of WriteProcessMemory61e7501b7eabe_Tue2344597f.exe
Reported IOCs
description pid process target process PID 1672 wrote to memory of 732 1672 61e7501b7eabe_Tue2344597f.exe 61e7501b7eabe_Tue2344597f.exe PID 1672 wrote to memory of 732 1672 61e7501b7eabe_Tue2344597f.exe 61e7501b7eabe_Tue2344597f.exe PID 1672 wrote to memory of 732 1672 61e7501b7eabe_Tue2344597f.exe 61e7501b7eabe_Tue2344597f.exe PID 1672 wrote to memory of 732 1672 61e7501b7eabe_Tue2344597f.exe 61e7501b7eabe_Tue2344597f.exe PID 1672 wrote to memory of 732 1672 61e7501b7eabe_Tue2344597f.exe 61e7501b7eabe_Tue2344597f.exe PID 1672 wrote to memory of 732 1672 61e7501b7eabe_Tue2344597f.exe 61e7501b7eabe_Tue2344597f.exe PID 1672 wrote to memory of 732 1672 61e7501b7eabe_Tue2344597f.exe 61e7501b7eabe_Tue2344597f.exe PID 1672 wrote to memory of 732 1672 61e7501b7eabe_Tue2344597f.exe 61e7501b7eabe_Tue2344597f.exe PID 1672 wrote to memory of 732 1672 61e7501b7eabe_Tue2344597f.exe 61e7501b7eabe_Tue2344597f.exe
-
C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exe"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exe"Suspicious use of SetThreadContextSuspicious use of AdjustPrivilegeTokenSuspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exeC:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exeSuspicious behavior: EnumeratesProcessesSuspicious use of AdjustPrivilegeToken
-
memory/732-61-0x0000000000400000-0x0000000000420000-memory.dmp
-
memory/732-62-0x0000000000400000-0x0000000000420000-memory.dmp
-
memory/732-63-0x0000000000400000-0x0000000000420000-memory.dmp
-
memory/732-64-0x0000000000400000-0x0000000000420000-memory.dmp
-
memory/732-59-0x0000000000400000-0x0000000000420000-memory.dmp
-
memory/732-60-0x0000000000400000-0x0000000000420000-memory.dmp
-
memory/732-65-0x00000000020A0000-0x00000000020A1000-memory.dmp
-
memory/1672-55-0x0000000000A70000-0x0000000000AFA000-memory.dmp
-
memory/1672-57-0x0000000000360000-0x0000000000361000-memory.dmp
-
memory/1672-56-0x00000000004D0000-0x0000000000577000-memory.dmp
-
memory/1672-58-0x0000000075F81000-0x0000000075F83000-memory.dmp