Analysis
-
max time kernel
4294177s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20220223-en -
submitted
08-03-2022 14:24
Static task
static1
Behavioral task
behavioral1
Sample
84adb2ffc46865d153e2704ad2413ce2980c28d2eb018461975d94c39180ae40.exe
Resource
win7-20220223-en
0 signatures
0 seconds
General
-
Target
84adb2ffc46865d153e2704ad2413ce2980c28d2eb018461975d94c39180ae40.exe
-
Size
220KB
-
MD5
50c5897f38ff368f3b7e4f3642cca243
-
SHA1
e6cd97ac1d48b28896c81e5ae96247e0decf8254
-
SHA256
84adb2ffc46865d153e2704ad2413ce2980c28d2eb018461975d94c39180ae40
-
SHA512
cd704ba53ab4bf57fc95b0edc06df0cc1af89f289487a032f230f79bd0baac47ac4a2de8bc0a084cf7d9b1fa456eccc1087e286152a9080f3b3336bf9e5ff0ee
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/768-56-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/768-59-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/768-60-0x0000000000400000-0x0000000000453000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1680 set thread context of 768 1680 84adb2ffc46865d153e2704ad2413ce2980c28d2eb018461975d94c39180ae40.exe 27 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1680 84adb2ffc46865d153e2704ad2413ce2980c28d2eb018461975d94c39180ae40.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1680 wrote to memory of 768 1680 84adb2ffc46865d153e2704ad2413ce2980c28d2eb018461975d94c39180ae40.exe 27 PID 1680 wrote to memory of 768 1680 84adb2ffc46865d153e2704ad2413ce2980c28d2eb018461975d94c39180ae40.exe 27 PID 1680 wrote to memory of 768 1680 84adb2ffc46865d153e2704ad2413ce2980c28d2eb018461975d94c39180ae40.exe 27 PID 1680 wrote to memory of 768 1680 84adb2ffc46865d153e2704ad2413ce2980c28d2eb018461975d94c39180ae40.exe 27 PID 1680 wrote to memory of 768 1680 84adb2ffc46865d153e2704ad2413ce2980c28d2eb018461975d94c39180ae40.exe 27 PID 1680 wrote to memory of 768 1680 84adb2ffc46865d153e2704ad2413ce2980c28d2eb018461975d94c39180ae40.exe 27 PID 1680 wrote to memory of 768 1680 84adb2ffc46865d153e2704ad2413ce2980c28d2eb018461975d94c39180ae40.exe 27 PID 1680 wrote to memory of 768 1680 84adb2ffc46865d153e2704ad2413ce2980c28d2eb018461975d94c39180ae40.exe 27 PID 1680 wrote to memory of 768 1680 84adb2ffc46865d153e2704ad2413ce2980c28d2eb018461975d94c39180ae40.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\84adb2ffc46865d153e2704ad2413ce2980c28d2eb018461975d94c39180ae40.exe"C:\Users\Admin\AppData\Local\Temp\84adb2ffc46865d153e2704ad2413ce2980c28d2eb018461975d94c39180ae40.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\84adb2ffc46865d153e2704ad2413ce2980c28d2eb018461975d94c39180ae40.exe/scomma "C:\Users\Admin\AppData\Local\Temp\tmp.ini"2⤵PID:768
-