Analysis
-
max time kernel
61s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
08-03-2022 14:24
Static task
static1
Behavioral task
behavioral1
Sample
84adb2ffc46865d153e2704ad2413ce2980c28d2eb018461975d94c39180ae40.exe
Resource
win7-20220223-en
0 signatures
0 seconds
General
-
Target
84adb2ffc46865d153e2704ad2413ce2980c28d2eb018461975d94c39180ae40.exe
-
Size
220KB
-
MD5
50c5897f38ff368f3b7e4f3642cca243
-
SHA1
e6cd97ac1d48b28896c81e5ae96247e0decf8254
-
SHA256
84adb2ffc46865d153e2704ad2413ce2980c28d2eb018461975d94c39180ae40
-
SHA512
cd704ba53ab4bf57fc95b0edc06df0cc1af89f289487a032f230f79bd0baac47ac4a2de8bc0a084cf7d9b1fa456eccc1087e286152a9080f3b3336bf9e5ff0ee
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3884-132-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/3884-134-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/3884-135-0x0000000000400000-0x0000000000453000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3312 set thread context of 3884 3312 84adb2ffc46865d153e2704ad2413ce2980c28d2eb018461975d94c39180ae40.exe 57 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3312 84adb2ffc46865d153e2704ad2413ce2980c28d2eb018461975d94c39180ae40.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3312 wrote to memory of 3884 3312 84adb2ffc46865d153e2704ad2413ce2980c28d2eb018461975d94c39180ae40.exe 57 PID 3312 wrote to memory of 3884 3312 84adb2ffc46865d153e2704ad2413ce2980c28d2eb018461975d94c39180ae40.exe 57 PID 3312 wrote to memory of 3884 3312 84adb2ffc46865d153e2704ad2413ce2980c28d2eb018461975d94c39180ae40.exe 57 PID 3312 wrote to memory of 3884 3312 84adb2ffc46865d153e2704ad2413ce2980c28d2eb018461975d94c39180ae40.exe 57 PID 3312 wrote to memory of 3884 3312 84adb2ffc46865d153e2704ad2413ce2980c28d2eb018461975d94c39180ae40.exe 57 PID 3312 wrote to memory of 3884 3312 84adb2ffc46865d153e2704ad2413ce2980c28d2eb018461975d94c39180ae40.exe 57 PID 3312 wrote to memory of 3884 3312 84adb2ffc46865d153e2704ad2413ce2980c28d2eb018461975d94c39180ae40.exe 57 PID 3312 wrote to memory of 3884 3312 84adb2ffc46865d153e2704ad2413ce2980c28d2eb018461975d94c39180ae40.exe 57
Processes
-
C:\Users\Admin\AppData\Local\Temp\84adb2ffc46865d153e2704ad2413ce2980c28d2eb018461975d94c39180ae40.exe"C:\Users\Admin\AppData\Local\Temp\84adb2ffc46865d153e2704ad2413ce2980c28d2eb018461975d94c39180ae40.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Users\Admin\AppData\Local\Temp\84adb2ffc46865d153e2704ad2413ce2980c28d2eb018461975d94c39180ae40.exe/scomma "C:\Users\Admin\AppData\Local\Temp\tmp.ini"2⤵PID:3884
-