Analysis
-
max time kernel
161s -
max time network
138s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
09-03-2022 08:55
Static task
static1
Behavioral task
behavioral1
Sample
107da216ad99b7c0171745fe7f826e51b27b1812d435b55c3ddb801e23137d8f.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
107da216ad99b7c0171745fe7f826e51b27b1812d435b55c3ddb801e23137d8f.exe
Resource
win10v2004-en-20220112
General
-
Target
107da216ad99b7c0171745fe7f826e51b27b1812d435b55c3ddb801e23137d8f.exe
-
Size
292KB
-
MD5
8fe6f25fc7e8c0caab2fdca8b9a3be89
-
SHA1
a30bf5d046b6255fa2c4b029abbcf734824a7f15
-
SHA256
107da216ad99b7c0171745fe7f826e51b27b1812d435b55c3ddb801e23137d8f
-
SHA512
e2c28b474b0825890f58cbf1a98d36e4ceef6aa1def9d0ac527f7b0679b39a38672f8732757c0184f3576683d770c43d006bc9c2b29bfeadec418390f44812a3
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 5 api.ipify.org 4 api.ipify.org -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
107da216ad99b7c0171745fe7f826e51b27b1812d435b55c3ddb801e23137d8f.exedescription pid process Token: SeDebugPrivilege 756 107da216ad99b7c0171745fe7f826e51b27b1812d435b55c3ddb801e23137d8f.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/756-55-0x0000000073DD0000-0x00000000744BE000-memory.dmpFilesize
6.9MB
-
memory/756-56-0x00000000010E0000-0x0000000001130000-memory.dmpFilesize
320KB
-
memory/756-57-0x0000000076071000-0x0000000076073000-memory.dmpFilesize
8KB
-
memory/756-58-0x0000000004630000-0x0000000004631000-memory.dmpFilesize
4KB