Analysis
-
max time kernel
136s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20220310-en -
submitted
14-04-2022 13:35
Static task
static1
Behavioral task
behavioral1
Sample
3d651f6264da7ba84b71f9495f815b26254a4d3085760c5d97b40d40a998d02c.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
3d651f6264da7ba84b71f9495f815b26254a4d3085760c5d97b40d40a998d02c.exe
Resource
win10v2004-20220310-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
3d651f6264da7ba84b71f9495f815b26254a4d3085760c5d97b40d40a998d02c.exe
-
Size
1.1MB
-
MD5
0926c811a25166772fe8e5b851111ac0
-
SHA1
3dd43c9f30d385c375303cba97bca5ee5f136a2a
-
SHA256
3d651f6264da7ba84b71f9495f815b26254a4d3085760c5d97b40d40a998d02c
-
SHA512
6092b0b0b15409b09f9b4ee29ee7efbf2021a08895247232112b5aff87568ed493472939939673c2d23dde535febd5758ff55bd58fc740c0176a20094cddd5fd
Score
10/10
Malware Config
Signatures
-
Meta Stealer Stealer
Meta Stealer steals passwords stored in browsers, written in C++.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1296 3d651f6264da7ba84b71f9495f815b26254a4d3085760c5d97b40d40a998d02c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1296 3d651f6264da7ba84b71f9495f815b26254a4d3085760c5d97b40d40a998d02c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d651f6264da7ba84b71f9495f815b26254a4d3085760c5d97b40d40a998d02c.exe"C:\Users\Admin\AppData\Local\Temp\3d651f6264da7ba84b71f9495f815b26254a4d3085760c5d97b40d40a998d02c.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1296