Analysis
-
max time kernel
93s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
12-06-2022 06:16
Static task
static1
Behavioral task
behavioral1
Sample
22221d5e43e091a1c03113d1bb37d8dd95dcf07d8756c87d2df6c0d1ab944845.exe
Resource
win7-20220414-en
0 signatures
0 seconds
General
-
Target
22221d5e43e091a1c03113d1bb37d8dd95dcf07d8756c87d2df6c0d1ab944845.exe
-
Size
804KB
-
MD5
afd33b39cc87ff4d2e7047e199b911f0
-
SHA1
71adba01096df16f501b202b07d24d5c3fee37df
-
SHA256
22221d5e43e091a1c03113d1bb37d8dd95dcf07d8756c87d2df6c0d1ab944845
-
SHA512
9802fdf92b9735740bf23b943fd9fa15c374d09a2a13c90823a96654cc0a3fd157148b9600153d66721ee57023227339c30bab4cc7780737cd8a0a9844be3671
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4180-130-0x0000000000400000-0x000000000064F000-memory.dmp vmprotect behavioral2/memory/4180-131-0x0000000000400000-0x000000000064F000-memory.dmp vmprotect behavioral2/memory/4180-132-0x0000000000400000-0x000000000064F000-memory.dmp vmprotect behavioral2/memory/4180-309-0x0000000000400000-0x000000000064F000-memory.dmp vmprotect -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 22221d5e43e091a1c03113d1bb37d8dd95dcf07d8756c87d2df6c0d1ab944845.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeManageVolumePrivilege 4180 22221d5e43e091a1c03113d1bb37d8dd95dcf07d8756c87d2df6c0d1ab944845.exe Token: SeManageVolumePrivilege 4180 22221d5e43e091a1c03113d1bb37d8dd95dcf07d8756c87d2df6c0d1ab944845.exe Token: SeManageVolumePrivilege 4180 22221d5e43e091a1c03113d1bb37d8dd95dcf07d8756c87d2df6c0d1ab944845.exe Token: SeManageVolumePrivilege 4180 22221d5e43e091a1c03113d1bb37d8dd95dcf07d8756c87d2df6c0d1ab944845.exe Token: SeManageVolumePrivilege 4180 22221d5e43e091a1c03113d1bb37d8dd95dcf07d8756c87d2df6c0d1ab944845.exe