Analysis
-
max time kernel
42s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-06-2022 04:11
Static task
static1
Behavioral task
behavioral1
Sample
305f0ad1b66a12f621f5a588dc414b1d8d449bd104e5b5e71054636f3a2644bd.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
305f0ad1b66a12f621f5a588dc414b1d8d449bd104e5b5e71054636f3a2644bd.exe
-
Size
1.0MB
-
MD5
ddbc5d6023b19a129a124f93233d5f4d
-
SHA1
b64a38b8dd4e8ed57a51e6f58a85b1eb5513a444
-
SHA256
305f0ad1b66a12f621f5a588dc414b1d8d449bd104e5b5e71054636f3a2644bd
-
SHA512
7db57c8b843dff5156aca236556a5e78d2e1a6c980dac96da54e3de9832a210d92a7ca8b89bd51e1038150bb306b4ff7b7f524ea696ae707101811a4ff644c30
-
SSDEEP
24576:YP/Yk2eQji0+pBKcx4Z/2/qFatBkN8osTIQC2Y8rao2b2f8t+avrhqqk0:cJ2eQjiJ2Z+yFgBo8rae8YazhG
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 1560 305f0ad1b66a12f621f5a588dc414b1d8d449bd104e5b5e71054636f3a2644bd.exe