Analysis
-
max time kernel
66s -
max time network
107s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
19-09-2022 12:26
Static task
static1
Behavioral task
behavioral1
Sample
cffa6cd79c31a59374df4cae97329e54a24c482bb71b04134be78dff7fb4159e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
cffa6cd79c31a59374df4cae97329e54a24c482bb71b04134be78dff7fb4159e.exe
Resource
win10v2004-20220812-en
General
-
Target
cffa6cd79c31a59374df4cae97329e54a24c482bb71b04134be78dff7fb4159e.exe
-
Size
206KB
-
MD5
7c449a329abe40d0d906c6b0bdba1b31
-
SHA1
5a37e49dae0612b80e4ec9cca5996487bc46d0ee
-
SHA256
cffa6cd79c31a59374df4cae97329e54a24c482bb71b04134be78dff7fb4159e
-
SHA512
aaab9f4de5df1ebe3fadda36793b3b1100a1f2315a36405105912ac0795787c79e6432e652444489e133d5e94eeac7f53b670f5ea63688bb776daaaa4f3c0776
-
SSDEEP
6144:pI/9zgWclaAr9sMd+s/t5Ud9VxGFkWhY9A/BU3e:pI/RgWclaApD/t5uuFk9SU3e
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1380-57-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/1232-60-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/1640-66-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/1640-64-0x0000000000400000-0x000000000044D000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1380 wrote to memory of 1232 1380 cffa6cd79c31a59374df4cae97329e54a24c482bb71b04134be78dff7fb4159e.exe 27 PID 1380 wrote to memory of 1232 1380 cffa6cd79c31a59374df4cae97329e54a24c482bb71b04134be78dff7fb4159e.exe 27 PID 1380 wrote to memory of 1232 1380 cffa6cd79c31a59374df4cae97329e54a24c482bb71b04134be78dff7fb4159e.exe 27 PID 1380 wrote to memory of 1232 1380 cffa6cd79c31a59374df4cae97329e54a24c482bb71b04134be78dff7fb4159e.exe 27 PID 1380 wrote to memory of 1640 1380 cffa6cd79c31a59374df4cae97329e54a24c482bb71b04134be78dff7fb4159e.exe 29 PID 1380 wrote to memory of 1640 1380 cffa6cd79c31a59374df4cae97329e54a24c482bb71b04134be78dff7fb4159e.exe 29 PID 1380 wrote to memory of 1640 1380 cffa6cd79c31a59374df4cae97329e54a24c482bb71b04134be78dff7fb4159e.exe 29 PID 1380 wrote to memory of 1640 1380 cffa6cd79c31a59374df4cae97329e54a24c482bb71b04134be78dff7fb4159e.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\cffa6cd79c31a59374df4cae97329e54a24c482bb71b04134be78dff7fb4159e.exe"C:\Users\Admin\AppData\Local\Temp\cffa6cd79c31a59374df4cae97329e54a24c482bb71b04134be78dff7fb4159e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\cffa6cd79c31a59374df4cae97329e54a24c482bb71b04134be78dff7fb4159e.exeC:\Users\Admin\AppData\Local\Temp\cffa6cd79c31a59374df4cae97329e54a24c482bb71b04134be78dff7fb4159e.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵PID:1232
-
-
C:\Users\Admin\AppData\Local\Temp\cffa6cd79c31a59374df4cae97329e54a24c482bb71b04134be78dff7fb4159e.exeC:\Users\Admin\AppData\Local\Temp\cffa6cd79c31a59374df4cae97329e54a24c482bb71b04134be78dff7fb4159e.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵PID:1640
-