Analysis
-
max time kernel
154s -
max time network
168s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 15:27
Static task
static1
Behavioral task
behavioral1
Sample
4f59eea7e35033ce9cb800dea9f5bf00fed0c21de6f3a63f342f011d8cf21b73.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4f59eea7e35033ce9cb800dea9f5bf00fed0c21de6f3a63f342f011d8cf21b73.exe
Resource
win10v2004-20220812-en
General
-
Target
4f59eea7e35033ce9cb800dea9f5bf00fed0c21de6f3a63f342f011d8cf21b73.exe
-
Size
127KB
-
MD5
cf65032a0b0f2f1e33d84bdb7186d107
-
SHA1
e07ca251619d84e65c07be2f33398e3e2acc1cf4
-
SHA256
4f59eea7e35033ce9cb800dea9f5bf00fed0c21de6f3a63f342f011d8cf21b73
-
SHA512
63915556a101627109c68791fb45b6c072e83295eae6c21debbcef150b1ec23e22c715a9cf6f4be2d3f4b575ee580e0fa9678cb2becba738e7666f2e97b2cd1f
-
SSDEEP
1536:Y+L7BtXISH0BVpMNijUJKvRBq2EqIiQmLdhkQOSIQolysxPgC5FKQl0LCK2z0kIS:vXISOCwjUJ+4zmL0QuQM1HaLU0kL
Malware Config
Signatures
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeImpersonatePrivilege 1692 4f59eea7e35033ce9cb800dea9f5bf00fed0c21de6f3a63f342f011d8cf21b73.exe Token: SeTcbPrivilege 1692 4f59eea7e35033ce9cb800dea9f5bf00fed0c21de6f3a63f342f011d8cf21b73.exe Token: SeChangeNotifyPrivilege 1692 4f59eea7e35033ce9cb800dea9f5bf00fed0c21de6f3a63f342f011d8cf21b73.exe Token: SeCreateTokenPrivilege 1692 4f59eea7e35033ce9cb800dea9f5bf00fed0c21de6f3a63f342f011d8cf21b73.exe Token: SeBackupPrivilege 1692 4f59eea7e35033ce9cb800dea9f5bf00fed0c21de6f3a63f342f011d8cf21b73.exe Token: SeRestorePrivilege 1692 4f59eea7e35033ce9cb800dea9f5bf00fed0c21de6f3a63f342f011d8cf21b73.exe Token: SeIncreaseQuotaPrivilege 1692 4f59eea7e35033ce9cb800dea9f5bf00fed0c21de6f3a63f342f011d8cf21b73.exe Token: SeAssignPrimaryTokenPrivilege 1692 4f59eea7e35033ce9cb800dea9f5bf00fed0c21de6f3a63f342f011d8cf21b73.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1692 4f59eea7e35033ce9cb800dea9f5bf00fed0c21de6f3a63f342f011d8cf21b73.exe