Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
01/10/2022, 22:17
Static task
static1
Behavioral task
behavioral1
Sample
bf9ac5211bc1ea0ccc69a382adf0b7a3185c7da8a5446fc3bfa5ed0dff9e511c.exe
Resource
win7-20220901-en
General
-
Target
bf9ac5211bc1ea0ccc69a382adf0b7a3185c7da8a5446fc3bfa5ed0dff9e511c.exe
-
Size
576KB
-
MD5
00a06f0c2a867561581510c00628b446
-
SHA1
04092738bf0ac9127cb0d86d5ff23e49e7f55201
-
SHA256
bf9ac5211bc1ea0ccc69a382adf0b7a3185c7da8a5446fc3bfa5ed0dff9e511c
-
SHA512
b6bb57e74c6e196a7154d9ef768bcd52af5dee7afcaecc5cc319b297c55c2f454d1e298517c7546a074e50a026399b8ea545883507eff88999774df8de9ec0b6
-
SSDEEP
12288:OhXB8Vumq6QAO0F2uGPQDStCzFjyAH48UwP6hkMvUie7uXiB5NkTYayKXm+h2w9j:OCVTnGmr5RNu6Crhs
Malware Config
Signatures
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1896 set thread context of 948 1896 bf9ac5211bc1ea0ccc69a382adf0b7a3185c7da8a5446fc3bfa5ed0dff9e511c.exe 27 -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1896 wrote to memory of 948 1896 bf9ac5211bc1ea0ccc69a382adf0b7a3185c7da8a5446fc3bfa5ed0dff9e511c.exe 27 PID 1896 wrote to memory of 948 1896 bf9ac5211bc1ea0ccc69a382adf0b7a3185c7da8a5446fc3bfa5ed0dff9e511c.exe 27 PID 1896 wrote to memory of 948 1896 bf9ac5211bc1ea0ccc69a382adf0b7a3185c7da8a5446fc3bfa5ed0dff9e511c.exe 27 PID 1896 wrote to memory of 948 1896 bf9ac5211bc1ea0ccc69a382adf0b7a3185c7da8a5446fc3bfa5ed0dff9e511c.exe 27 PID 1896 wrote to memory of 948 1896 bf9ac5211bc1ea0ccc69a382adf0b7a3185c7da8a5446fc3bfa5ed0dff9e511c.exe 27 PID 1896 wrote to memory of 948 1896 bf9ac5211bc1ea0ccc69a382adf0b7a3185c7da8a5446fc3bfa5ed0dff9e511c.exe 27 PID 1896 wrote to memory of 948 1896 bf9ac5211bc1ea0ccc69a382adf0b7a3185c7da8a5446fc3bfa5ed0dff9e511c.exe 27 PID 1896 wrote to memory of 948 1896 bf9ac5211bc1ea0ccc69a382adf0b7a3185c7da8a5446fc3bfa5ed0dff9e511c.exe 27 PID 1896 wrote to memory of 948 1896 bf9ac5211bc1ea0ccc69a382adf0b7a3185c7da8a5446fc3bfa5ed0dff9e511c.exe 27 PID 1896 wrote to memory of 948 1896 bf9ac5211bc1ea0ccc69a382adf0b7a3185c7da8a5446fc3bfa5ed0dff9e511c.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf9ac5211bc1ea0ccc69a382adf0b7a3185c7da8a5446fc3bfa5ed0dff9e511c.exe"C:\Users\Admin\AppData\Local\Temp\bf9ac5211bc1ea0ccc69a382adf0b7a3185c7da8a5446fc3bfa5ed0dff9e511c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:948
-