Analysis
-
max time kernel
43s -
max time network
65s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01-10-2022 14:49
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
4 signatures
150 seconds
General
-
Target
file.exe
-
Size
2.9MB
-
MD5
e878e6121f88df7375c43775fa2bee97
-
SHA1
21d056b5618af26858c8d5a69ea09eb95de22f9c
-
SHA256
b200a3dc7f79701d7b09d3c0fcd99d086f5009053cb86fe6e0232373747ca236
-
SHA512
a71e841d3d880c44c3865fcaf4084e515716a2a8cbd61ffbbf9a1b4db92b5069b786b239f35986a1f03dfc237530fcdf190da0223672b1db1dc98111a882da1a
-
SSDEEP
49152:pdD1LN0ogT5Kyp4IMknbRGvjfuqFzF+DCnpNuDehql1cKE40c1jy9H/8xBv+M7kg:v7ihJxbRGvKqZF1npNuqIcKEHQjy9H/l
Score
10/10
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\MyStart = "C:\\Users\\Admin\\AppData\\Local\\Temp\\file.exe" file.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 1960 file.exe