Analysis
-
max time kernel
81s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2022 14:49
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
4 signatures
150 seconds
General
-
Target
file.exe
-
Size
2.9MB
-
MD5
e878e6121f88df7375c43775fa2bee97
-
SHA1
21d056b5618af26858c8d5a69ea09eb95de22f9c
-
SHA256
b200a3dc7f79701d7b09d3c0fcd99d086f5009053cb86fe6e0232373747ca236
-
SHA512
a71e841d3d880c44c3865fcaf4084e515716a2a8cbd61ffbbf9a1b4db92b5069b786b239f35986a1f03dfc237530fcdf190da0223672b1db1dc98111a882da1a
-
SSDEEP
49152:pdD1LN0ogT5Kyp4IMknbRGvjfuqFzF+DCnpNuDehql1cKE40c1jy9H/8xBv+M7kg:v7ihJxbRGvKqZF1npNuqIcKEHQjy9H/l
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MyStart = "C:\\Users\\Admin\\AppData\\Local\\Temp\\file.exe" file.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA file.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 2404 file.exe