Analysis
-
max time kernel
36s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
12/10/2022, 04:03
Static task
static1
Behavioral task
behavioral1
Sample
d99876b6dfbdc1f7ff30f3e59dad2e21eb9f47283ad66414a7da80a6ceeef981.exe
Resource
win7-20220812-en
3 signatures
300 seconds
General
-
Target
d99876b6dfbdc1f7ff30f3e59dad2e21eb9f47283ad66414a7da80a6ceeef981.exe
-
Size
7.5MB
-
MD5
f7ce15fafb461392f0b3041b3948cdc7
-
SHA1
49d7256311465a15b195c74640c94ba1cfdb0938
-
SHA256
d99876b6dfbdc1f7ff30f3e59dad2e21eb9f47283ad66414a7da80a6ceeef981
-
SHA512
4ce76f83859be9c72921f26f1a9d2a632328feb5b732c171923363d2a6effc4c4a81073da7b47f105c8dafe8da6ce2b06d2b83cb5152081db22ab6bb1d01f394
-
SSDEEP
49152:CNSA3ZZhlgQrb/T4vO90d7HjmAFd4A64nsfJ5yXh7yjAe5rx18h2vr0x42e9BPSy:GZxeYm9gKCkEjuRt6QNEA/dWke
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1352 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1504 wrote to memory of 1352 1504 d99876b6dfbdc1f7ff30f3e59dad2e21eb9f47283ad66414a7da80a6ceeef981.exe 26 PID 1504 wrote to memory of 1352 1504 d99876b6dfbdc1f7ff30f3e59dad2e21eb9f47283ad66414a7da80a6ceeef981.exe 26 PID 1504 wrote to memory of 1352 1504 d99876b6dfbdc1f7ff30f3e59dad2e21eb9f47283ad66414a7da80a6ceeef981.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\d99876b6dfbdc1f7ff30f3e59dad2e21eb9f47283ad66414a7da80a6ceeef981.exe"C:\Users\Admin\AppData\Local\Temp\d99876b6dfbdc1f7ff30f3e59dad2e21eb9f47283ad66414a7da80a6ceeef981.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\system32\cmd.execmd.exe /c "del C:\Users\Admin\AppData\Local\Temp\d99876b6dfbdc1f7ff30f3e59dad2e21eb9f47283ad66414a7da80a6ceeef981.exe"2⤵
- Deletes itself
PID:1352
-