Analysis
-
max time kernel
144s -
max time network
94s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/10/2022, 23:17
Static task
static1
Behavioral task
behavioral1
Sample
29833c1fdb7e062ec82af935f480b93140fec62d7cb48487ab2b6f0bcf363f0e.exe
Resource
win7-20220812-en
3 signatures
150 seconds
General
-
Target
29833c1fdb7e062ec82af935f480b93140fec62d7cb48487ab2b6f0bcf363f0e.exe
-
Size
187KB
-
MD5
91888187380d41d46b171002796986c1
-
SHA1
558a5b2be936f658c24474d592fd45fabc5b1702
-
SHA256
29833c1fdb7e062ec82af935f480b93140fec62d7cb48487ab2b6f0bcf363f0e
-
SHA512
b48b462f82b19b502d21b395251cc78498d0a541247e98db4d4a89b84963cd4e0ad50fd462ab078f0b406117040fdbc08a636bf105e0f09421e4f16a6c19dc98
-
SSDEEP
3072:ap+Q+Q+SUDSxa3Z9XVR4MlwtL4Voa+iTTADtZzZpQalIw:+AQk1PuGVpTAdt
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1340-55-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/1440-59-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/1340-61-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/792-65-0x0000000000400000-0x0000000000452000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1340 wrote to memory of 1440 1340 29833c1fdb7e062ec82af935f480b93140fec62d7cb48487ab2b6f0bcf363f0e.exe 28 PID 1340 wrote to memory of 1440 1340 29833c1fdb7e062ec82af935f480b93140fec62d7cb48487ab2b6f0bcf363f0e.exe 28 PID 1340 wrote to memory of 1440 1340 29833c1fdb7e062ec82af935f480b93140fec62d7cb48487ab2b6f0bcf363f0e.exe 28 PID 1340 wrote to memory of 1440 1340 29833c1fdb7e062ec82af935f480b93140fec62d7cb48487ab2b6f0bcf363f0e.exe 28 PID 1340 wrote to memory of 792 1340 29833c1fdb7e062ec82af935f480b93140fec62d7cb48487ab2b6f0bcf363f0e.exe 30 PID 1340 wrote to memory of 792 1340 29833c1fdb7e062ec82af935f480b93140fec62d7cb48487ab2b6f0bcf363f0e.exe 30 PID 1340 wrote to memory of 792 1340 29833c1fdb7e062ec82af935f480b93140fec62d7cb48487ab2b6f0bcf363f0e.exe 30 PID 1340 wrote to memory of 792 1340 29833c1fdb7e062ec82af935f480b93140fec62d7cb48487ab2b6f0bcf363f0e.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\29833c1fdb7e062ec82af935f480b93140fec62d7cb48487ab2b6f0bcf363f0e.exe"C:\Users\Admin\AppData\Local\Temp\29833c1fdb7e062ec82af935f480b93140fec62d7cb48487ab2b6f0bcf363f0e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\29833c1fdb7e062ec82af935f480b93140fec62d7cb48487ab2b6f0bcf363f0e.exeC:\Users\Admin\AppData\Local\Temp\29833c1fdb7e062ec82af935f480b93140fec62d7cb48487ab2b6f0bcf363f0e.exe startC:\Program Files (x86)\Internet Explorer\lvvm.exe%C:\Program Files (x86)\Internet Explorer2⤵PID:1440
-
-
C:\Users\Admin\AppData\Local\Temp\29833c1fdb7e062ec82af935f480b93140fec62d7cb48487ab2b6f0bcf363f0e.exeC:\Users\Admin\AppData\Local\Temp\29833c1fdb7e062ec82af935f480b93140fec62d7cb48487ab2b6f0bcf363f0e.exe startC:\Users\Admin\AppData\Roaming\conhost.exe%C:\Users\Admin\AppData\Roaming2⤵PID:792
-