Analysis
-
max time kernel
124s -
max time network
97s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 00:11
Static task
static1
Behavioral task
behavioral1
Sample
8a3815bea6c82bdc87b4c9e7c745764209c4af035a3857dd8f363a7f34ab7dd4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8a3815bea6c82bdc87b4c9e7c745764209c4af035a3857dd8f363a7f34ab7dd4.exe
Resource
win10v2004-20220901-en
General
-
Target
8a3815bea6c82bdc87b4c9e7c745764209c4af035a3857dd8f363a7f34ab7dd4.exe
-
Size
195KB
-
MD5
9180fef8002cc5cdf904d103d583d536
-
SHA1
3fde51d919d7a72762a43f973377805435b47969
-
SHA256
8a3815bea6c82bdc87b4c9e7c745764209c4af035a3857dd8f363a7f34ab7dd4
-
SHA512
e7fb45f05b3c47ca0e50fbdacacaedebdfbe3e8c39df0130668cbdab6e94c1389f679dc20b2bd0606d91e39e18688435ca7d5c02c9b3d62387564f7de29010a9
-
SSDEEP
3072:b6OeLAXKJpzn6w6NgU2MiXcjFVzjVTUYpdARbtC08H5o//ENftfAVTvK2a:B2AXyD6wqJpjJ1ZTUYbAHCPqUXfAVG
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1836-55-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/1556-59-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/1836-61-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/1564-65-0x0000000000400000-0x0000000000455000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1836 wrote to memory of 1556 1836 8a3815bea6c82bdc87b4c9e7c745764209c4af035a3857dd8f363a7f34ab7dd4.exe 28 PID 1836 wrote to memory of 1556 1836 8a3815bea6c82bdc87b4c9e7c745764209c4af035a3857dd8f363a7f34ab7dd4.exe 28 PID 1836 wrote to memory of 1556 1836 8a3815bea6c82bdc87b4c9e7c745764209c4af035a3857dd8f363a7f34ab7dd4.exe 28 PID 1836 wrote to memory of 1556 1836 8a3815bea6c82bdc87b4c9e7c745764209c4af035a3857dd8f363a7f34ab7dd4.exe 28 PID 1836 wrote to memory of 1564 1836 8a3815bea6c82bdc87b4c9e7c745764209c4af035a3857dd8f363a7f34ab7dd4.exe 30 PID 1836 wrote to memory of 1564 1836 8a3815bea6c82bdc87b4c9e7c745764209c4af035a3857dd8f363a7f34ab7dd4.exe 30 PID 1836 wrote to memory of 1564 1836 8a3815bea6c82bdc87b4c9e7c745764209c4af035a3857dd8f363a7f34ab7dd4.exe 30 PID 1836 wrote to memory of 1564 1836 8a3815bea6c82bdc87b4c9e7c745764209c4af035a3857dd8f363a7f34ab7dd4.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a3815bea6c82bdc87b4c9e7c745764209c4af035a3857dd8f363a7f34ab7dd4.exe"C:\Users\Admin\AppData\Local\Temp\8a3815bea6c82bdc87b4c9e7c745764209c4af035a3857dd8f363a7f34ab7dd4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\8a3815bea6c82bdc87b4c9e7c745764209c4af035a3857dd8f363a7f34ab7dd4.exeC:\Users\Admin\AppData\Local\Temp\8a3815bea6c82bdc87b4c9e7c745764209c4af035a3857dd8f363a7f34ab7dd4.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵PID:1556
-
-
C:\Users\Admin\AppData\Local\Temp\8a3815bea6c82bdc87b4c9e7c745764209c4af035a3857dd8f363a7f34ab7dd4.exeC:\Users\Admin\AppData\Local\Temp\8a3815bea6c82bdc87b4c9e7c745764209c4af035a3857dd8f363a7f34ab7dd4.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵PID:1564
-