Analysis
-
max time kernel
64s -
max time network
101s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
28-10-2022 18:02
Static task
static1
Behavioral task
behavioral1
Sample
db372a724e12c8c6aef92517ce3b58d45069cf852526950e8de96ec8100d9a0f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
db372a724e12c8c6aef92517ce3b58d45069cf852526950e8de96ec8100d9a0f.exe
Resource
win10v2004-20220812-en
General
-
Target
db372a724e12c8c6aef92517ce3b58d45069cf852526950e8de96ec8100d9a0f.exe
-
Size
178KB
-
MD5
07044f71741a5e01d87b574a7c8c8a31
-
SHA1
0c46672ffbef09e67c1b70217e5381108f84cbfa
-
SHA256
db372a724e12c8c6aef92517ce3b58d45069cf852526950e8de96ec8100d9a0f
-
SHA512
74fe17091bc5c0b89136525c04a83e52a0aa0eeec1bd25507245ef41ce1374a81a20dbdc29cd87555b4262d34f3443568c615c890603dbb1e8ee64d2a34a5244
-
SSDEEP
3072:OGK/CuMCiAn3WOPmlX/krfy57bYYpbvC2NlcE2nktdcX00aKe:W/KCZn8RkWJbjJ65ktdAS
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/832-57-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/1324-59-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/328-63-0x0000000000400000-0x000000000044B000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1324 wrote to memory of 832 1324 db372a724e12c8c6aef92517ce3b58d45069cf852526950e8de96ec8100d9a0f.exe 27 PID 1324 wrote to memory of 832 1324 db372a724e12c8c6aef92517ce3b58d45069cf852526950e8de96ec8100d9a0f.exe 27 PID 1324 wrote to memory of 832 1324 db372a724e12c8c6aef92517ce3b58d45069cf852526950e8de96ec8100d9a0f.exe 27 PID 1324 wrote to memory of 832 1324 db372a724e12c8c6aef92517ce3b58d45069cf852526950e8de96ec8100d9a0f.exe 27 PID 1324 wrote to memory of 328 1324 db372a724e12c8c6aef92517ce3b58d45069cf852526950e8de96ec8100d9a0f.exe 29 PID 1324 wrote to memory of 328 1324 db372a724e12c8c6aef92517ce3b58d45069cf852526950e8de96ec8100d9a0f.exe 29 PID 1324 wrote to memory of 328 1324 db372a724e12c8c6aef92517ce3b58d45069cf852526950e8de96ec8100d9a0f.exe 29 PID 1324 wrote to memory of 328 1324 db372a724e12c8c6aef92517ce3b58d45069cf852526950e8de96ec8100d9a0f.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\db372a724e12c8c6aef92517ce3b58d45069cf852526950e8de96ec8100d9a0f.exe"C:\Users\Admin\AppData\Local\Temp\db372a724e12c8c6aef92517ce3b58d45069cf852526950e8de96ec8100d9a0f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\db372a724e12c8c6aef92517ce3b58d45069cf852526950e8de96ec8100d9a0f.exeC:\Users\Admin\AppData\Local\Temp\db372a724e12c8c6aef92517ce3b58d45069cf852526950e8de96ec8100d9a0f.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵PID:832
-
-
C:\Users\Admin\AppData\Local\Temp\db372a724e12c8c6aef92517ce3b58d45069cf852526950e8de96ec8100d9a0f.exeC:\Users\Admin\AppData\Local\Temp\db372a724e12c8c6aef92517ce3b58d45069cf852526950e8de96ec8100d9a0f.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵PID:328
-