Analysis
-
max time kernel
152s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 18:33
Static task
static1
Behavioral task
behavioral1
Sample
872e9ac53001d93f2c9f568656a96846e37bb8b5752d304fc0500928f62a167c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
872e9ac53001d93f2c9f568656a96846e37bb8b5752d304fc0500928f62a167c.exe
Resource
win10v2004-20220812-en
General
-
Target
872e9ac53001d93f2c9f568656a96846e37bb8b5752d304fc0500928f62a167c.exe
-
Size
145KB
-
MD5
81f3690eb4867cb7f68fd7cf466aca45
-
SHA1
b07ccede4deda152beeeb200486ce7c69db8d986
-
SHA256
872e9ac53001d93f2c9f568656a96846e37bb8b5752d304fc0500928f62a167c
-
SHA512
8f2f8901e85d65de7ee7b77d757ddfda558e3ac7f12b2ba1b6fd45936684c0ff5f3112d8e793c1666bab62c287ac6971021b6827667bf1948f3387b39c4db678
-
SSDEEP
3072:L6+1YBJm1vNzEpnGXxb/t3Z8ylznNcQm6A8Do/xnqgE:L6oAJQvNopnGL3BSU8/NW
Malware Config
Signatures
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\872e9ac53001d93f2c9f568656a96846e37bb8b5752d304fc0500928f62a167c.exe" 872e9ac53001d93f2c9f568656a96846e37bb8b5752d304fc0500928f62a167c.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4660 872e9ac53001d93f2c9f568656a96846e37bb8b5752d304fc0500928f62a167c.exe