Analysis
-
max time kernel
152s -
max time network
187s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 20:10
Static task
static1
Behavioral task
behavioral1
Sample
b6470547277fdb7e1d3f44159c79512ca2de34cfaf30819f4c062547ad87576f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b6470547277fdb7e1d3f44159c79512ca2de34cfaf30819f4c062547ad87576f.exe
Resource
win10v2004-20220812-en
General
-
Target
b6470547277fdb7e1d3f44159c79512ca2de34cfaf30819f4c062547ad87576f.exe
-
Size
190KB
-
MD5
028f1ded60a58e259f3f2baf1457ef24
-
SHA1
65e03ef7f75de4300cc89b4d7edb2bfc724f80ba
-
SHA256
b6470547277fdb7e1d3f44159c79512ca2de34cfaf30819f4c062547ad87576f
-
SHA512
1b1d4df4af4d98d5749cc1c0cbac59d1945197a9b649f8de081ee111f1948d9bc2d1f2aa4f8a56906bd33548de780e485ed4f7debf379e62b9f96de7bc82c870
-
SSDEEP
3072:tkSo00cjxch6RVPlM7oX0TwMYeprNppILfKZrCl7Ua:tJ+YVNfCrXxpp6yZ4
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1032-55-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/1996-59-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/1032-61-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/2016-65-0x0000000000400000-0x000000000044E000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1032 wrote to memory of 1996 1032 b6470547277fdb7e1d3f44159c79512ca2de34cfaf30819f4c062547ad87576f.exe 27 PID 1032 wrote to memory of 1996 1032 b6470547277fdb7e1d3f44159c79512ca2de34cfaf30819f4c062547ad87576f.exe 27 PID 1032 wrote to memory of 1996 1032 b6470547277fdb7e1d3f44159c79512ca2de34cfaf30819f4c062547ad87576f.exe 27 PID 1032 wrote to memory of 1996 1032 b6470547277fdb7e1d3f44159c79512ca2de34cfaf30819f4c062547ad87576f.exe 27 PID 1032 wrote to memory of 2016 1032 b6470547277fdb7e1d3f44159c79512ca2de34cfaf30819f4c062547ad87576f.exe 29 PID 1032 wrote to memory of 2016 1032 b6470547277fdb7e1d3f44159c79512ca2de34cfaf30819f4c062547ad87576f.exe 29 PID 1032 wrote to memory of 2016 1032 b6470547277fdb7e1d3f44159c79512ca2de34cfaf30819f4c062547ad87576f.exe 29 PID 1032 wrote to memory of 2016 1032 b6470547277fdb7e1d3f44159c79512ca2de34cfaf30819f4c062547ad87576f.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6470547277fdb7e1d3f44159c79512ca2de34cfaf30819f4c062547ad87576f.exe"C:\Users\Admin\AppData\Local\Temp\b6470547277fdb7e1d3f44159c79512ca2de34cfaf30819f4c062547ad87576f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\b6470547277fdb7e1d3f44159c79512ca2de34cfaf30819f4c062547ad87576f.exeC:\Users\Admin\AppData\Local\Temp\b6470547277fdb7e1d3f44159c79512ca2de34cfaf30819f4c062547ad87576f.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵PID:1996
-
-
C:\Users\Admin\AppData\Local\Temp\b6470547277fdb7e1d3f44159c79512ca2de34cfaf30819f4c062547ad87576f.exeC:\Users\Admin\AppData\Local\Temp\b6470547277fdb7e1d3f44159c79512ca2de34cfaf30819f4c062547ad87576f.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵PID:2016
-