Analysis
-
max time kernel
42s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 16:42
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
3 signatures
150 seconds
General
-
Target
file.exe
-
Size
2.4MB
-
MD5
458ac39a481ac9ed07487ee9986d2fe9
-
SHA1
31dc51c7c1e2a5e8b4ca34b6f217c60ce757dbe5
-
SHA256
3882c65e9a7a8bfb85793f6ddfce465089a3b1b99b14e16aad7f71b93ccf3d91
-
SHA512
247c4386c53fa64606c31e97416ade7462c50e1c0ed8f7250a7591e675b268304f40e6987402e7d3ce87feda412fe3f47be7f5352aaf4dce6931dd5591eab9d9
-
SSDEEP
49152:yWSA/E1kQVibIswlJ/gTTF3OLJL0+jYbGvb4jIg5tfJVRo:yjSI3fJ/gF+LJL0+EbGT4Ug5tfJVRo
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/968-56-0x0000000000E60000-0x0000000001642000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 968 wrote to memory of 1628 968 file.exe 28 PID 968 wrote to memory of 1628 968 file.exe 28 PID 968 wrote to memory of 1628 968 file.exe 28 PID 1628 wrote to memory of 1520 1628 cmd.exe 30 PID 1628 wrote to memory of 1520 1628 cmd.exe 30 PID 1628 wrote to memory of 1520 1628 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\file.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1520
-
-