Analysis
-
max time kernel
154s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 08:41
Static task
static1
Behavioral task
behavioral1
Sample
d1e02bdd98114d39cfee782fa4067a035d4d77d81347e088ed4986f1cdf7589d.exe
Resource
win7-20221111-en
3 signatures
150 seconds
General
-
Target
d1e02bdd98114d39cfee782fa4067a035d4d77d81347e088ed4986f1cdf7589d.exe
-
Size
184KB
-
MD5
255e4eafce3a7615aa2ea9081a9768c1
-
SHA1
579f7d58bef31349cd0dd6e55818c6a18f8b8919
-
SHA256
d1e02bdd98114d39cfee782fa4067a035d4d77d81347e088ed4986f1cdf7589d
-
SHA512
5069e499e99b008957575ac1eaea99ca27064f85c43be71aa9305ce702f4a96fc590404a607abe1172c4e0132073fbb65cd17d206c24a6610357021a0659e822
-
SSDEEP
3072:9LMU+HvgF7KoVDXPD3I5GmdHZutWq89FIwomRxd00yfzh5ewwQqZV6eDj+vPJx:9Le3yX7cHfL9ewomRA0WJfqr6TvPn
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2004-56-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2004-60-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/676-63-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/1812-68-0x0000000000400000-0x0000000000455000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2004 wrote to memory of 676 2004 d1e02bdd98114d39cfee782fa4067a035d4d77d81347e088ed4986f1cdf7589d.exe 28 PID 2004 wrote to memory of 676 2004 d1e02bdd98114d39cfee782fa4067a035d4d77d81347e088ed4986f1cdf7589d.exe 28 PID 2004 wrote to memory of 676 2004 d1e02bdd98114d39cfee782fa4067a035d4d77d81347e088ed4986f1cdf7589d.exe 28 PID 2004 wrote to memory of 676 2004 d1e02bdd98114d39cfee782fa4067a035d4d77d81347e088ed4986f1cdf7589d.exe 28 PID 2004 wrote to memory of 1812 2004 d1e02bdd98114d39cfee782fa4067a035d4d77d81347e088ed4986f1cdf7589d.exe 30 PID 2004 wrote to memory of 1812 2004 d1e02bdd98114d39cfee782fa4067a035d4d77d81347e088ed4986f1cdf7589d.exe 30 PID 2004 wrote to memory of 1812 2004 d1e02bdd98114d39cfee782fa4067a035d4d77d81347e088ed4986f1cdf7589d.exe 30 PID 2004 wrote to memory of 1812 2004 d1e02bdd98114d39cfee782fa4067a035d4d77d81347e088ed4986f1cdf7589d.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1e02bdd98114d39cfee782fa4067a035d4d77d81347e088ed4986f1cdf7589d.exe"C:\Users\Admin\AppData\Local\Temp\d1e02bdd98114d39cfee782fa4067a035d4d77d81347e088ed4986f1cdf7589d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\d1e02bdd98114d39cfee782fa4067a035d4d77d81347e088ed4986f1cdf7589d.exeC:\Users\Admin\AppData\Local\Temp\d1e02bdd98114d39cfee782fa4067a035d4d77d81347e088ed4986f1cdf7589d.exe startC:\Program Files (x86)\LP\043B\236.exe%C:\Program Files (x86)\LP\043B2⤵PID:676
-
-
C:\Users\Admin\AppData\Local\Temp\d1e02bdd98114d39cfee782fa4067a035d4d77d81347e088ed4986f1cdf7589d.exeC:\Users\Admin\AppData\Local\Temp\d1e02bdd98114d39cfee782fa4067a035d4d77d81347e088ed4986f1cdf7589d.exe startC:\Users\Admin\AppData\Roaming\BCD46\AC504.exe%C:\Users\Admin\AppData\Roaming\BCD462⤵PID:1812
-