Analysis
-
max time kernel
123s -
max time network
71s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 09:43
Static task
static1
Behavioral task
behavioral1
Sample
807a6aafd48cc683fc6f0ff0d0d5b8008c69ec5c6337ad702c308c17afa356ac.exe
Resource
win7-20220812-en
windows7-x64
3 signatures
150 seconds
General
-
Target
807a6aafd48cc683fc6f0ff0d0d5b8008c69ec5c6337ad702c308c17afa356ac.exe
-
Size
188KB
-
MD5
cce4c9d9f8b457bc429c85cede98b5c5
-
SHA1
599c5c121b0f72e82a9f8e520f158e9fbde6bfea
-
SHA256
807a6aafd48cc683fc6f0ff0d0d5b8008c69ec5c6337ad702c308c17afa356ac
-
SHA512
e66e840483877fc0cca23b17e3bf15b55ca91f0ddc5d73bd67f2fe6c23ac5a10565ba96d4a7c03eb24229955bdf818fcc69fbcebd9c7c0f7b2dbc6ce43d14279
-
SSDEEP
3072:SyG7WgmJAk2QhaD0/rvB8Ozupfjj85T3lxROc3bZxrI/I2G7GOrQYDi0binvt:Scp1asrZ8sArj8jCoZmI2sGcbhw
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/576-54-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/2008-59-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/576-61-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/680-65-0x0000000000400000-0x0000000000452000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 576 wrote to memory of 2008 576 807a6aafd48cc683fc6f0ff0d0d5b8008c69ec5c6337ad702c308c17afa356ac.exe 26 PID 576 wrote to memory of 2008 576 807a6aafd48cc683fc6f0ff0d0d5b8008c69ec5c6337ad702c308c17afa356ac.exe 26 PID 576 wrote to memory of 2008 576 807a6aafd48cc683fc6f0ff0d0d5b8008c69ec5c6337ad702c308c17afa356ac.exe 26 PID 576 wrote to memory of 2008 576 807a6aafd48cc683fc6f0ff0d0d5b8008c69ec5c6337ad702c308c17afa356ac.exe 26 PID 576 wrote to memory of 680 576 807a6aafd48cc683fc6f0ff0d0d5b8008c69ec5c6337ad702c308c17afa356ac.exe 28 PID 576 wrote to memory of 680 576 807a6aafd48cc683fc6f0ff0d0d5b8008c69ec5c6337ad702c308c17afa356ac.exe 28 PID 576 wrote to memory of 680 576 807a6aafd48cc683fc6f0ff0d0d5b8008c69ec5c6337ad702c308c17afa356ac.exe 28 PID 576 wrote to memory of 680 576 807a6aafd48cc683fc6f0ff0d0d5b8008c69ec5c6337ad702c308c17afa356ac.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\807a6aafd48cc683fc6f0ff0d0d5b8008c69ec5c6337ad702c308c17afa356ac.exe"C:\Users\Admin\AppData\Local\Temp\807a6aafd48cc683fc6f0ff0d0d5b8008c69ec5c6337ad702c308c17afa356ac.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Users\Admin\AppData\Local\Temp\807a6aafd48cc683fc6f0ff0d0d5b8008c69ec5c6337ad702c308c17afa356ac.exeC:\Users\Admin\AppData\Local\Temp\807a6aafd48cc683fc6f0ff0d0d5b8008c69ec5c6337ad702c308c17afa356ac.exe startC:\Program Files (x86)\Internet Explorer\D3FC\4B8.exe%C:\Program Files (x86)\Internet Explorer\D3FC2⤵PID:2008
-
-
C:\Users\Admin\AppData\Local\Temp\807a6aafd48cc683fc6f0ff0d0d5b8008c69ec5c6337ad702c308c17afa356ac.exeC:\Users\Admin\AppData\Local\Temp\807a6aafd48cc683fc6f0ff0d0d5b8008c69ec5c6337ad702c308c17afa356ac.exe startC:\Users\Admin\AppData\Roaming\C8D46\8DED3.exe%C:\Users\Admin\AppData\Roaming\C8D462⤵PID:680
-