Analysis
-
max time kernel
48s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/12/2022, 00:28
Static task
static1
Behavioral task
behavioral1
Sample
27a1df7d76fe54028524950d629a0e395a5676069ef116a45f4cba6411280606.exe
Resource
win7-20220812-en
5 signatures
150 seconds
General
-
Target
27a1df7d76fe54028524950d629a0e395a5676069ef116a45f4cba6411280606.exe
-
Size
1.0MB
-
MD5
38f73783ce9adf44087e918635cf1875
-
SHA1
703b49e7a4761eea5a41304eeb33b18b107255c1
-
SHA256
27a1df7d76fe54028524950d629a0e395a5676069ef116a45f4cba6411280606
-
SHA512
8508295991ef37a735ccdc030589e2ed9bff4c496bf5f5f95e4f7c252bb0ec9b43311e6562728fbeaa20a91580db8d1271223c8cd982610873b21a092979b673
-
SSDEEP
12288:Ps05EW5k2yfDLuLtc7YI4QcOTLCQhiv0KxjeU/S23v3UQ5buN3W5pKo:PT5EWU+LtKYIX3CTxJeU/vJ5buNmGo
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1756 set thread context of 916 1756 27a1df7d76fe54028524950d629a0e395a5676069ef116a45f4cba6411280606.exe 27 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 916 27a1df7d76fe54028524950d629a0e395a5676069ef116a45f4cba6411280606.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 916 27a1df7d76fe54028524950d629a0e395a5676069ef116a45f4cba6411280606.exe 916 27a1df7d76fe54028524950d629a0e395a5676069ef116a45f4cba6411280606.exe 916 27a1df7d76fe54028524950d629a0e395a5676069ef116a45f4cba6411280606.exe 916 27a1df7d76fe54028524950d629a0e395a5676069ef116a45f4cba6411280606.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1756 wrote to memory of 916 1756 27a1df7d76fe54028524950d629a0e395a5676069ef116a45f4cba6411280606.exe 27 PID 1756 wrote to memory of 916 1756 27a1df7d76fe54028524950d629a0e395a5676069ef116a45f4cba6411280606.exe 27 PID 1756 wrote to memory of 916 1756 27a1df7d76fe54028524950d629a0e395a5676069ef116a45f4cba6411280606.exe 27 PID 1756 wrote to memory of 916 1756 27a1df7d76fe54028524950d629a0e395a5676069ef116a45f4cba6411280606.exe 27 PID 1756 wrote to memory of 916 1756 27a1df7d76fe54028524950d629a0e395a5676069ef116a45f4cba6411280606.exe 27 PID 1756 wrote to memory of 916 1756 27a1df7d76fe54028524950d629a0e395a5676069ef116a45f4cba6411280606.exe 27 PID 1756 wrote to memory of 916 1756 27a1df7d76fe54028524950d629a0e395a5676069ef116a45f4cba6411280606.exe 27 PID 1756 wrote to memory of 916 1756 27a1df7d76fe54028524950d629a0e395a5676069ef116a45f4cba6411280606.exe 27 PID 1756 wrote to memory of 916 1756 27a1df7d76fe54028524950d629a0e395a5676069ef116a45f4cba6411280606.exe 27 PID 1756 wrote to memory of 916 1756 27a1df7d76fe54028524950d629a0e395a5676069ef116a45f4cba6411280606.exe 27 PID 1756 wrote to memory of 916 1756 27a1df7d76fe54028524950d629a0e395a5676069ef116a45f4cba6411280606.exe 27 PID 1756 wrote to memory of 916 1756 27a1df7d76fe54028524950d629a0e395a5676069ef116a45f4cba6411280606.exe 27 PID 1756 wrote to memory of 916 1756 27a1df7d76fe54028524950d629a0e395a5676069ef116a45f4cba6411280606.exe 27 PID 1756 wrote to memory of 916 1756 27a1df7d76fe54028524950d629a0e395a5676069ef116a45f4cba6411280606.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\27a1df7d76fe54028524950d629a0e395a5676069ef116a45f4cba6411280606.exe"C:\Users\Admin\AppData\Local\Temp\27a1df7d76fe54028524950d629a0e395a5676069ef116a45f4cba6411280606.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\27a1df7d76fe54028524950d629a0e395a5676069ef116a45f4cba6411280606.exe"C:\Users\Admin\AppData\Local\Temp\27a1df7d76fe54028524950d629a0e395a5676069ef116a45f4cba6411280606.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:916
-