Analysis
-
max time kernel
151s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 02:19
Static task
static1
Behavioral task
behavioral1
Sample
8c3a594b1fe3ff8de05c4580d21d6440193c2e7e9fa523e845a240aaac1a0dc6.exe
Resource
win7-20220812-en
General
-
Target
8c3a594b1fe3ff8de05c4580d21d6440193c2e7e9fa523e845a240aaac1a0dc6.exe
-
Size
22KB
-
MD5
e2fb5d1b6283222d6ddbbed2e3e0d3bd
-
SHA1
9cec6ef6da5adc9db8f819866a2ecb560b07ccfb
-
SHA256
8c3a594b1fe3ff8de05c4580d21d6440193c2e7e9fa523e845a240aaac1a0dc6
-
SHA512
8f4de6c7be59759a9f1d797ae608d5409b8b54b2b82788d0692762eef370e825568ae17010f5d9066261ae90f516e25d393810f2a7c39da4de3816022a50e258
-
SSDEEP
384:JACn/9Kw/DUrAkIKA4JYd6MR6bJ7Av8lV9Uv4AZMrBmFWOYKEAbci:6Cn/VLXkIK6d6d17Av8lkvnCrBhOYObc
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1944 8c3a594b1fe3ff8de05c4580d21d6440193c2e7e9fa523e845a240aaac1a0dc6.exe