Analysis
-
max time kernel
158s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2022 14:03
Behavioral task
behavioral1
Sample
e0135a0e1394a1d8dc965f71983c239e59df4483cdd9733ab03af05ba8ba4525.exe
Resource
win7-20220812-en
General
-
Target
e0135a0e1394a1d8dc965f71983c239e59df4483cdd9733ab03af05ba8ba4525.exe
-
Size
556KB
-
MD5
6ba08a80016310e1ad53c4e434b75d04
-
SHA1
28004bc340b56b345a39bc0c16289f44d06f3c2e
-
SHA256
e0135a0e1394a1d8dc965f71983c239e59df4483cdd9733ab03af05ba8ba4525
-
SHA512
43ae4a9f42fe6b6b3bdba89b38888a0f2560107d9100c8bb2efe858eac30045b5e3452a67e2ef4580ca5cca98e52f51a22d8937752e7b57739554631a4c074d7
-
SSDEEP
12288:ZGosTxSzpDq5VNYdyOshT5l4/86CaIhvPfNMIM1P27QwMMT6:ZGosTxSEXzOV/UaIBNLMp20wMMT6
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3868-132-0x0000000000400000-0x0000000000522000-memory.dmp upx behavioral2/memory/3868-133-0x0000000000400000-0x0000000000522000-memory.dmp upx behavioral2/memory/3868-134-0x0000000000400000-0x0000000000522000-memory.dmp upx behavioral2/memory/3868-135-0x0000000000400000-0x0000000000522000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~2\is240568890.log e0135a0e1394a1d8dc965f71983c239e59df4483cdd9733ab03af05ba8ba4525.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3868 e0135a0e1394a1d8dc965f71983c239e59df4483cdd9733ab03af05ba8ba4525.exe 3868 e0135a0e1394a1d8dc965f71983c239e59df4483cdd9733ab03af05ba8ba4525.exe