Analysis
-
max time kernel
128s -
max time network
77s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 14:10
Static task
static1
Behavioral task
behavioral1
Sample
bd6ab07f6e1d813d30d685f0f79dd29b95d360d869f6368a389f5f3aadca0fa7.exe
Resource
win7-20220812-en
windows7-x64
3 signatures
150 seconds
General
-
Target
bd6ab07f6e1d813d30d685f0f79dd29b95d360d869f6368a389f5f3aadca0fa7.exe
-
Size
177KB
-
MD5
3edc965b4753542fa2655a384ea33f27
-
SHA1
d92fabbcaf6c2c9d59873f2b22e853afada691c3
-
SHA256
bd6ab07f6e1d813d30d685f0f79dd29b95d360d869f6368a389f5f3aadca0fa7
-
SHA512
07fd4115ea7909ebe27ee1be447ce2f5f494bb8927a41cf1394dde86cca08f912d9eb6341f4153837f7b324f61c84c4c2ae65ea09481788c0a3f4e616cc577d1
-
SSDEEP
3072:ncoA0Ej/cQqgE/c+xT50IL9EncFwQaSp0Risbd1VZqLIz50qkGDQ4Y9:caEj1qq+r0ILycF+Spkb5Zq0KVGDQ4
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1344-59-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/824-61-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/1796-67-0x0000000000400000-0x0000000000454000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1344 wrote to memory of 824 1344 bd6ab07f6e1d813d30d685f0f79dd29b95d360d869f6368a389f5f3aadca0fa7.exe 26 PID 1344 wrote to memory of 824 1344 bd6ab07f6e1d813d30d685f0f79dd29b95d360d869f6368a389f5f3aadca0fa7.exe 26 PID 1344 wrote to memory of 824 1344 bd6ab07f6e1d813d30d685f0f79dd29b95d360d869f6368a389f5f3aadca0fa7.exe 26 PID 1344 wrote to memory of 824 1344 bd6ab07f6e1d813d30d685f0f79dd29b95d360d869f6368a389f5f3aadca0fa7.exe 26 PID 1344 wrote to memory of 1796 1344 bd6ab07f6e1d813d30d685f0f79dd29b95d360d869f6368a389f5f3aadca0fa7.exe 28 PID 1344 wrote to memory of 1796 1344 bd6ab07f6e1d813d30d685f0f79dd29b95d360d869f6368a389f5f3aadca0fa7.exe 28 PID 1344 wrote to memory of 1796 1344 bd6ab07f6e1d813d30d685f0f79dd29b95d360d869f6368a389f5f3aadca0fa7.exe 28 PID 1344 wrote to memory of 1796 1344 bd6ab07f6e1d813d30d685f0f79dd29b95d360d869f6368a389f5f3aadca0fa7.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd6ab07f6e1d813d30d685f0f79dd29b95d360d869f6368a389f5f3aadca0fa7.exe"C:\Users\Admin\AppData\Local\Temp\bd6ab07f6e1d813d30d685f0f79dd29b95d360d869f6368a389f5f3aadca0fa7.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\bd6ab07f6e1d813d30d685f0f79dd29b95d360d869f6368a389f5f3aadca0fa7.exeC:\Users\Admin\AppData\Local\Temp\bd6ab07f6e1d813d30d685f0f79dd29b95d360d869f6368a389f5f3aadca0fa7.exe startC:\Program Files (x86)\LP\7681\E59.exe%C:\Program Files (x86)\LP\76812⤵PID:824
-
-
C:\Users\Admin\AppData\Local\Temp\bd6ab07f6e1d813d30d685f0f79dd29b95d360d869f6368a389f5f3aadca0fa7.exeC:\Users\Admin\AppData\Local\Temp\bd6ab07f6e1d813d30d685f0f79dd29b95d360d869f6368a389f5f3aadca0fa7.exe startC:\Users\Admin\AppData\Roaming\16327\5EE76.exe%C:\Users\Admin\AppData\Roaming\163272⤵PID:1796
-