Analysis
-
max time kernel
74s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 20:31
Static task
static1
Behavioral task
behavioral1
Sample
9a34ce7dcaec0789fe78aeec4f6d09c0b14ef4ee7ff33ccd3ea4cca2035abc3f.exe
Resource
win7-20220812-en
General
-
Target
9a34ce7dcaec0789fe78aeec4f6d09c0b14ef4ee7ff33ccd3ea4cca2035abc3f.exe
-
Size
44KB
-
MD5
57b12273ea91592fd08136185b7fe0e9
-
SHA1
eaaa3f879b6cb63f289e316aa9e3dd18d75da092
-
SHA256
9a34ce7dcaec0789fe78aeec4f6d09c0b14ef4ee7ff33ccd3ea4cca2035abc3f
-
SHA512
7fb8594736243793bbd5e0bf8af15b3001aeb9396d639ba5f19c246d32a0e4d503c2707d1fade90c5631dfaab1954d8c094391d94b1b94b4ad869c81607cc002
-
SSDEEP
384:sRgZ6jHsQSpG2sn/0bjDoCJWyEdDhQy/Nod2M3y3qOxx83R3/f2T2i3V9ZB3+9PW:siz9sn4qdDha/3y6KE3WLV9ZBOD6D
Malware Config
Signatures
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 792 set thread context of 1744 792 9a34ce7dcaec0789fe78aeec4f6d09c0b14ef4ee7ff33ccd3ea4cca2035abc3f.exe 28 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 792 9a34ce7dcaec0789fe78aeec4f6d09c0b14ef4ee7ff33ccd3ea4cca2035abc3f.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 792 wrote to memory of 1744 792 9a34ce7dcaec0789fe78aeec4f6d09c0b14ef4ee7ff33ccd3ea4cca2035abc3f.exe 28 PID 792 wrote to memory of 1744 792 9a34ce7dcaec0789fe78aeec4f6d09c0b14ef4ee7ff33ccd3ea4cca2035abc3f.exe 28 PID 792 wrote to memory of 1744 792 9a34ce7dcaec0789fe78aeec4f6d09c0b14ef4ee7ff33ccd3ea4cca2035abc3f.exe 28 PID 792 wrote to memory of 1744 792 9a34ce7dcaec0789fe78aeec4f6d09c0b14ef4ee7ff33ccd3ea4cca2035abc3f.exe 28 PID 792 wrote to memory of 1744 792 9a34ce7dcaec0789fe78aeec4f6d09c0b14ef4ee7ff33ccd3ea4cca2035abc3f.exe 28 PID 792 wrote to memory of 1744 792 9a34ce7dcaec0789fe78aeec4f6d09c0b14ef4ee7ff33ccd3ea4cca2035abc3f.exe 28 PID 792 wrote to memory of 1744 792 9a34ce7dcaec0789fe78aeec4f6d09c0b14ef4ee7ff33ccd3ea4cca2035abc3f.exe 28 PID 792 wrote to memory of 1744 792 9a34ce7dcaec0789fe78aeec4f6d09c0b14ef4ee7ff33ccd3ea4cca2035abc3f.exe 28 PID 792 wrote to memory of 1744 792 9a34ce7dcaec0789fe78aeec4f6d09c0b14ef4ee7ff33ccd3ea4cca2035abc3f.exe 28 PID 792 wrote to memory of 1744 792 9a34ce7dcaec0789fe78aeec4f6d09c0b14ef4ee7ff33ccd3ea4cca2035abc3f.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a34ce7dcaec0789fe78aeec4f6d09c0b14ef4ee7ff33ccd3ea4cca2035abc3f.exe"C:\Users\Admin\AppData\Local\Temp\9a34ce7dcaec0789fe78aeec4f6d09c0b14ef4ee7ff33ccd3ea4cca2035abc3f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Users\Admin\AppData\Local\Temp\9a34ce7dcaec0789fe78aeec4f6d09c0b14ef4ee7ff33ccd3ea4cca2035abc3f.exeC:\Users\Admin\AppData\Local\Temp\9a34ce7dcaec0789fe78aeec4f6d09c0b14ef4ee7ff33ccd3ea4cca2035abc3f.exe2⤵PID:1744
-