Analysis
-
max time kernel
49s -
max time network
60s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 06:28
Static task
static1
Behavioral task
behavioral1
Sample
9dccf7a30a024ffacd1cfd1de86e547bef96d885d7f63215769757e08e457c7b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9dccf7a30a024ffacd1cfd1de86e547bef96d885d7f63215769757e08e457c7b.exe
Resource
win10v2004-20220812-en
General
-
Target
9dccf7a30a024ffacd1cfd1de86e547bef96d885d7f63215769757e08e457c7b.exe
-
Size
170KB
-
MD5
1be9288ba65e57dd4f21bc7858ab8092
-
SHA1
152b7a90b38306c5e845d68cbfd0ca303b8e887a
-
SHA256
9dccf7a30a024ffacd1cfd1de86e547bef96d885d7f63215769757e08e457c7b
-
SHA512
244baac80a1bf52c840e969a1107456e913b7400422bf414e56c7c37f1f596bbd46f40ead50c9cc5e330230803f311b559ee8a2a57e95ed4962113d145a93898
-
SSDEEP
3072:h0bXi8Mcug5n3YRyprsaQaCN1t+WVZQkVo+/DkCiNI7q8T1/+wmSjbPVKzl:h0zZBZrsaCNZxP/viNIe8T8wfbtKR
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1976-54-0x0000000000400000-0x0000000000461000-memory.dmp upx behavioral1/memory/1352-59-0x0000000000400000-0x0000000000461000-memory.dmp upx behavioral1/memory/1976-61-0x0000000000400000-0x0000000000461000-memory.dmp upx behavioral1/memory/616-65-0x0000000000400000-0x0000000000461000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1976 wrote to memory of 1352 1976 9dccf7a30a024ffacd1cfd1de86e547bef96d885d7f63215769757e08e457c7b.exe 26 PID 1976 wrote to memory of 1352 1976 9dccf7a30a024ffacd1cfd1de86e547bef96d885d7f63215769757e08e457c7b.exe 26 PID 1976 wrote to memory of 1352 1976 9dccf7a30a024ffacd1cfd1de86e547bef96d885d7f63215769757e08e457c7b.exe 26 PID 1976 wrote to memory of 1352 1976 9dccf7a30a024ffacd1cfd1de86e547bef96d885d7f63215769757e08e457c7b.exe 26 PID 1976 wrote to memory of 616 1976 9dccf7a30a024ffacd1cfd1de86e547bef96d885d7f63215769757e08e457c7b.exe 28 PID 1976 wrote to memory of 616 1976 9dccf7a30a024ffacd1cfd1de86e547bef96d885d7f63215769757e08e457c7b.exe 28 PID 1976 wrote to memory of 616 1976 9dccf7a30a024ffacd1cfd1de86e547bef96d885d7f63215769757e08e457c7b.exe 28 PID 1976 wrote to memory of 616 1976 9dccf7a30a024ffacd1cfd1de86e547bef96d885d7f63215769757e08e457c7b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\9dccf7a30a024ffacd1cfd1de86e547bef96d885d7f63215769757e08e457c7b.exe"C:\Users\Admin\AppData\Local\Temp\9dccf7a30a024ffacd1cfd1de86e547bef96d885d7f63215769757e08e457c7b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\9dccf7a30a024ffacd1cfd1de86e547bef96d885d7f63215769757e08e457c7b.exeC:\Users\Admin\AppData\Local\Temp\9dccf7a30a024ffacd1cfd1de86e547bef96d885d7f63215769757e08e457c7b.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵PID:1352
-
-
C:\Users\Admin\AppData\Local\Temp\9dccf7a30a024ffacd1cfd1de86e547bef96d885d7f63215769757e08e457c7b.exeC:\Users\Admin\AppData\Local\Temp\9dccf7a30a024ffacd1cfd1de86e547bef96d885d7f63215769757e08e457c7b.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵PID:616
-