Analysis
-
max time kernel
147s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 08:52
Static task
static1
Behavioral task
behavioral1
Sample
b02675b5e311dd58611da7347ee6a41511cb7b96a07b01325fc11f9b40a5e4cb.exe
Resource
win7-20221111-en
3 signatures
150 seconds
General
-
Target
b02675b5e311dd58611da7347ee6a41511cb7b96a07b01325fc11f9b40a5e4cb.exe
-
Size
187KB
-
MD5
0db9ef1a6ca00a5178a8005155fe38e4
-
SHA1
18642d2461fcf44e4760d23e9b3a73a8e32b90e8
-
SHA256
b02675b5e311dd58611da7347ee6a41511cb7b96a07b01325fc11f9b40a5e4cb
-
SHA512
047d90e2b4e1c648e2e8771738b5f9b95f545216505cad27f7cececfc2e397824d33e4e0a0fec0a7d53bab3fa9bc413c283df8b0e3f23cc8f03e74c7e3b53533
-
SSDEEP
3072:daHotWoUST1g+qSIPNcV84DEMsaj+4fPTHwls+yWIsT2nP0RammA5OZow8D+ZOE9:dGoqSeVaVqMx1fjWIs40RNOilD2sJ9W
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1448-133-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/3316-135-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/5072-140-0x0000000000400000-0x0000000000454000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1448 wrote to memory of 3316 1448 b02675b5e311dd58611da7347ee6a41511cb7b96a07b01325fc11f9b40a5e4cb.exe 79 PID 1448 wrote to memory of 3316 1448 b02675b5e311dd58611da7347ee6a41511cb7b96a07b01325fc11f9b40a5e4cb.exe 79 PID 1448 wrote to memory of 3316 1448 b02675b5e311dd58611da7347ee6a41511cb7b96a07b01325fc11f9b40a5e4cb.exe 79 PID 1448 wrote to memory of 5072 1448 b02675b5e311dd58611da7347ee6a41511cb7b96a07b01325fc11f9b40a5e4cb.exe 80 PID 1448 wrote to memory of 5072 1448 b02675b5e311dd58611da7347ee6a41511cb7b96a07b01325fc11f9b40a5e4cb.exe 80 PID 1448 wrote to memory of 5072 1448 b02675b5e311dd58611da7347ee6a41511cb7b96a07b01325fc11f9b40a5e4cb.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\b02675b5e311dd58611da7347ee6a41511cb7b96a07b01325fc11f9b40a5e4cb.exe"C:\Users\Admin\AppData\Local\Temp\b02675b5e311dd58611da7347ee6a41511cb7b96a07b01325fc11f9b40a5e4cb.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\b02675b5e311dd58611da7347ee6a41511cb7b96a07b01325fc11f9b40a5e4cb.exeC:\Users\Admin\AppData\Local\Temp\b02675b5e311dd58611da7347ee6a41511cb7b96a07b01325fc11f9b40a5e4cb.exe startC:\Program Files (x86)\LP\7126\4FF.exe%C:\Program Files (x86)\LP\71262⤵PID:3316
-
-
C:\Users\Admin\AppData\Local\Temp\b02675b5e311dd58611da7347ee6a41511cb7b96a07b01325fc11f9b40a5e4cb.exeC:\Users\Admin\AppData\Local\Temp\b02675b5e311dd58611da7347ee6a41511cb7b96a07b01325fc11f9b40a5e4cb.exe startC:\Users\Admin\AppData\Roaming\613F4\92971.exe%C:\Users\Admin\AppData\Roaming\613F42⤵PID:5072
-