Analysis
-
max time kernel
48s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
05-12-2022 16:40
Static task
static1
Behavioral task
behavioral1
Sample
fcabe524c56ca0d26b879bbcb6766c90bbcac6ce264f8218b1536b4a363ab46b.exe
Resource
win7-20220901-en
General
-
Target
fcabe524c56ca0d26b879bbcb6766c90bbcac6ce264f8218b1536b4a363ab46b.exe
-
Size
200KB
-
MD5
4d2fd4f65f3421a7bc737143f735926a
-
SHA1
633bb2fe8f36c39673f053a85f44d59a5998d46e
-
SHA256
fcabe524c56ca0d26b879bbcb6766c90bbcac6ce264f8218b1536b4a363ab46b
-
SHA512
626522f0cf0522d9c9f677d3be2167fcd0685335fc61da4d48d2a255ea2695d590d999b7574a926cb9116d478c131427b65638010bc9e0001072a42052f865ef
-
SSDEEP
3072:HprbTNB1WDuJB8wZ4SraolOYLoO6cq6rRGBVnGupb0zVCSf+g:5bTNCcFaoAYLFzroBI8wR
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1720 0jpz.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1544 wrote to memory of 1720 1544 fcabe524c56ca0d26b879bbcb6766c90bbcac6ce264f8218b1536b4a363ab46b.exe 27 PID 1544 wrote to memory of 1720 1544 fcabe524c56ca0d26b879bbcb6766c90bbcac6ce264f8218b1536b4a363ab46b.exe 27 PID 1544 wrote to memory of 1720 1544 fcabe524c56ca0d26b879bbcb6766c90bbcac6ce264f8218b1536b4a363ab46b.exe 27 PID 1544 wrote to memory of 1720 1544 fcabe524c56ca0d26b879bbcb6766c90bbcac6ce264f8218b1536b4a363ab46b.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\fcabe524c56ca0d26b879bbcb6766c90bbcac6ce264f8218b1536b4a363ab46b.exe"C:\Users\Admin\AppData\Local\Temp\fcabe524c56ca0d26b879bbcb6766c90bbcac6ce264f8218b1536b4a363ab46b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1544 -
\??\c:\0jpz.exec:\0jpz.exe2⤵
- Executes dropped EXE
PID:1720
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18KB
MD5eebf33097f5d59f7e220ab44bb2ce164
SHA1790c50d01efd1e6cbbfdf78a3656d36dd325f364
SHA256078448442075113f71deb0e6b16fad5bfc1b7d45b7eb6602cda3678b2831789d
SHA512fad6030c1b8779f141a0aa2b9975b2d9e81588e04e99fa7e8a1479777a278bce4e27dccf3683531f09d1f569d190c6bcb9f392b995ae7dcc0a18ebab0229df47