Analysis
-
max time kernel
257s -
max time network
363s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 18:57
Static task
static1
Behavioral task
behavioral1
Sample
c356f25e08af22eac3265cc3ea92b0f999d279a079dbe53c0b8cb915439ab0a5.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c356f25e08af22eac3265cc3ea92b0f999d279a079dbe53c0b8cb915439ab0a5.exe
Resource
win10v2004-20220812-en
General
-
Target
c356f25e08af22eac3265cc3ea92b0f999d279a079dbe53c0b8cb915439ab0a5.exe
-
Size
176KB
-
MD5
e8bfd3923785473e640a7de6755b8b06
-
SHA1
18eddac633e90258cb84340ee3c3127585b4c5ee
-
SHA256
c356f25e08af22eac3265cc3ea92b0f999d279a079dbe53c0b8cb915439ab0a5
-
SHA512
96deb23dd21adc0786bacade222ebd92c14255c7b8f454c0e626fadf3d0a90c576f735ff40547c3376e097e03ab97b0fc4e6a7a6cf5d274ab433d2639fe15645
-
SSDEEP
3072:kyaCDpqjORDgBLR+YP4Vn11mrcUlm8ibeO0PhIF7yu9XGl05TAV8GbgayyY5vcV8:kyacpGORkDNanvmrrl7O0PhI0K50V8W3
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/560-54-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/560-57-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/1872-61-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/1092-65-0x0000000000400000-0x000000000044B000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 560 wrote to memory of 1872 560 c356f25e08af22eac3265cc3ea92b0f999d279a079dbe53c0b8cb915439ab0a5.exe 28 PID 560 wrote to memory of 1872 560 c356f25e08af22eac3265cc3ea92b0f999d279a079dbe53c0b8cb915439ab0a5.exe 28 PID 560 wrote to memory of 1872 560 c356f25e08af22eac3265cc3ea92b0f999d279a079dbe53c0b8cb915439ab0a5.exe 28 PID 560 wrote to memory of 1872 560 c356f25e08af22eac3265cc3ea92b0f999d279a079dbe53c0b8cb915439ab0a5.exe 28 PID 560 wrote to memory of 1092 560 c356f25e08af22eac3265cc3ea92b0f999d279a079dbe53c0b8cb915439ab0a5.exe 30 PID 560 wrote to memory of 1092 560 c356f25e08af22eac3265cc3ea92b0f999d279a079dbe53c0b8cb915439ab0a5.exe 30 PID 560 wrote to memory of 1092 560 c356f25e08af22eac3265cc3ea92b0f999d279a079dbe53c0b8cb915439ab0a5.exe 30 PID 560 wrote to memory of 1092 560 c356f25e08af22eac3265cc3ea92b0f999d279a079dbe53c0b8cb915439ab0a5.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\c356f25e08af22eac3265cc3ea92b0f999d279a079dbe53c0b8cb915439ab0a5.exe"C:\Users\Admin\AppData\Local\Temp\c356f25e08af22eac3265cc3ea92b0f999d279a079dbe53c0b8cb915439ab0a5.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Users\Admin\AppData\Local\Temp\c356f25e08af22eac3265cc3ea92b0f999d279a079dbe53c0b8cb915439ab0a5.exeC:\Users\Admin\AppData\Local\Temp\c356f25e08af22eac3265cc3ea92b0f999d279a079dbe53c0b8cb915439ab0a5.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵PID:1872
-
-
C:\Users\Admin\AppData\Local\Temp\c356f25e08af22eac3265cc3ea92b0f999d279a079dbe53c0b8cb915439ab0a5.exeC:\Users\Admin\AppData\Local\Temp\c356f25e08af22eac3265cc3ea92b0f999d279a079dbe53c0b8cb915439ab0a5.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵PID:1092
-