Analysis
-
max time kernel
40s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06-12-2022 10:07
Static task
static1
Behavioral task
behavioral1
Sample
b3066b2dfea83bbf3f354181810bc3e819c68d5cbde6b800566840434b24cfbd.exe
Resource
win7-20220812-en
General
-
Target
b3066b2dfea83bbf3f354181810bc3e819c68d5cbde6b800566840434b24cfbd.exe
-
Size
262KB
-
MD5
0dad651a2a9b95257076162eb0bdd5a9
-
SHA1
ae587af8645490e901fa1ab6b999c39e89062eeb
-
SHA256
b3066b2dfea83bbf3f354181810bc3e819c68d5cbde6b800566840434b24cfbd
-
SHA512
0f30575daf0b01e763065aa5779c9f60f275e6718b468a85eb835d25d1adb0257c310dd1821223f94866340fb64c2a1403bdc6499991b3efb7543bbec7140e92
-
SSDEEP
6144:rFCt4wYfRLv9JSZ20NSLi3ZvYne3hupbq/JyqaYhzA0hUoSr:R7FbaSjeRN/AiThUoS
Malware Config
Signatures
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1184 set thread context of 1800 1184 b3066b2dfea83bbf3f354181810bc3e819c68d5cbde6b800566840434b24cfbd.exe 26 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1184 b3066b2dfea83bbf3f354181810bc3e819c68d5cbde6b800566840434b24cfbd.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1184 wrote to memory of 1800 1184 b3066b2dfea83bbf3f354181810bc3e819c68d5cbde6b800566840434b24cfbd.exe 26 PID 1184 wrote to memory of 1800 1184 b3066b2dfea83bbf3f354181810bc3e819c68d5cbde6b800566840434b24cfbd.exe 26 PID 1184 wrote to memory of 1800 1184 b3066b2dfea83bbf3f354181810bc3e819c68d5cbde6b800566840434b24cfbd.exe 26 PID 1184 wrote to memory of 1800 1184 b3066b2dfea83bbf3f354181810bc3e819c68d5cbde6b800566840434b24cfbd.exe 26 PID 1184 wrote to memory of 1800 1184 b3066b2dfea83bbf3f354181810bc3e819c68d5cbde6b800566840434b24cfbd.exe 26 PID 1184 wrote to memory of 1800 1184 b3066b2dfea83bbf3f354181810bc3e819c68d5cbde6b800566840434b24cfbd.exe 26 PID 1184 wrote to memory of 1800 1184 b3066b2dfea83bbf3f354181810bc3e819c68d5cbde6b800566840434b24cfbd.exe 26 PID 1184 wrote to memory of 1800 1184 b3066b2dfea83bbf3f354181810bc3e819c68d5cbde6b800566840434b24cfbd.exe 26 PID 1184 wrote to memory of 1800 1184 b3066b2dfea83bbf3f354181810bc3e819c68d5cbde6b800566840434b24cfbd.exe 26 PID 1184 wrote to memory of 1800 1184 b3066b2dfea83bbf3f354181810bc3e819c68d5cbde6b800566840434b24cfbd.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3066b2dfea83bbf3f354181810bc3e819c68d5cbde6b800566840434b24cfbd.exe"C:\Users\Admin\AppData\Local\Temp\b3066b2dfea83bbf3f354181810bc3e819c68d5cbde6b800566840434b24cfbd.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\b3066b2dfea83bbf3f354181810bc3e819c68d5cbde6b800566840434b24cfbd.exeC:\Users\Admin\AppData\Local\Temp\b3066b2dfea83bbf3f354181810bc3e819c68d5cbde6b800566840434b24cfbd.exe2⤵PID:1800
-