Analysis
-
max time kernel
126s -
max time network
116s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 13:48
Static task
static1
Behavioral task
behavioral1
Sample
8f2a1db1cae592eaf218eef9ae53e6f6696ffc7cb4c24da7732c536a2bf7f40b.exe
Resource
win7-20220812-en
3 signatures
150 seconds
General
-
Target
8f2a1db1cae592eaf218eef9ae53e6f6696ffc7cb4c24da7732c536a2bf7f40b.exe
-
Size
186KB
-
MD5
977dcca7be4f99553da72acd214e435d
-
SHA1
c29109808b86a3ce9ff3cc436c413a8bbda70f73
-
SHA256
8f2a1db1cae592eaf218eef9ae53e6f6696ffc7cb4c24da7732c536a2bf7f40b
-
SHA512
789aea5c9cf4f9c1bf48b8e6bb2b529face01e85c65d1724ab0eb9e0b2b35acd89094be545539482673b312e866687d1fc7958304d0021587641aecc8540a907
-
SSDEEP
3072:S8Ldz61Uf5AOAQZOawotIzW31JJ1sk+oo7JKjwNZW6fS4uTfJHjOamaZxPFQFpL8:ZLdzAUf5MQ4a3tCAip5JXnS4YRip
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/816-56-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/1796-61-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/816-62-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/1928-66-0x0000000000400000-0x0000000000456000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 816 wrote to memory of 1796 816 8f2a1db1cae592eaf218eef9ae53e6f6696ffc7cb4c24da7732c536a2bf7f40b.exe 27 PID 816 wrote to memory of 1796 816 8f2a1db1cae592eaf218eef9ae53e6f6696ffc7cb4c24da7732c536a2bf7f40b.exe 27 PID 816 wrote to memory of 1796 816 8f2a1db1cae592eaf218eef9ae53e6f6696ffc7cb4c24da7732c536a2bf7f40b.exe 27 PID 816 wrote to memory of 1796 816 8f2a1db1cae592eaf218eef9ae53e6f6696ffc7cb4c24da7732c536a2bf7f40b.exe 27 PID 816 wrote to memory of 1928 816 8f2a1db1cae592eaf218eef9ae53e6f6696ffc7cb4c24da7732c536a2bf7f40b.exe 29 PID 816 wrote to memory of 1928 816 8f2a1db1cae592eaf218eef9ae53e6f6696ffc7cb4c24da7732c536a2bf7f40b.exe 29 PID 816 wrote to memory of 1928 816 8f2a1db1cae592eaf218eef9ae53e6f6696ffc7cb4c24da7732c536a2bf7f40b.exe 29 PID 816 wrote to memory of 1928 816 8f2a1db1cae592eaf218eef9ae53e6f6696ffc7cb4c24da7732c536a2bf7f40b.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f2a1db1cae592eaf218eef9ae53e6f6696ffc7cb4c24da7732c536a2bf7f40b.exe"C:\Users\Admin\AppData\Local\Temp\8f2a1db1cae592eaf218eef9ae53e6f6696ffc7cb4c24da7732c536a2bf7f40b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Users\Admin\AppData\Local\Temp\8f2a1db1cae592eaf218eef9ae53e6f6696ffc7cb4c24da7732c536a2bf7f40b.exeC:\Users\Admin\AppData\Local\Temp\8f2a1db1cae592eaf218eef9ae53e6f6696ffc7cb4c24da7732c536a2bf7f40b.exe startC:\Program Files (x86)\LP\1F54\181.exe%C:\Program Files (x86)\LP\1F542⤵PID:1796
-
-
C:\Users\Admin\AppData\Local\Temp\8f2a1db1cae592eaf218eef9ae53e6f6696ffc7cb4c24da7732c536a2bf7f40b.exeC:\Users\Admin\AppData\Local\Temp\8f2a1db1cae592eaf218eef9ae53e6f6696ffc7cb4c24da7732c536a2bf7f40b.exe startC:\Users\Admin\AppData\Roaming\438D9\1C61F.exe%C:\Users\Admin\AppData\Roaming\438D92⤵PID:1928
-