Analysis
-
max time kernel
91s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05-01-2023 12:49
Static task
static1
Behavioral task
behavioral1
Sample
SоftwarеSetuрFilе.exe
Resource
win7-20221111-en
windows7-x64
9 signatures
150 seconds
General
-
Target
SоftwarеSetuрFilе.exe
-
Size
686.6MB
-
MD5
f5679ca36a2c3f5a619e7c35e3897db2
-
SHA1
55c95120c1e75389b2e45a18c0aa4bda38a9dcf9
-
SHA256
ead3b800dcccdefeada1f825a3f1911040a965c93f16eed5c711317ab3fb7f0f
-
SHA512
676bc18e5b19c7d2a44757b04667174704a23c82a4ec4b8db92bd66a63daa98cfed27337c58b6d0ffaec0cf6e9cf2a4215f1ca66d71a1e5c3964d6a9617f44f1
-
SSDEEP
49152:YmVlA7GqB6/KWpXeJpyYmJdIiDix/TYLAbJMZnMw2tNn1Or/GtXEJ+GRgD6Vk3jI:L8Na5XeJQpU/sLAKnMwoyXz
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1532 SоftwarеSetuрFilе.exe 1532 SоftwarеSetuрFilе.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1532 SоftwarеSetuрFilе.exe