Analysis
-
max time kernel
80s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
13-03-2023 22:22
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
windows7-x64
3 signatures
150 seconds
General
-
Target
tmp.exe
-
Size
4.3MB
-
MD5
2dad0921a07acf1fed274d1120a0b8ce
-
SHA1
c4f3265e4355c86c1efb5f4ea839e8f1ba9b6450
-
SHA256
2696e9166a0715e548a1e3ac10fadc7199f5c62adb1c898116608a37b7ce97e2
-
SHA512
98b56d61d7fe94a065ab6ba2566c186dc251bb5e71737e61009b06307ced6f01a8ca4b4fafdc9a3d952f2566387e8b4c55fad7ec5de3eee1480048313b3cc4d4
-
SSDEEP
98304:oZIqu1kdVw0A/4G0kk9n/o0W0HaKVbAoRRcDnktWyFgdVO:EVu117/4Grk9/o0T6KVbHROD2FI
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/3732-133-0x00000000002B0000-0x000000000110F000-memory.dmp upx behavioral2/memory/3732-134-0x00000000002B0000-0x000000000110F000-memory.dmp upx -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3732 wrote to memory of 4408 3732 tmp.exe 86 PID 3732 wrote to memory of 4408 3732 tmp.exe 86 PID 4408 wrote to memory of 4736 4408 cmd.exe 88 PID 4408 wrote to memory of 4736 4408 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\tmp.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:4736
-
-