Analysis
-
max time kernel
56s -
max time network
58s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
22/03/2023, 20:15
General
-
Target
3aac811cea31d85addf591a79e59441373476238716c04e5cc20d1d7239f18cc.exe
-
Size
4.3MB
-
MD5
7158d38ca5141701d75ca000a7501fd9
-
SHA1
cacf75237dd0190ddd4f80583fde6d3384c66300
-
SHA256
3aac811cea31d85addf591a79e59441373476238716c04e5cc20d1d7239f18cc
-
SHA512
a790583348f2449e8346e214fdef5fc31a2ed7f34db8bb550e448dd3ff71038f751e301e8cb9f2ce000adbaaf2d7d032e2ae82da2626d460c4dff4e6145ff7fe
-
SSDEEP
98304:OBF6+ogwEMfNV1HtUsmxSUF8CQQJk52nQiao5rig:UTYEiV1mLxSUVQanraOm
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/3748-121-0x0000000001270000-0x00000000020D0000-memory.dmp upx behavioral1/memory/3748-122-0x0000000001270000-0x00000000020D0000-memory.dmp upx -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3748 wrote to memory of 4212 3748 3aac811cea31d85addf591a79e59441373476238716c04e5cc20d1d7239f18cc.exe 66 PID 3748 wrote to memory of 4212 3748 3aac811cea31d85addf591a79e59441373476238716c04e5cc20d1d7239f18cc.exe 66 PID 4212 wrote to memory of 3660 4212 cmd.exe 68 PID 4212 wrote to memory of 3660 4212 cmd.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\3aac811cea31d85addf591a79e59441373476238716c04e5cc20d1d7239f18cc.exe"C:\Users\Admin\AppData\Local\Temp\3aac811cea31d85addf591a79e59441373476238716c04e5cc20d1d7239f18cc.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\3aac811cea31d85addf591a79e59441373476238716c04e5cc20d1d7239f18cc.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:3660
-
-