Analysis
-
max time kernel
28s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
27/03/2023, 22:17
Behavioral task
behavioral1
Sample
0d1d2797d19ec0a73720c69188fae82a003d686a45d70d8e65a6609791b77b18.exe
Resource
win7-20230220-en
3 signatures
300 seconds
General
-
Target
0d1d2797d19ec0a73720c69188fae82a003d686a45d70d8e65a6609791b77b18.exe
-
Size
4.3MB
-
MD5
07cde97fd5a61b6f641d15843d53188e
-
SHA1
9ca085a29f3ed6dc5b75820a851d1b4a6bc09207
-
SHA256
0d1d2797d19ec0a73720c69188fae82a003d686a45d70d8e65a6609791b77b18
-
SHA512
ed019c05751fdea971e83b27fa8820c085cfd78c9e09b2b2ba13d19f26b60c74faf0c506a87532d5d74a20e741c07153df6b98a0c18234fa23c085a44511a105
-
SSDEEP
98304:RJtj1vjRh9PB9j6WbUvrvnWFFCiSl8p3UHC:tj9jRrB9jHUvrvnqF+yp3EC
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1764-54-0x0000000000EF0000-0x0000000001D51000-memory.dmp upx -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1764 wrote to memory of 2020 1764 0d1d2797d19ec0a73720c69188fae82a003d686a45d70d8e65a6609791b77b18.exe 28 PID 1764 wrote to memory of 2020 1764 0d1d2797d19ec0a73720c69188fae82a003d686a45d70d8e65a6609791b77b18.exe 28 PID 1764 wrote to memory of 2020 1764 0d1d2797d19ec0a73720c69188fae82a003d686a45d70d8e65a6609791b77b18.exe 28 PID 2020 wrote to memory of 1992 2020 cmd.exe 30 PID 2020 wrote to memory of 1992 2020 cmd.exe 30 PID 2020 wrote to memory of 1992 2020 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d1d2797d19ec0a73720c69188fae82a003d686a45d70d8e65a6609791b77b18.exe"C:\Users\Admin\AppData\Local\Temp\0d1d2797d19ec0a73720c69188fae82a003d686a45d70d8e65a6609791b77b18.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\0d1d2797d19ec0a73720c69188fae82a003d686a45d70d8e65a6609791b77b18.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1992
-
-