Analysis
-
max time kernel
56s -
max time network
149s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
21/04/2023, 00:15
Static task
static1
General
-
Target
aa0e807baacb31d036df63d9a6ad71be726b74a6330a1e8bdb73c717348234e3.exe
-
Size
474KB
-
MD5
3d9dc8a709a990c7dca64323e5a4afe1
-
SHA1
4523958c7a8c7263a223c5d5e87d3779c73cc421
-
SHA256
aa0e807baacb31d036df63d9a6ad71be726b74a6330a1e8bdb73c717348234e3
-
SHA512
dfeab2b4d481336aa3a17923cbac0e27112de05eb982bd0f8614f6b911cb7e1cb19e8b607944ba0384c07fba1bbdf4098a9c53879c42ef99f78f5cf61575f3ce
-
SSDEEP
12288:wiZncoKTNTqWuIYayBldq9FEM8phvUmMypeE/:w8coK0WuJl8mLVr/
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1716 aa0e807baacb31d036df63d9a6ad71be726b74a6330a1e8bdb73c717348234e3.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1716 aa0e807baacb31d036df63d9a6ad71be726b74a6330a1e8bdb73c717348234e3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa0e807baacb31d036df63d9a6ad71be726b74a6330a1e8bdb73c717348234e3.exe"C:\Users\Admin\AppData\Local\Temp\aa0e807baacb31d036df63d9a6ad71be726b74a6330a1e8bdb73c717348234e3.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1716