Analysis
-
max time kernel
73s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/04/2023, 12:19
Static task
static1
General
-
Target
36753f23b5ea090c3abe992f438886b4db16e7a99759e94a1b0a45a1fc89148d.exe
-
Size
473KB
-
MD5
9479f570188fb77230b3d92129325abe
-
SHA1
b8988dc66dbb0492ef62b6de70474b70dc03c9b7
-
SHA256
36753f23b5ea090c3abe992f438886b4db16e7a99759e94a1b0a45a1fc89148d
-
SHA512
a7ce6ee46687c7b9c4f71c8c8651f2e6d3aecc3be9a1839b561934df9082fc46c3c17650eb555045b2ef314f4056a6639387ded8c31a81be62572d20dd23e6ce
-
SSDEEP
12288:11P2y1C4r+diekH2bqijfy9+AFzUER+FnyC1:1xB1C4mkHSYdUmgyE
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 4648 36753f23b5ea090c3abe992f438886b4db16e7a99759e94a1b0a45a1fc89148d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4648 36753f23b5ea090c3abe992f438886b4db16e7a99759e94a1b0a45a1fc89148d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\36753f23b5ea090c3abe992f438886b4db16e7a99759e94a1b0a45a1fc89148d.exe"C:\Users\Admin\AppData\Local\Temp\36753f23b5ea090c3abe992f438886b4db16e7a99759e94a1b0a45a1fc89148d.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4648