Analysis
-
max time kernel
28s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
22/05/2023, 20:28
Behavioral task
behavioral1
Sample
ground.exe
Resource
win7-20230220-en
4 signatures
150 seconds
General
-
Target
ground.exe
-
Size
4.3MB
-
MD5
95f8c9acd6ea072a7d18d4229820fe6f
-
SHA1
6a82c8e801ff1d99a2e4ea38b171297b2e3a224f
-
SHA256
b51278851242867be0c23ad21ab5900fe3a740a06f9ef3e6880439b963c6a596
-
SHA512
51e6bc429c322ce9174516da804ac7ff5474cd85bd7db46e551f9497efb73c38d413d04b3a8bfb9db92994a5e50ba1be7897be0fb35db8f327a8929467762b52
-
SSDEEP
98304:PogPXqsgfokGhBmzhtHyZP0p2W6/CXYZlHW8UZQjXRydgrOHNN:wsTk4mzjGcQW6/CXYfCZQjXRnOtN
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 656 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1696-54-0x0000000000E90000-0x0000000001CEF000-memory.dmp upx -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1696 wrote to memory of 656 1696 ground.exe 27 PID 1696 wrote to memory of 656 1696 ground.exe 27 PID 1696 wrote to memory of 656 1696 ground.exe 27 PID 656 wrote to memory of 1312 656 cmd.exe 29 PID 656 wrote to memory of 1312 656 cmd.exe 29 PID 656 wrote to memory of 1312 656 cmd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\ground.exe"C:\Users\Admin\AppData\Local\Temp\ground.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\ground.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1312
-
-