Analysis
-
max time kernel
139s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2023, 20:28
Behavioral task
behavioral1
Sample
ground.exe
Resource
win7-20230220-en
4 signatures
150 seconds
General
-
Target
ground.exe
-
Size
4.3MB
-
MD5
95f8c9acd6ea072a7d18d4229820fe6f
-
SHA1
6a82c8e801ff1d99a2e4ea38b171297b2e3a224f
-
SHA256
b51278851242867be0c23ad21ab5900fe3a740a06f9ef3e6880439b963c6a596
-
SHA512
51e6bc429c322ce9174516da804ac7ff5474cd85bd7db46e551f9497efb73c38d413d04b3a8bfb9db92994a5e50ba1be7897be0fb35db8f327a8929467762b52
-
SSDEEP
98304:PogPXqsgfokGhBmzhtHyZP0p2W6/CXYZlHW8UZQjXRydgrOHNN:wsTk4mzjGcQW6/CXYfCZQjXRnOtN
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/3408-133-0x0000000000DF0000-0x0000000001C4F000-memory.dmp upx behavioral2/memory/3408-134-0x0000000000DF0000-0x0000000001C4F000-memory.dmp upx -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3408 wrote to memory of 3076 3408 ground.exe 83 PID 3408 wrote to memory of 3076 3408 ground.exe 83 PID 3076 wrote to memory of 3588 3076 cmd.exe 85 PID 3076 wrote to memory of 3588 3076 cmd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\ground.exe"C:\Users\Admin\AppData\Local\Temp\ground.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\ground.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:3588
-
-