Analysis
-
max time kernel
140s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
16-07-2023 11:50
Static task
static1
1 signatures
General
-
Target
586b149e7b423f55362019427b78e060604ea3c9789340a52acc76b91342c29a.exe
-
Size
456KB
-
MD5
a59b656227fd709f191d8d2365b0d03b
-
SHA1
218a951bb50b6446b9b13b32a7370699ded50806
-
SHA256
586b149e7b423f55362019427b78e060604ea3c9789340a52acc76b91342c29a
-
SHA512
22bd01cc8d4b754befe7f5a2f4d724f790033971c777c844d60b6a5695b48b529b7bbca51a4a2c960006524742b362d3945c8ce5cd26ae051e830ceb70281670
-
SSDEEP
6144:9LcNmQCtJm7tVuLEdMwh5Qj8Q3tBZjWroeGWUO4V/3LTFG:9ARrgEdJ2tfWrgW14dTF
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
586b149e7b423f55362019427b78e060604ea3c9789340a52acc76b91342c29a.exepid process 4032 586b149e7b423f55362019427b78e060604ea3c9789340a52acc76b91342c29a.exe 4032 586b149e7b423f55362019427b78e060604ea3c9789340a52acc76b91342c29a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
586b149e7b423f55362019427b78e060604ea3c9789340a52acc76b91342c29a.exedescription pid process Token: SeDebugPrivilege 4032 586b149e7b423f55362019427b78e060604ea3c9789340a52acc76b91342c29a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\586b149e7b423f55362019427b78e060604ea3c9789340a52acc76b91342c29a.exe"C:\Users\Admin\AppData\Local\Temp\586b149e7b423f55362019427b78e060604ea3c9789340a52acc76b91342c29a.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4032