Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
03-08-2023 07:57
Static task
static1
Behavioral task
behavioral1
Sample
63dbdf9801348b5c64e40a82079513bb.exe
Resource
win7-20230712-en
General
-
Target
63dbdf9801348b5c64e40a82079513bb.exe
-
Size
946KB
-
MD5
63dbdf9801348b5c64e40a82079513bb
-
SHA1
9dc98beaa5776f9288aeccc42bf7472c354f6b01
-
SHA256
746d3f266a1d6c17fd484a741cad28bb0578e63d235abefb6f949b90a1108a96
-
SHA512
669de3d25350ea678b6f222437b855f01346eea165a7f354d5057e0b998b9c0e5c1b01c5fd6bd7a81270256f31f254a136e72610c500f371b8af84b00d3ce8dc
-
SSDEEP
12288:ZEKaJo0mJfggmcGNZ8SuXx9iS9fYb7alHx6T7cm6dOxF/syH2/DMCR+:Lr/mcGNZeXrZ1mcMT7x6gF72/Df+
Malware Config
Signatures
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2576 set thread context of 2704 2576 63dbdf9801348b5c64e40a82079513bb.exe 30 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2704 63dbdf9801348b5c64e40a82079513bb.exe 2704 63dbdf9801348b5c64e40a82079513bb.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2704 63dbdf9801348b5c64e40a82079513bb.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2576 wrote to memory of 2704 2576 63dbdf9801348b5c64e40a82079513bb.exe 30 PID 2576 wrote to memory of 2704 2576 63dbdf9801348b5c64e40a82079513bb.exe 30 PID 2576 wrote to memory of 2704 2576 63dbdf9801348b5c64e40a82079513bb.exe 30 PID 2576 wrote to memory of 2704 2576 63dbdf9801348b5c64e40a82079513bb.exe 30 PID 2576 wrote to memory of 2704 2576 63dbdf9801348b5c64e40a82079513bb.exe 30 PID 2576 wrote to memory of 2704 2576 63dbdf9801348b5c64e40a82079513bb.exe 30 PID 2576 wrote to memory of 2704 2576 63dbdf9801348b5c64e40a82079513bb.exe 30 PID 2576 wrote to memory of 2704 2576 63dbdf9801348b5c64e40a82079513bb.exe 30 PID 2576 wrote to memory of 2704 2576 63dbdf9801348b5c64e40a82079513bb.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\63dbdf9801348b5c64e40a82079513bb.exe"C:\Users\Admin\AppData\Local\Temp\63dbdf9801348b5c64e40a82079513bb.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\63dbdf9801348b5c64e40a82079513bb.exe"C:\Users\Admin\AppData\Local\Temp\63dbdf9801348b5c64e40a82079513bb.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2704
-