Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2023, 20:28
Static task
static1
Behavioral task
behavioral1
Sample
232470444 Precise PO.exe
Resource
win7-20230712-en
General
-
Target
232470444 Precise PO.exe
-
Size
604KB
-
MD5
13222327967b090cf32bd7bb266f4c4f
-
SHA1
9f48440b76715716d4841e9cdad6c41d801772f5
-
SHA256
df7d91d4002f96a8852431095308e5271f900a30125ec3d1d55beb80c6995d1f
-
SHA512
d55f35eb06b195bc938f0e6f0b98f484b5281ca4cefd763a93b821d296a128061324aa89f8ea558f27b6d9ac84fbdf56ebae04123dff9563157d9fad68c366f0
-
SSDEEP
12288:87Mxm/gPrkhaDcivBlqH8wF+HtbpuLwEBk9iUu6S9SnzHWC:871wrkhaDxZHC+HUBk9iUuEH
Malware Config
Signatures
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 28 api.ipify.org 29 api.ipify.org -
Suspicious behavior: EnumeratesProcesses 58 IoCs
pid Process 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe 4384 232470444 Precise PO.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4384 232470444 Precise PO.exe