Analysis
-
max time kernel
128s -
max time network
137s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
18/08/2023, 14:53
Static task
static1
1 signatures
General
-
Target
8427a190068871fee942a2d223d930b42a86d5a964a5727fcf84af59270c9b29.exe
-
Size
369KB
-
MD5
d96608999949e46235ad9d6197b05da7
-
SHA1
975783edfaf7cd0d3f94fe3816135b7ce6fdcb78
-
SHA256
8427a190068871fee942a2d223d930b42a86d5a964a5727fcf84af59270c9b29
-
SHA512
2d47c205304896b85c0131b5e24a723a7dec51fda546287ce63d20cf110f9cdd51dc9293cb29fd70cf050c998c30417b6b2695c904e2d3020535abc5b8312de0
-
SSDEEP
6144:RQLv/UgP1YwWwglHclFhXPxLypWEIEyHsTuvPX++w6a8AAoc2jjGwD:OL/UghjglUXZg0EyHlPX+LKBwD
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3924 8427a190068871fee942a2d223d930b42a86d5a964a5727fcf84af59270c9b29.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3924 8427a190068871fee942a2d223d930b42a86d5a964a5727fcf84af59270c9b29.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8427a190068871fee942a2d223d930b42a86d5a964a5727fcf84af59270c9b29.exe"C:\Users\Admin\AppData\Local\Temp\8427a190068871fee942a2d223d930b42a86d5a964a5727fcf84af59270c9b29.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3924