Analysis
-
max time kernel
126s -
max time network
132s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
30/08/2023, 07:32
Static task
static1
1 signatures
General
-
Target
87580a961a5291192b7c532cff9fc881b50bf00eaa0358f5c04a8a1365f6715a.exe
-
Size
423KB
-
MD5
b95eb08ebf455c7a70532fd75124eae4
-
SHA1
d463dcc31c9a4769eff68146d9ca780f984cc517
-
SHA256
87580a961a5291192b7c532cff9fc881b50bf00eaa0358f5c04a8a1365f6715a
-
SHA512
f2cbde3bacd515c0154944df2cbeae03f97f9906b9770ca7bc5e086724ee4d9ef74279ea1374e9e60d56eab5205d8cc61a378ed5e8feda80da9df8dc83b64117
-
SSDEEP
6144:lmfj+XWwIPq8+5XG2FvE8lDRSGrGWrN49yNh+uSWnuf+:ljGwIPq8QTvDlDRSGRlNIuH
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1508 87580a961a5291192b7c532cff9fc881b50bf00eaa0358f5c04a8a1365f6715a.exe 1508 87580a961a5291192b7c532cff9fc881b50bf00eaa0358f5c04a8a1365f6715a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1508 87580a961a5291192b7c532cff9fc881b50bf00eaa0358f5c04a8a1365f6715a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\87580a961a5291192b7c532cff9fc881b50bf00eaa0358f5c04a8a1365f6715a.exe"C:\Users\Admin\AppData\Local\Temp\87580a961a5291192b7c532cff9fc881b50bf00eaa0358f5c04a8a1365f6715a.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1508