Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
22/09/2023, 15:47
Static task
static1
1 signatures
General
-
Target
Test2.exe
-
Size
374KB
-
MD5
0aa73820fd1234a1d0e5ba11f1dc936f
-
SHA1
08fd78becff0bead7125b5f95922d5a61df6b964
-
SHA256
2ae4c13707afb3498dc27ce60559a92bfad6a24386ae7debfaacb7b34d4c91c2
-
SHA512
fee5236bf255744023fdc371c68b2760973450e4115da606f0c3a8c10518f7b448e1e2f2bc10f872ac8de0b220e36b98f3531dac023aaa932b7e3b5cd760d0ff
-
SSDEEP
6144:f99sE4qrs9M80OCJ+Xhv8iqmLv6QhlvYFRloQh:V+qrs+WASv8Pm7HvYFRloQh
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 10 IoCs
description ioc Process File created C:\Users\Admin\3D Objects\desktop.ini Test2.exe File created C:\Users\Admin\AppData\Local\Microsoft\Windows\Application Shortcuts\desktop.ini Test2.exe File created C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini Test2.exe File created C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini Test2.exe File created C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn1\desktop.ini Test2.exe File created C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn2\desktop.ini Test2.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini Test2.exe File created C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini Test2.exe File created C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini Test2.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini Test2.exe