Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2023, 01:37
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
97963955ebfd71197e6f713a54dad26b.exe
Resource
win7-20230831-en
5 signatures
150 seconds
General
-
Target
97963955ebfd71197e6f713a54dad26b.exe
-
Size
397KB
-
MD5
97963955ebfd71197e6f713a54dad26b
-
SHA1
65039a6d3b4b027c7888cce11ff525c8142c5560
-
SHA256
b87617482554dbaec97acbb9f97960cc3283fc2c51c2f6f7c2b935f0035e8b01
-
SHA512
60f9b5bfde902497a34581dab105b3b1e7535926dbe509da4e411af3e0cc58cc1ad487b1fd3838ce9875f225a6381b9a6e3e94721722de4a6b5ec0f823d5527d
-
SSDEEP
6144:joWZ0VA928qtt8Fret7WDoymp5IlNpN7LnvtHvqu5EIKcZqTm9tILkScGZYTp:joO0KM8mSKrIlNp9nvZqu5jyygYEIp
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3572 97963955ebfd71197e6f713a54dad26b.exe 3572 97963955ebfd71197e6f713a54dad26b.exe 3572 97963955ebfd71197e6f713a54dad26b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3572 97963955ebfd71197e6f713a54dad26b.exe