Analysis
-
max time kernel
155s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2023 16:33
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1.exe
Resource
win7-20230831-en
windows7-x64
2 signatures
150 seconds
General
-
Target
1.exe
-
Size
779KB
-
MD5
71b5e70a257f47dd6c9ead4f1010bd88
-
SHA1
f75c41ecbf6f34ca0048534d72f8847b37c38229
-
SHA256
9edcf4905388c25cb2782272ed5458157c6fded7d6e5ef0439102f1c74fd9925
-
SHA512
475fd6c74c835fcdc765b56bb7baa18926e6da6c497f160386429938148f9277447918a678b41c9bf1293988896530f4fcac17d1fa93f630a446263f07d9f45f
-
SSDEEP
12288:ksUHsZCB1OcBfiv3P6gIo/Bw9av4Xzo0P9MqETKTvNo4UvXCt:k3RB8Wfiv3PJImBw9ag5P9MqETWxI
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
1.exedescription pid process target process PID 2208 wrote to memory of 4592 2208 1.exe cmd.exe PID 2208 wrote to memory of 4592 2208 1.exe cmd.exe