Analysis
-
max time kernel
151s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2023 14:47
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
General
-
Target
file.exe
-
Size
1.5MB
-
MD5
bb2b000a39ed3285fc6282d530df692f
-
SHA1
881175620e72a7fde25e086a8091eabed12f3eb9
-
SHA256
55e9b1c3ec5c6d634dcfd03b8456c14b39743f3c2330605c650d22065a0a381b
-
SHA512
08247687ad2943242ea8705b6bb964dc51e9972374a27f2de6c6a88aed98825fc60b0d4ef5ba55276376264745438e447005c4f5bd72252f58909e2854e8a2e5
-
SSDEEP
24576:2s9rN9YwPzIFbDslb50xVKwWNMpqenCDm/v2KkUuXWxwHTKiJq7E/7zQesADyIVe:v9rNWwbeP9KHNODnXIXsyKi8e7EesADK
Malware Config
Signatures
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 224 file.exe 224 file.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1976 set thread context of 224 1976 file.exe 87 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe 224 file.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1976 file.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1976 file.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1976 wrote to memory of 224 1976 file.exe 87 PID 1976 wrote to memory of 224 1976 file.exe 87 PID 1976 wrote to memory of 224 1976 file.exe 87 PID 1976 wrote to memory of 224 1976 file.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:224
-