Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2023 11:04
Behavioral task
behavioral1
Sample
14817abceacc2869286157bc5198ba30.exe
Resource
win7-20230831-en
windows7-x64
3 signatures
150 seconds
General
-
Target
14817abceacc2869286157bc5198ba30.exe
-
Size
4.3MB
-
MD5
14817abceacc2869286157bc5198ba30
-
SHA1
8d280a5abede4d4cfb2017ace6b172c69771d470
-
SHA256
a0755055fec6800ed05b9f1c5c1a997a279a6b992a0eca4b0dc3789120ac4ad3
-
SHA512
190825317c17477ea511f86f85476fa860728a1379e256415b6414b0fa43137322bcbbb37dd63ed4f67614efebbfd90667fc26d853bd92c3cd254405b637bec9
-
SSDEEP
98304:fVHtTKu7hiVzlYtbdmkrfKiu6vFAtgslXW9/Mp2dH+0EXy:fJxEVzQgkrfVuTtgD/Mp2A09
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/5032-0-0x00000000007B0000-0x000000000160E000-memory.dmp upx behavioral2/memory/5032-1-0x00000000007B0000-0x000000000160E000-memory.dmp upx -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 5032 wrote to memory of 1464 5032 14817abceacc2869286157bc5198ba30.exe 86 PID 5032 wrote to memory of 1464 5032 14817abceacc2869286157bc5198ba30.exe 86 PID 1464 wrote to memory of 3668 1464 cmd.exe 88 PID 1464 wrote to memory of 3668 1464 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\14817abceacc2869286157bc5198ba30.exe"C:\Users\Admin\AppData\Local\Temp\14817abceacc2869286157bc5198ba30.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\14817abceacc2869286157bc5198ba30.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:3668
-
-