Analysis
-
max time kernel
127s -
max time network
131s -
platform
windows10-1703_x64 -
resource
win10-20231020-en -
resource tags
arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system -
submitted
30/10/2023, 07:15
Static task
static1
General
-
Target
9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe
-
Size
683KB
-
MD5
b4c67afbce5715b8bc9c3b652564ee22
-
SHA1
1904a8f85514871157edf7111cba2e92682af03c
-
SHA256
9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9
-
SHA512
91a1d56355c0159a07137080a9efe588589ed980b71876a434db7247c4fe48f71d510eef4bdf0960e307395e023916d79ca9d832f0986891147869e299e034ad
-
SSDEEP
12288:4D6oYmy0vvcL0xzonhWwnW56viEUrvPiKaTicl80cwenIS93p3qVy4FML:ay0HcLIzMWFjvDPiKaTiclDcwi93MVyH
Malware Config
Signatures
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe 3136 9e3176f4b02bade546d7e7965ae7a7092977be4f822ad927e62e6603de83e2f9.exe