Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
03/11/2023, 04:01
Behavioral task
behavioral1
Sample
04714e26b0a1ab0d836be6afb63f5cafc7aaf327da9c9f38cc821c1af19f2cd3.exe
Resource
win7-20231023-en
7 signatures
300 seconds
General
-
Target
04714e26b0a1ab0d836be6afb63f5cafc7aaf327da9c9f38cc821c1af19f2cd3.exe
-
Size
4.5MB
-
MD5
aef099404bd1e80155e604e7a3ee9f04
-
SHA1
99bffb27acd12667408261cb1ab7afa865791267
-
SHA256
04714e26b0a1ab0d836be6afb63f5cafc7aaf327da9c9f38cc821c1af19f2cd3
-
SHA512
22f4968ceaceb22d2326c6bcfedcf0b72693558d57726a2a55e85cb78f1b23b28ba124fd41ec62bb74bf316d925730f6b41470d62690a70c22e9afdb81ea7311
-
SSDEEP
98304:nyWmcgZrnATVRVjJQ9xP2MDLisY6NvglSVhO+8jEo:nTgZzULcPlPiL6pglSjCAo
Malware Config
Signatures
-
xoCreatorStealer 1 IoCs
xoCreatorStealer.
resource yara_rule behavioral1/memory/2100-1-0x000000013F970000-0x000000014071C000-memory.dmp xocreatorStealer -
Deletes itself 1 IoCs
pid Process 2172 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2100-0-0x000000013F970000-0x000000014071C000-memory.dmp upx behavioral1/memory/2100-1-0x000000013F970000-0x000000014071C000-memory.dmp upx -
Kills process with taskkill 1 IoCs
pid Process 2948 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2948 taskkill.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2948 2100 04714e26b0a1ab0d836be6afb63f5cafc7aaf327da9c9f38cc821c1af19f2cd3.exe 28 PID 2100 wrote to memory of 2948 2100 04714e26b0a1ab0d836be6afb63f5cafc7aaf327da9c9f38cc821c1af19f2cd3.exe 28 PID 2100 wrote to memory of 2948 2100 04714e26b0a1ab0d836be6afb63f5cafc7aaf327da9c9f38cc821c1af19f2cd3.exe 28 PID 2100 wrote to memory of 2172 2100 04714e26b0a1ab0d836be6afb63f5cafc7aaf327da9c9f38cc821c1af19f2cd3.exe 31 PID 2100 wrote to memory of 2172 2100 04714e26b0a1ab0d836be6afb63f5cafc7aaf327da9c9f38cc821c1af19f2cd3.exe 31 PID 2100 wrote to memory of 2172 2100 04714e26b0a1ab0d836be6afb63f5cafc7aaf327da9c9f38cc821c1af19f2cd3.exe 31 PID 2172 wrote to memory of 2668 2172 cmd.exe 33 PID 2172 wrote to memory of 2668 2172 cmd.exe 33 PID 2172 wrote to memory of 2668 2172 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\04714e26b0a1ab0d836be6afb63f5cafc7aaf327da9c9f38cc821c1af19f2cd3.exe"C:\Users\Admin\AppData\Local\Temp\04714e26b0a1ab0d836be6afb63f5cafc7aaf327da9c9f38cc821c1af19f2cd3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\system32\taskkill.exetaskkill /im chrome.exe /T /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2948
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\04714e26b0a1ab0d836be6afb63f5cafc7aaf327da9c9f38cc821c1af19f2cd3.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:2668
-
-