Analysis
-
max time kernel
148s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2023 20:51
Behavioral task
behavioral1
Sample
2836-50-0x0000000000910000-0x0000000001514000-memory.exe
Resource
win7-20231130-en
windows7-x64
0 signatures
150 seconds
General
-
Target
2836-50-0x0000000000910000-0x0000000001514000-memory.exe
-
Size
4.8MB
-
MD5
78ad2455f30c12d359b7e10546baf479
-
SHA1
7aac93607c4d4bf9ad027aeb0ef5013795c4a45f
-
SHA256
85d2b713e465ffed2001927bb194f09cf5af8c5b8691795b796e82baf9a9f75e
-
SHA512
17b1cf1627ab0db6f1bb1ca1aad48915037657a2ec8c445670b7a4ae2df58541324776923c10eeddb48b2be139b88707de52b726f3b039b250cff1ac8fdd3c18
-
SSDEEP
98304:2q4B3mbsPhneX4B3mbsPhnvxWcin2jldkNMbq/v9vf4JPThv:geAvxNjjl3jB1v
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/4760-1-0x0000000000310000-0x0000000000F14000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4760 2836-50-0x0000000000910000-0x0000000001514000-memory.exe 4760 2836-50-0x0000000000910000-0x0000000001514000-memory.exe 4760 2836-50-0x0000000000910000-0x0000000001514000-memory.exe 4760 2836-50-0x0000000000910000-0x0000000001514000-memory.exe 4760 2836-50-0x0000000000910000-0x0000000001514000-memory.exe 4760 2836-50-0x0000000000910000-0x0000000001514000-memory.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4760 2836-50-0x0000000000910000-0x0000000001514000-memory.exe