Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 21:56
Behavioral task
behavioral1
Sample
141657cf39b6b174d168ecfad3c2e161.exe
Resource
win7-20231215-en
6 signatures
150 seconds
General
-
Target
141657cf39b6b174d168ecfad3c2e161.exe
-
Size
35KB
-
MD5
141657cf39b6b174d168ecfad3c2e161
-
SHA1
b259bb4da780e57b6e0c6b39cfa4c5749cadea56
-
SHA256
2ff2aec9c87c743802b911725f63cfa5ecf199aa8e5eafc589908c0bc622bbad
-
SHA512
3a89d42bcfe79be6361a0ebd72a75a3d6378b02746f979b9042a93a433367bce0b8793af128c24a15dd527707ecaee3ebabf7fb6bf0aa005d5eab26d55da5bb7
-
SSDEEP
768:Fsl41kNloiiYTuuz0ty9oTQDLM1Is0q0m0ibQ7rs:FU4+NIYTbvguVXBm0ibks
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/1508-0-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/1508-4-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1508 141657cf39b6b174d168ecfad3c2e161.exe 1508 141657cf39b6b174d168ecfad3c2e161.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1508 141657cf39b6b174d168ecfad3c2e161.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1508 wrote to memory of 4516 1508 141657cf39b6b174d168ecfad3c2e161.exe 90 PID 1508 wrote to memory of 4516 1508 141657cf39b6b174d168ecfad3c2e161.exe 90 PID 1508 wrote to memory of 4516 1508 141657cf39b6b174d168ecfad3c2e161.exe 90 PID 1508 wrote to memory of 4516 1508 141657cf39b6b174d168ecfad3c2e161.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\141657cf39b6b174d168ecfad3c2e161.exe"C:\Users\Admin\AppData\Local\Temp\141657cf39b6b174d168ecfad3c2e161.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\notepad.exe"C:\Windows\notepad.exe"2⤵PID:4516
-