Analysis
-
max time kernel
0s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 00:29
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1cf906081b6cc09659390d6b711f30d2.exe
Resource
win7-20231215-en
13 signatures
150 seconds
General
-
Target
1cf906081b6cc09659390d6b711f30d2.exe
-
Size
255KB
-
MD5
1cf906081b6cc09659390d6b711f30d2
-
SHA1
d79476d632f31bbff67fbd6481f15a98a89245dd
-
SHA256
a330fe53a7cb9c198a5a6c84656ab2973ed86fbac50a4978ec316b12e5b3e8b9
-
SHA512
4b171607c34c7b5c82c54fb3d0629d3c8d4ef0852c0e2b4ac6e163c3a9ef522a42ce1e801d65fbb21985ebd3c284ef9054d3749027f5726588406195217f311b
-
SSDEEP
6144:h1OgDPdkBAFZWjadD4s5zXBHRRZzQhQCHjKNEoWACSWDl:h1OgLdaOz9pQC9Uvr
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2440 513f8cf1d8246.exe -
Loads dropped DLL 1 IoCs
pid Process 2440 513f8cf1d8246.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/2440-79-0x0000000074940000-0x000000007494A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral2/files/0x0006000000023234-31.dat nsis_installer_1 behavioral2/files/0x0006000000023234-31.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3944 wrote to memory of 2440 3944 1cf906081b6cc09659390d6b711f30d2.exe 15 PID 3944 wrote to memory of 2440 3944 1cf906081b6cc09659390d6b711f30d2.exe 15 PID 3944 wrote to memory of 2440 3944 1cf906081b6cc09659390d6b711f30d2.exe 15
Processes
-
C:\Users\Admin\AppData\Local\Temp\1cf906081b6cc09659390d6b711f30d2.exe"C:\Users\Admin\AppData\Local\Temp\1cf906081b6cc09659390d6b711f30d2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\7zS543A.tmp\513f8cf1d8246.exe.\513f8cf1d8246.exe /s2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2440
-