Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 08:12
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
11339b9786ac52823c6766eb5a786f82.exe
Resource
win7-20231215-en
4 signatures
150 seconds
General
-
Target
11339b9786ac52823c6766eb5a786f82.exe
-
Size
319KB
-
MD5
11339b9786ac52823c6766eb5a786f82
-
SHA1
03b65ab9637197b23ae22e6439bf859319240932
-
SHA256
6480b0ce042d075d28c46bfac455bc2d1f3d8a30435db0788d884c5550c8f787
-
SHA512
49c49c278b35229ae4dad29215fed922cea2d62679857b5df179a9685ee27a7b2d4ba34e0efde2eaba42b81ede90f6013cce7136430a6757e31d185bdffd348c
-
SSDEEP
1536:jRJMDyf1J/Z30qT2Cx9o5u1/3/cVyTKwt2RXzU7LnsoeHf:jH/ZhYQP/cV8Zt+Xz2so
Malware Config
Signatures
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2776 2920 WerFault.exe 1 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2920 wrote to memory of 2776 2920 11339b9786ac52823c6766eb5a786f82.exe 16 PID 2920 wrote to memory of 2776 2920 11339b9786ac52823c6766eb5a786f82.exe 16 PID 2920 wrote to memory of 2776 2920 11339b9786ac52823c6766eb5a786f82.exe 16 PID 2920 wrote to memory of 2776 2920 11339b9786ac52823c6766eb5a786f82.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\11339b9786ac52823c6766eb5a786f82.exe"C:\Users\Admin\AppData\Local\Temp\11339b9786ac52823c6766eb5a786f82.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2920 -s 3082⤵
- Program crash
PID:2776
-