Analysis
-
max time kernel
171s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 09:16
Static task
static1
Behavioral task
behavioral1
Sample
14263b0631f597845188057be3691bb9.exe
Resource
win7-20231215-en
5 signatures
150 seconds
General
-
Target
14263b0631f597845188057be3691bb9.exe
-
Size
1.0MB
-
MD5
14263b0631f597845188057be3691bb9
-
SHA1
befff196dfaa0a8e61afe357e59b575a9f148556
-
SHA256
104e95600fdacdde44a7fbb50558fb903384a4f1ccc7ec6deb439c537dd46ff3
-
SHA512
ee95e98911513be0fdea21a4d252fc4bc83dfc35661ec254eea01c942619372a9f71284cfbe61a762edbc4a4c28d644d1f2028d997d16ca198c7df1c2ace37ad
-
SSDEEP
24576:QGVXJ4yo9yDra1opzC6Nb/Y/iTkqLrQYdgi4CICr8HGvoevo2:BocCH6NTTkqLrQYdgi4CICr2Gvoevp
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2460 set thread context of 2704 2460 14263b0631f597845188057be3691bb9.exe 29 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2704 14263b0631f597845188057be3691bb9.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2704 14263b0631f597845188057be3691bb9.exe 2704 14263b0631f597845188057be3691bb9.exe 2704 14263b0631f597845188057be3691bb9.exe 2704 14263b0631f597845188057be3691bb9.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2460 wrote to memory of 2704 2460 14263b0631f597845188057be3691bb9.exe 29 PID 2460 wrote to memory of 2704 2460 14263b0631f597845188057be3691bb9.exe 29 PID 2460 wrote to memory of 2704 2460 14263b0631f597845188057be3691bb9.exe 29 PID 2460 wrote to memory of 2704 2460 14263b0631f597845188057be3691bb9.exe 29 PID 2460 wrote to memory of 2704 2460 14263b0631f597845188057be3691bb9.exe 29 PID 2460 wrote to memory of 2704 2460 14263b0631f597845188057be3691bb9.exe 29 PID 2460 wrote to memory of 2704 2460 14263b0631f597845188057be3691bb9.exe 29 PID 2460 wrote to memory of 2704 2460 14263b0631f597845188057be3691bb9.exe 29 PID 2460 wrote to memory of 2704 2460 14263b0631f597845188057be3691bb9.exe 29 PID 2460 wrote to memory of 2704 2460 14263b0631f597845188057be3691bb9.exe 29 PID 2460 wrote to memory of 2704 2460 14263b0631f597845188057be3691bb9.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\14263b0631f597845188057be3691bb9.exe"C:\Users\Admin\AppData\Local\Temp\14263b0631f597845188057be3691bb9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\14263b0631f597845188057be3691bb9.exe"C:\Users\Admin\AppData\Local\Temp\14263b0631f597845188057be3691bb9.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2704
-