Analysis
-
max time kernel
148s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 09:16
Static task
static1
Behavioral task
behavioral1
Sample
14263b0631f597845188057be3691bb9.exe
Resource
win7-20231215-en
5 signatures
150 seconds
General
-
Target
14263b0631f597845188057be3691bb9.exe
-
Size
1.0MB
-
MD5
14263b0631f597845188057be3691bb9
-
SHA1
befff196dfaa0a8e61afe357e59b575a9f148556
-
SHA256
104e95600fdacdde44a7fbb50558fb903384a4f1ccc7ec6deb439c537dd46ff3
-
SHA512
ee95e98911513be0fdea21a4d252fc4bc83dfc35661ec254eea01c942619372a9f71284cfbe61a762edbc4a4c28d644d1f2028d997d16ca198c7df1c2ace37ad
-
SSDEEP
24576:QGVXJ4yo9yDra1opzC6Nb/Y/iTkqLrQYdgi4CICr8HGvoevo2:BocCH6NTTkqLrQYdgi4CICr2Gvoevp
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1372 set thread context of 1168 1372 14263b0631f597845188057be3691bb9.exe 95 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1168 14263b0631f597845188057be3691bb9.exe 1168 14263b0631f597845188057be3691bb9.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1168 14263b0631f597845188057be3691bb9.exe 1168 14263b0631f597845188057be3691bb9.exe 1168 14263b0631f597845188057be3691bb9.exe 1168 14263b0631f597845188057be3691bb9.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1372 wrote to memory of 1168 1372 14263b0631f597845188057be3691bb9.exe 95 PID 1372 wrote to memory of 1168 1372 14263b0631f597845188057be3691bb9.exe 95 PID 1372 wrote to memory of 1168 1372 14263b0631f597845188057be3691bb9.exe 95 PID 1372 wrote to memory of 1168 1372 14263b0631f597845188057be3691bb9.exe 95 PID 1372 wrote to memory of 1168 1372 14263b0631f597845188057be3691bb9.exe 95 PID 1372 wrote to memory of 1168 1372 14263b0631f597845188057be3691bb9.exe 95 PID 1372 wrote to memory of 1168 1372 14263b0631f597845188057be3691bb9.exe 95 PID 1372 wrote to memory of 1168 1372 14263b0631f597845188057be3691bb9.exe 95 PID 1372 wrote to memory of 1168 1372 14263b0631f597845188057be3691bb9.exe 95 PID 1372 wrote to memory of 1168 1372 14263b0631f597845188057be3691bb9.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\14263b0631f597845188057be3691bb9.exe"C:\Users\Admin\AppData\Local\Temp\14263b0631f597845188057be3691bb9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\14263b0631f597845188057be3691bb9.exe"C:\Users\Admin\AppData\Local\Temp\14263b0631f597845188057be3691bb9.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1168
-