Analysis
-
max time kernel
141s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 19:24
Static task
static1
Behavioral task
behavioral1
Sample
37b5208ec980c7212106d4e8db64341d.exe
Resource
win7-20231215-en
5 signatures
150 seconds
General
-
Target
37b5208ec980c7212106d4e8db64341d.exe
-
Size
1.7MB
-
MD5
37b5208ec980c7212106d4e8db64341d
-
SHA1
cebf98cb966505b33e6e0912d294e5ea7c177019
-
SHA256
2039a2dfdfe7c62f02b5c75219bcd31b273ded6d9e8243f5100c8526177c66e1
-
SHA512
a27a3fd34eefea4e3e00feaadc23000b7f68cf948a7f55f9b7186a499504eb06bc7b424c301cbd1eea44b7bfd33d7ebdd3b1b47a42c29bec238c49e26c541e93
-
SSDEEP
49152:NBSGaN4UvpPXjB+avGAsygKO/2nDRoRoDx+u0W1jX3c:NC4UvpPt+aeAlDe2l7b0W1Y
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4460 set thread context of 4820 4460 37b5208ec980c7212106d4e8db64341d.exe 95 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4820 37b5208ec980c7212106d4e8db64341d.exe 4820 37b5208ec980c7212106d4e8db64341d.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4820 37b5208ec980c7212106d4e8db64341d.exe 4820 37b5208ec980c7212106d4e8db64341d.exe 4820 37b5208ec980c7212106d4e8db64341d.exe 4820 37b5208ec980c7212106d4e8db64341d.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4460 wrote to memory of 4820 4460 37b5208ec980c7212106d4e8db64341d.exe 95 PID 4460 wrote to memory of 4820 4460 37b5208ec980c7212106d4e8db64341d.exe 95 PID 4460 wrote to memory of 4820 4460 37b5208ec980c7212106d4e8db64341d.exe 95 PID 4460 wrote to memory of 4820 4460 37b5208ec980c7212106d4e8db64341d.exe 95 PID 4460 wrote to memory of 4820 4460 37b5208ec980c7212106d4e8db64341d.exe 95 PID 4460 wrote to memory of 4820 4460 37b5208ec980c7212106d4e8db64341d.exe 95 PID 4460 wrote to memory of 4820 4460 37b5208ec980c7212106d4e8db64341d.exe 95 PID 4460 wrote to memory of 4820 4460 37b5208ec980c7212106d4e8db64341d.exe 95 PID 4460 wrote to memory of 4820 4460 37b5208ec980c7212106d4e8db64341d.exe 95 PID 4460 wrote to memory of 4820 4460 37b5208ec980c7212106d4e8db64341d.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\37b5208ec980c7212106d4e8db64341d.exe"C:\Users\Admin\AppData\Local\Temp\37b5208ec980c7212106d4e8db64341d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\37b5208ec980c7212106d4e8db64341d.exe"C:\Users\Admin\AppData\Local\Temp\37b5208ec980c7212106d4e8db64341d.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4820
-