Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 19:05
Static task
static1
Behavioral task
behavioral1
Sample
3699d6814e1a31c1be5e7f6322fd903e.exe
Resource
win7-20231215-en
General
-
Target
3699d6814e1a31c1be5e7f6322fd903e.exe
-
Size
1.6MB
-
MD5
3699d6814e1a31c1be5e7f6322fd903e
-
SHA1
54f582c43ccb80714111f04460f08e930a139282
-
SHA256
44224dfaff9ffd9823b2fbb56d5e352d9cf50c4197a2acb432723d661c3c7e8d
-
SHA512
d1ca136cecf4607fc0a1100cfbe68390fd93df4f857f1cb9e978cc856300e2606204b6e7a968f5330fa59e9810d4a78270ca13e31b89ac978812909486704c5b
-
SSDEEP
49152:s/fwUdLfGiPTStHxNtKgEAhK1kfqtOZ2Twjr5:swUdCi7KHs19tcl
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2032 3699d6814e1a31c1be5e7f6322fd903e.exe 2032 3699d6814e1a31c1be5e7f6322fd903e.exe 2032 3699d6814e1a31c1be5e7f6322fd903e.exe 2032 3699d6814e1a31c1be5e7f6322fd903e.exe 2364 3699d6814e1a31c1be5e7f6322fd903e.exe 2364 3699d6814e1a31c1be5e7f6322fd903e.exe 2364 3699d6814e1a31c1be5e7f6322fd903e.exe 2364 3699d6814e1a31c1be5e7f6322fd903e.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2364 3699d6814e1a31c1be5e7f6322fd903e.exe 2364 3699d6814e1a31c1be5e7f6322fd903e.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2364 2032 3699d6814e1a31c1be5e7f6322fd903e.exe 20 PID 2032 wrote to memory of 2364 2032 3699d6814e1a31c1be5e7f6322fd903e.exe 20 PID 2032 wrote to memory of 2364 2032 3699d6814e1a31c1be5e7f6322fd903e.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\3699d6814e1a31c1be5e7f6322fd903e.exe"C:\Users\Admin\AppData\Local\Temp\3699d6814e1a31c1be5e7f6322fd903e.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\3699d6814e1a31c1be5e7f6322fd903e.exe"C:\Users\Admin\AppData\Local\Temp\3699d6814e1a31c1be5e7f6322fd903e.exe" /wrapper /dir="C:\Users\Admin\AppData\Local\Temp\pkg_73518c0"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2364
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
108B
MD57ea6fb133fe37cc190fdfadc1f8e8bac
SHA14360d387176b4940f8d6c5ce77dde58a30d2cbf5
SHA256d97e91a158cc746a6a0f6c6c962b3efe0e3e989112808804eae82d74a08b3a19
SHA512fa560351d0b1de44245d056dfab4693c27677a981ec808155a6745242e965180979f01bb540e80ecbf9baca3e5dc60ef6753fd17800f5c0719ec6621d04bc85d