Analysis
-
max time kernel
146s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 20:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3a4cdc468b0edc9964fc0e5f29e36339.exe
Resource
win7-20231129-en
windows7-x64
3 signatures
150 seconds
General
-
Target
3a4cdc468b0edc9964fc0e5f29e36339.exe
-
Size
188KB
-
MD5
3a4cdc468b0edc9964fc0e5f29e36339
-
SHA1
a9ba533f36c00f9a0a7a539a8a889c72fea74f95
-
SHA256
4ea6c083a82d695511e61d9d2f76f1ddc0999979cf1a2c0a7d2a34d9da12b144
-
SHA512
57eaa01a9c0588642db8a94e765b4b1fc31f4dcc08d1ac5809da2e65bdcc14c1e27ac893b46717099c37f04760898205d47d37668d09bdf602bb9a454b97a28e
-
SSDEEP
3072:MQWYAu1vWsaPxUlJmOkuxNQWX4orjH+WEn83/pro:PTvtaaXBr6yPFo
Malware Config
Extracted
Credentials
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
iran2012
Extracted
Credentials
Protocol: smtp- Host:
smtp.uk.aol.com - Port:
587 - Username:
[email protected] - Password:
iran2012
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2988 3a4cdc468b0edc9964fc0e5f29e36339.exe 2988 3a4cdc468b0edc9964fc0e5f29e36339.exe 2988 3a4cdc468b0edc9964fc0e5f29e36339.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2988 3a4cdc468b0edc9964fc0e5f29e36339.exe