Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 13:38
Behavioral task
behavioral1
Sample
72dde885f7ff69704e17199882ca57d0.exe
Resource
win7-20231215-en
General
-
Target
72dde885f7ff69704e17199882ca57d0.exe
-
Size
386KB
-
MD5
72dde885f7ff69704e17199882ca57d0
-
SHA1
8bbe11a79d71b8b3a35cc5eeda4dfa00afae1ecd
-
SHA256
4606b46ab0eea22f2dbd17295ee399bdc78d64bdd523edbee3c18de7d5659346
-
SHA512
74d70ec0f964b9606d3c62c29d80b11dce8be71d32ce441283bce2b3aca145b668777072178a036423f4d19ad5c7dff94de6ff07e176f921b6cfa2ea8305bbf1
-
SSDEEP
6144:RhJhWT3UEIA1CqzU75aDdrTPbNZAXdPRh2IQLtL2yy02V3IGcIFoSe8OI2:RzhGqAQqzU7GrTzNZeNAl2yy9BoSZOI2
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1760-0-0x0000000000C60000-0x0000000000DAF000-memory.dmp upx behavioral1/files/0x000c000000012695-10.dat upx behavioral1/memory/1760-11-0x0000000000C60000-0x0000000000DAF000-memory.dmp upx -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1760 wrote to memory of 2788 1760 72dde885f7ff69704e17199882ca57d0.exe 28 PID 1760 wrote to memory of 2788 1760 72dde885f7ff69704e17199882ca57d0.exe 28 PID 1760 wrote to memory of 2788 1760 72dde885f7ff69704e17199882ca57d0.exe 28 PID 1760 wrote to memory of 2788 1760 72dde885f7ff69704e17199882ca57d0.exe 28
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175B
MD5a9c08ec585960e6903a2f232916ec2ca
SHA1bc51a1b48c5ed994674ef163e9a480e604efdffe
SHA256137730b85ae0ac297d041fcac03e755f20df676b413476b499205f290aceb3f1
SHA5127ffa7bf24ee2cd20502795c2f49ba62aba5cbc8c0b7c3197e8a0dd2396c34db3db021eb8cc45910b0678b05d03ce8d709e55ee478275b8ad72ec351f03f3d700
-
Filesize
386KB
MD572dde885f7ff69704e17199882ca57d0
SHA18bbe11a79d71b8b3a35cc5eeda4dfa00afae1ecd
SHA2564606b46ab0eea22f2dbd17295ee399bdc78d64bdd523edbee3c18de7d5659346
SHA51274d70ec0f964b9606d3c62c29d80b11dce8be71d32ce441283bce2b3aca145b668777072178a036423f4d19ad5c7dff94de6ff07e176f921b6cfa2ea8305bbf1