Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 13:38
Behavioral task
behavioral1
Sample
72dde885f7ff69704e17199882ca57d0.exe
Resource
win7-20231215-en
General
-
Target
72dde885f7ff69704e17199882ca57d0.exe
-
Size
386KB
-
MD5
72dde885f7ff69704e17199882ca57d0
-
SHA1
8bbe11a79d71b8b3a35cc5eeda4dfa00afae1ecd
-
SHA256
4606b46ab0eea22f2dbd17295ee399bdc78d64bdd523edbee3c18de7d5659346
-
SHA512
74d70ec0f964b9606d3c62c29d80b11dce8be71d32ce441283bce2b3aca145b668777072178a036423f4d19ad5c7dff94de6ff07e176f921b6cfa2ea8305bbf1
-
SSDEEP
6144:RhJhWT3UEIA1CqzU75aDdrTPbNZAXdPRh2IQLtL2yy02V3IGcIFoSe8OI2:RzhGqAQqzU7GrTzNZeNAl2yy9BoSZOI2
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/228-0-0x0000000000DE0000-0x0000000000F2F000-memory.dmp upx behavioral2/files/0x0006000000023209-5.dat upx behavioral2/memory/228-6-0x0000000000DE0000-0x0000000000F2F000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 228 wrote to memory of 3544 228 72dde885f7ff69704e17199882ca57d0.exe 96 PID 228 wrote to memory of 3544 228 72dde885f7ff69704e17199882ca57d0.exe 96 PID 228 wrote to memory of 3544 228 72dde885f7ff69704e17199882ca57d0.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\72dde885f7ff69704e17199882ca57d0.exe"C:\Users\Admin\AppData\Local\Temp\72dde885f7ff69704e17199882ca57d0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\62.bat2⤵PID:3544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
174B
MD5df872d97c144f671bb9368b1d2e3bd16
SHA1857d1322c9a9658700bddbf08e0aa755633bcb88
SHA2560ce47d1ce979fc29ee3b640903879d04768cdb4ab9e98896979a261267b6f666
SHA51242e3a0ec71e2ce0e6a36f3e164365a500152c624fde7f8e926d32b5cdebe6acf19d7f8c9e2c955c7fe85de2416bc9f2f1e2fcdbd99e6b0e6720042ff9dd7e71a
-
Filesize
386KB
MD572dde885f7ff69704e17199882ca57d0
SHA18bbe11a79d71b8b3a35cc5eeda4dfa00afae1ecd
SHA2564606b46ab0eea22f2dbd17295ee399bdc78d64bdd523edbee3c18de7d5659346
SHA51274d70ec0f964b9606d3c62c29d80b11dce8be71d32ce441283bce2b3aca145b668777072178a036423f4d19ad5c7dff94de6ff07e176f921b6cfa2ea8305bbf1