Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
28-12-2023 19:47
Behavioral task
behavioral1
Sample
f3abcc954b5df6aab6332a634852d7d0.exe
Resource
win7-20231129-en
windows7-x64
5 signatures
150 seconds
General
-
Target
f3abcc954b5df6aab6332a634852d7d0.exe
-
Size
200KB
-
MD5
f3abcc954b5df6aab6332a634852d7d0
-
SHA1
196d2ee0fe0a1c90c716efbb46e36b0583898161
-
SHA256
02d752e92511281d36c2bb136ffd89ac0107949194871056080db4f223cf7a13
-
SHA512
c6d8bf6010d1cc3a599056a7092cc2099081f044de7101eae32945f62c2b6c7de78282fffa9f3fe5a74d105001db2fdc6bac7a071f29ad766331fdf4a904c030
-
SSDEEP
3072:FsRPRKyeIKDWx85IOlKeJVos/8eRwXiUUAdV95I4Rp+LH1xrl3Ez8ub8Xr7:FsRPRKdIKCC0ef//uXltKc+LVsz9b8
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral1/memory/2212-2-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/2212-7-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/2212-6-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/2212-5-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/2212-4-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/2212-9-0x0000000000400000-0x0000000000453000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
Processes:
f3abcc954b5df6aab6332a634852d7d0.exedescription pid process target process PID 1068 set thread context of 2212 1068 f3abcc954b5df6aab6332a634852d7d0.exe f3abcc954b5df6aab6332a634852d7d0.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
f3abcc954b5df6aab6332a634852d7d0.exepid process 1068 f3abcc954b5df6aab6332a634852d7d0.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
f3abcc954b5df6aab6332a634852d7d0.exedescription pid process target process PID 1068 wrote to memory of 2212 1068 f3abcc954b5df6aab6332a634852d7d0.exe f3abcc954b5df6aab6332a634852d7d0.exe PID 1068 wrote to memory of 2212 1068 f3abcc954b5df6aab6332a634852d7d0.exe f3abcc954b5df6aab6332a634852d7d0.exe PID 1068 wrote to memory of 2212 1068 f3abcc954b5df6aab6332a634852d7d0.exe f3abcc954b5df6aab6332a634852d7d0.exe PID 1068 wrote to memory of 2212 1068 f3abcc954b5df6aab6332a634852d7d0.exe f3abcc954b5df6aab6332a634852d7d0.exe PID 1068 wrote to memory of 2212 1068 f3abcc954b5df6aab6332a634852d7d0.exe f3abcc954b5df6aab6332a634852d7d0.exe PID 1068 wrote to memory of 2212 1068 f3abcc954b5df6aab6332a634852d7d0.exe f3abcc954b5df6aab6332a634852d7d0.exe PID 1068 wrote to memory of 2212 1068 f3abcc954b5df6aab6332a634852d7d0.exe f3abcc954b5df6aab6332a634852d7d0.exe PID 1068 wrote to memory of 2212 1068 f3abcc954b5df6aab6332a634852d7d0.exe f3abcc954b5df6aab6332a634852d7d0.exe PID 1068 wrote to memory of 2212 1068 f3abcc954b5df6aab6332a634852d7d0.exe f3abcc954b5df6aab6332a634852d7d0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3abcc954b5df6aab6332a634852d7d0.exe/scomma "C:\Users\Admin\AppData\Local\Temp\tmp.ini"1⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\f3abcc954b5df6aab6332a634852d7d0.exe"C:\Users\Admin\AppData\Local\Temp\f3abcc954b5df6aab6332a634852d7d0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1068