Analysis
-
max time kernel
147s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
28-12-2023 19:47
Behavioral task
behavioral1
Sample
f3abcc954b5df6aab6332a634852d7d0.exe
Resource
win7-20231129-en
windows7-x64
5 signatures
150 seconds
General
-
Target
f3abcc954b5df6aab6332a634852d7d0.exe
-
Size
200KB
-
MD5
f3abcc954b5df6aab6332a634852d7d0
-
SHA1
196d2ee0fe0a1c90c716efbb46e36b0583898161
-
SHA256
02d752e92511281d36c2bb136ffd89ac0107949194871056080db4f223cf7a13
-
SHA512
c6d8bf6010d1cc3a599056a7092cc2099081f044de7101eae32945f62c2b6c7de78282fffa9f3fe5a74d105001db2fdc6bac7a071f29ad766331fdf4a904c030
-
SSDEEP
3072:FsRPRKyeIKDWx85IOlKeJVos/8eRwXiUUAdV95I4Rp+LH1xrl3Ez8ub8Xr7:FsRPRKdIKCC0ef//uXltKc+LVsz9b8
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/2224-5-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/2224-6-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/2224-8-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/2224-4-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/2224-2-0x0000000000400000-0x0000000000453000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4968 set thread context of 2224 4968 f3abcc954b5df6aab6332a634852d7d0.exe 20 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4968 f3abcc954b5df6aab6332a634852d7d0.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4968 wrote to memory of 2224 4968 f3abcc954b5df6aab6332a634852d7d0.exe 20 PID 4968 wrote to memory of 2224 4968 f3abcc954b5df6aab6332a634852d7d0.exe 20 PID 4968 wrote to memory of 2224 4968 f3abcc954b5df6aab6332a634852d7d0.exe 20 PID 4968 wrote to memory of 2224 4968 f3abcc954b5df6aab6332a634852d7d0.exe 20 PID 4968 wrote to memory of 2224 4968 f3abcc954b5df6aab6332a634852d7d0.exe 20 PID 4968 wrote to memory of 2224 4968 f3abcc954b5df6aab6332a634852d7d0.exe 20 PID 4968 wrote to memory of 2224 4968 f3abcc954b5df6aab6332a634852d7d0.exe 20 PID 4968 wrote to memory of 2224 4968 f3abcc954b5df6aab6332a634852d7d0.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3abcc954b5df6aab6332a634852d7d0.exe"C:\Users\Admin\AppData\Local\Temp\f3abcc954b5df6aab6332a634852d7d0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\f3abcc954b5df6aab6332a634852d7d0.exe/scomma "C:\Users\Admin\AppData\Local\Temp\tmp.ini"2⤵PID:2224
-