Analysis
-
max time kernel
0s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 01:07
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0987f8c064ae1df6179b1fea805d90a6.exe
Resource
win7-20231129-en
windows7-x64
5 signatures
150 seconds
General
-
Target
0987f8c064ae1df6179b1fea805d90a6.exe
-
Size
319KB
-
MD5
0987f8c064ae1df6179b1fea805d90a6
-
SHA1
244cdc00af7a48fe0be4021e57c5efa8edfcbf06
-
SHA256
3843f978c4fa1c2678fcc485917d4e3365f0c02b35dfe6e7f80c820d877f526e
-
SHA512
5bd3d02c0f7954fce60d7bbd9226531ca3a249d3fb34da46d253fa5796091a4857682bb0a7f667ff7c63809b785db3dd0a3539220dcc193b539c3185205fb3e9
-
SSDEEP
6144:91OgDPdkBAFZWjadD4sPj/9/f2BrxFk4mfH1fN1+6Psasl1S8HsOKLE6:91OgLdag/1f2BVF6tL+DHsOD6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2116 setup.exe -
Loads dropped DLL 4 IoCs
pid Process 780 0987f8c064ae1df6179b1fea805d90a6.exe 2116 setup.exe 2116 setup.exe 2116 setup.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 780 wrote to memory of 2116 780 0987f8c064ae1df6179b1fea805d90a6.exe 16 PID 780 wrote to memory of 2116 780 0987f8c064ae1df6179b1fea805d90a6.exe 16 PID 780 wrote to memory of 2116 780 0987f8c064ae1df6179b1fea805d90a6.exe 16 PID 780 wrote to memory of 2116 780 0987f8c064ae1df6179b1fea805d90a6.exe 16 PID 780 wrote to memory of 2116 780 0987f8c064ae1df6179b1fea805d90a6.exe 16 PID 780 wrote to memory of 2116 780 0987f8c064ae1df6179b1fea805d90a6.exe 16 PID 780 wrote to memory of 2116 780 0987f8c064ae1df6179b1fea805d90a6.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\0987f8c064ae1df6179b1fea805d90a6.exe"C:\Users\Admin\AppData\Local\Temp\0987f8c064ae1df6179b1fea805d90a6.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Users\Admin\AppData\Local\Temp\7zSFAA.tmp\setup.exe.\setup.exe /s2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2116
-