Analysis
-
max time kernel
110s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 07:47
Static task
static1
Behavioral task
behavioral1
Sample
128d060526551ebc89c0c51085983269.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
128d060526551ebc89c0c51085983269.exe
Resource
win10v2004-20231222-en
General
-
Target
128d060526551ebc89c0c51085983269.exe
-
Size
1.1MB
-
MD5
128d060526551ebc89c0c51085983269
-
SHA1
939ecdd0c4604ec6d6377e98eafe8800f92a3c69
-
SHA256
3a638d041ac61b861be0140d6a4b43aec20bc0df2db8904896bcff43625b955b
-
SHA512
8dfd47d22fe526b3356114341aa5883f9d58276d1d2608d017641783fd3e4d3ddca0a07100ff6feb7319d3dc90dd027418b7ecc391d66fa31baa01e0a8d66ba1
-
SSDEEP
24576:SFt+pJJ0bSiGKHLF8n6EWns+KU6jez1aYvT998rwBLQ:SfsJASiGKre6o+KHjY1JT991BL
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1652 128d060526551ebc89c0c51085983269.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~2\is259395810.log 128d060526551ebc89c0c51085983269.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main 128d060526551ebc89c0c51085983269.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1652 128d060526551ebc89c0c51085983269.exe 1652 128d060526551ebc89c0c51085983269.exe