Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 20:46
Behavioral task
behavioral1
Sample
1c1f5a9ec5317d602c47f1cc9fb1b2ae.exe
Resource
win7-20231215-en
4 signatures
150 seconds
General
-
Target
1c1f5a9ec5317d602c47f1cc9fb1b2ae.exe
-
Size
251KB
-
MD5
1c1f5a9ec5317d602c47f1cc9fb1b2ae
-
SHA1
1b0fd9b37ced1ca3942524c58fd5978105c97d18
-
SHA256
a4e72719716bcf329fc79e5a86090978f4e91fbb584d4f87acc8c504737ce9d8
-
SHA512
59a524ebce0d3476db5095f1261821ec9f7eb078b16a739d906056ad61f615580f596bef18fa80b39d7dde9b23fb9cbc050011d2ab5ee1df14f20b6ce396e00b
-
SSDEEP
3072:dHYootXWczoiTqEhGbIYV12NC776OOPtfghlGFsRK/Cm0rOmdNu1VYR2tD+3U:d4ootXi2Qq1PGdm0rjNOY0tqk
Malware Config
Signatures
-
Nirsoft 1 IoCs
resource yara_rule behavioral1/memory/2256-1-0x0000000000400000-0x0000000000425000-memory.dmp Nirsoft -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2256-0-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2256-1-0x0000000000400000-0x0000000000425000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2256 1c1f5a9ec5317d602c47f1cc9fb1b2ae.exe