Analysis
-
max time kernel
143s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 01:13
Behavioral task
behavioral1
Sample
22a4e3fe84c4bb3e79b289ac053c77d1.exe
Resource
win7-20231215-en
General
-
Target
22a4e3fe84c4bb3e79b289ac053c77d1.exe
-
Size
1.9MB
-
MD5
22a4e3fe84c4bb3e79b289ac053c77d1
-
SHA1
7fe44f740fb2eaf7ffb85520e06e4149fa443d84
-
SHA256
f14c125600acad1e6aa330deb5aca520f3fa83e747d2e094d4a337e83b413da5
-
SHA512
86d6e0ac0613f33b47e59f2c8f9fa8d7bf34b3bfd41bb655e6fb39e133e7d4ee2183c95852edaf173a1e6a089943355c87f17a297672f07db5b56a422ecc769c
-
SSDEEP
24576:C3q4nvYveRLfRq3hwwy8nCAlmd/l/hAot8rhhUF54clNf7+6uHAW92zt/sWu2BSW:74nQe5qWGYlZA88to54clgLH+tkWJ0
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral2/memory/5100-0-0x00000217EAC70000-0x00000217EAF84000-memory.dmp vmprotect -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 19 ip-api.com 4 api.ipify.org 5 api.ipify.org -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
22a4e3fe84c4bb3e79b289ac053c77d1.exepid process 5100 22a4e3fe84c4bb3e79b289ac053c77d1.exe 5100 22a4e3fe84c4bb3e79b289ac053c77d1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
22a4e3fe84c4bb3e79b289ac053c77d1.exedescription pid process Token: SeDebugPrivilege 5100 22a4e3fe84c4bb3e79b289ac053c77d1.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/5100-0-0x00000217EAC70000-0x00000217EAF84000-memory.dmpFilesize
3.1MB
-
memory/5100-1-0x00007FFBE9770000-0x00007FFBEA231000-memory.dmpFilesize
10.8MB
-
memory/5100-2-0x00000217ED570000-0x00000217ED580000-memory.dmpFilesize
64KB
-
memory/5100-3-0x00000217EB330000-0x00000217EB331000-memory.dmpFilesize
4KB
-
memory/5100-4-0x00000217EB330000-0x00000217EB331000-memory.dmpFilesize
4KB
-
memory/5100-5-0x00000217ED580000-0x00000217ED5F6000-memory.dmpFilesize
472KB
-
memory/5100-48-0x00007FFBE9770000-0x00007FFBEA231000-memory.dmpFilesize
10.8MB
-
memory/5100-49-0x00000217ED570000-0x00000217ED580000-memory.dmpFilesize
64KB
-
memory/5100-50-0x00000217EB330000-0x00000217EB331000-memory.dmpFilesize
4KB
-
memory/5100-57-0x00007FFBE9770000-0x00007FFBEA231000-memory.dmpFilesize
10.8MB