Analysis
-
max time kernel
148s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 01:36
Static task
static1
Behavioral task
behavioral1
Sample
230348859fd28e85ef0bdbd2ba2ec666.exe
Resource
win7-20231215-en
General
-
Target
230348859fd28e85ef0bdbd2ba2ec666.exe
-
Size
523KB
-
MD5
230348859fd28e85ef0bdbd2ba2ec666
-
SHA1
bde20ad5521bbc60d09dea6c5cb7afc41ea32cb7
-
SHA256
90a23b6b7ac7d0b33a1bdfeef9538dd9b2fba3ef2560635c0967f79f22d1cd1b
-
SHA512
a0ebee7d93156d183239b13961e723f30e3b8ea0621cfa9282698ca9f1ee645533c27118b731706d5e992b18f8ac7a65377eab2a2612bd3284ad1da4483ada7f
-
SSDEEP
12288:e6IAqCqgsSkMhiFtuPDOH7z8LjUXrjrD8pR9B7bKAp:mBEkMhi3Y07QLjUXrz8v9B72Ap
Malware Config
Signatures
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3092 set thread context of 3948 3092 230348859fd28e85ef0bdbd2ba2ec666.exe 94 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3948 230348859fd28e85ef0bdbd2ba2ec666.exe 3948 230348859fd28e85ef0bdbd2ba2ec666.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3948 230348859fd28e85ef0bdbd2ba2ec666.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3092 wrote to memory of 3948 3092 230348859fd28e85ef0bdbd2ba2ec666.exe 94 PID 3092 wrote to memory of 3948 3092 230348859fd28e85ef0bdbd2ba2ec666.exe 94 PID 3092 wrote to memory of 3948 3092 230348859fd28e85ef0bdbd2ba2ec666.exe 94 PID 3092 wrote to memory of 3948 3092 230348859fd28e85ef0bdbd2ba2ec666.exe 94 PID 3092 wrote to memory of 3948 3092 230348859fd28e85ef0bdbd2ba2ec666.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\230348859fd28e85ef0bdbd2ba2ec666.exe"C:\Users\Admin\AppData\Local\Temp\230348859fd28e85ef0bdbd2ba2ec666.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\230348859fd28e85ef0bdbd2ba2ec666.exeC:\Users\Admin\AppData\Local\Temp\230348859fd28e85ef0bdbd2ba2ec666.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3948
-