Analysis
-
max time kernel
119s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 12:10
Static task
static1
Behavioral task
behavioral1
Sample
35b66345f1c3290ca69590beaa4ce3e8.exe
Resource
win7-20231215-en
General
-
Target
35b66345f1c3290ca69590beaa4ce3e8.exe
-
Size
843KB
-
MD5
35b66345f1c3290ca69590beaa4ce3e8
-
SHA1
880396d988c3eb62442a6018abb133929fa8bf41
-
SHA256
9b64f57a1d8bb73e88ac85d60dd976baf6eef38f41cc54a1bb1fd320b92d1fd2
-
SHA512
e50030bcc7be5e2aaed59d58ac22bb6ab30438e65d0e212a15738653dbc9b723540ebe607fe35530723502d9057e016689f5d659818ba65db4632ec7ca88b390
-
SSDEEP
12288:vKPJkaflSaldGlCTa87+ttV6sQG3r/p0iEiRYhdtWAAxfr6IwCYeaZIPxSX9Evox:iPJka9trH+tdQabptpbJPq
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 freegeoip.app 3 freegeoip.app -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 35b66345f1c3290ca69590beaa4ce3e8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 35b66345f1c3290ca69590beaa4ce3e8.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2504 35b66345f1c3290ca69590beaa4ce3e8.exe 2504 35b66345f1c3290ca69590beaa4ce3e8.exe 2504 35b66345f1c3290ca69590beaa4ce3e8.exe 2504 35b66345f1c3290ca69590beaa4ce3e8.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2504 35b66345f1c3290ca69590beaa4ce3e8.exe