Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04-01-2024 06:20
Static task
static1
Behavioral task
behavioral1
Sample
401def095849a5772723edd294a6fc7c.exe
Resource
win7-20231215-en
General
-
Target
401def095849a5772723edd294a6fc7c.exe
-
Size
506KB
-
MD5
401def095849a5772723edd294a6fc7c
-
SHA1
9598dba6a3c6610e759c1e98b3ca8405e943407b
-
SHA256
cccbbdbf1d3f3b1cc803c6dc5ed6fe353ab0669818434dbba5c728584f04be6a
-
SHA512
4a44c290fe75243bd6ebb1cbf52e995c8f8e8a9eba1ae7aae95e6b07121d2d3d046e2790b96e1f892dcae69e8f742914f65a023880fcfc7e5b2c54d6a6e10186
-
SSDEEP
6144:dDZNSEluCIjOL8qwWN/jlChMYZWiR9u9vnIT1TGtSV41kJDsTDDnYEte6xMxLV/z:RZLJLUf9snBS4csPYae6qfz
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 freegeoip.app 3 freegeoip.app -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 401def095849a5772723edd294a6fc7c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 401def095849a5772723edd294a6fc7c.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2088 401def095849a5772723edd294a6fc7c.exe 2088 401def095849a5772723edd294a6fc7c.exe 2088 401def095849a5772723edd294a6fc7c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2088 401def095849a5772723edd294a6fc7c.exe