Analysis
-
max time kernel
0s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
05-01-2024 05:01
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
42d222cfe08a8e609a71630308920e58.exe
Resource
win7-20231215-en
windows7-x64
10 signatures
150 seconds
General
-
Target
42d222cfe08a8e609a71630308920e58.exe
-
Size
194KB
-
MD5
42d222cfe08a8e609a71630308920e58
-
SHA1
764114e089c49036c692a898fbffa02a6b911e8a
-
SHA256
ddb4a02eb9092efaf14750423a5d1c2b76e34c586ef6499891e1d1875770ce08
-
SHA512
32c2b6da0d26b1efd534b1b6492854dd44da339d1b27d2604b9f7f1d3c5c519cc3bd8b7d1ee33daa96816e073e8fca613dfcd80a577e10262a8df051bd562a60
-
SSDEEP
3072:hn1/uEAgDPdkBlyFZ+ScjaiKWbETBquAEXlqsUUTzwQRvEZ9yu:h1OgDPdkBAFZWjadD4s5TzHELP
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2284 50fb742d02760.exe -
Loads dropped DLL 1 IoCs
pid Process 2284 50fb742d02760.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/2284-74-0x00000000744B0000-0x00000000744BA000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral2/files/0x000600000002321f-27.dat nsis_installer_1 behavioral2/files/0x000600000002321f-27.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 540 wrote to memory of 2284 540 42d222cfe08a8e609a71630308920e58.exe 16 PID 540 wrote to memory of 2284 540 42d222cfe08a8e609a71630308920e58.exe 16 PID 540 wrote to memory of 2284 540 42d222cfe08a8e609a71630308920e58.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\42d222cfe08a8e609a71630308920e58.exe"C:\Users\Admin\AppData\Local\Temp\42d222cfe08a8e609a71630308920e58.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Users\Admin\AppData\Local\Temp\7zS4B03.tmp\50fb742d02760.exe.\50fb742d02760.exe /s2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2284
-