Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
06/01/2024, 04:23
Static task
static1
Behavioral task
behavioral1
Sample
45458ac0ec91f87d1e40d3acb07cc8c6.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
45458ac0ec91f87d1e40d3acb07cc8c6.exe
Resource
win10v2004-20231222-en
General
-
Target
45458ac0ec91f87d1e40d3acb07cc8c6.exe
-
Size
197KB
-
MD5
45458ac0ec91f87d1e40d3acb07cc8c6
-
SHA1
c213d5f72a5e0fbf8edea5f14d6b5b708ecc2cd0
-
SHA256
eb11a05c6fbcc952b70fed09cbd261ad621bcb72c7a331443cf78d0f80856766
-
SHA512
a522351cda320c3832a4c5b40bf7233fccdd011aace6259b8d54f35b5fad902f395d71bafd660e011b0c4dc57b9c21bbfd82e699e68b2afc0d34fcab2ca8e9d6
-
SSDEEP
6144:zB2lqmTozJQgPv7x8aTyOwjoJyT1IirEiJWbx:zmUlpTPAgyTLEiJYx
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2108-1-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2984-12-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2108-70-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2156-76-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2108-78-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2108-173-0x0000000000400000-0x000000000046B000-memory.dmp upx -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2984 2108 45458ac0ec91f87d1e40d3acb07cc8c6.exe 28 PID 2108 wrote to memory of 2984 2108 45458ac0ec91f87d1e40d3acb07cc8c6.exe 28 PID 2108 wrote to memory of 2984 2108 45458ac0ec91f87d1e40d3acb07cc8c6.exe 28 PID 2108 wrote to memory of 2984 2108 45458ac0ec91f87d1e40d3acb07cc8c6.exe 28 PID 2108 wrote to memory of 2156 2108 45458ac0ec91f87d1e40d3acb07cc8c6.exe 30 PID 2108 wrote to memory of 2156 2108 45458ac0ec91f87d1e40d3acb07cc8c6.exe 30 PID 2108 wrote to memory of 2156 2108 45458ac0ec91f87d1e40d3acb07cc8c6.exe 30 PID 2108 wrote to memory of 2156 2108 45458ac0ec91f87d1e40d3acb07cc8c6.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\45458ac0ec91f87d1e40d3acb07cc8c6.exe"C:\Users\Admin\AppData\Local\Temp\45458ac0ec91f87d1e40d3acb07cc8c6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\45458ac0ec91f87d1e40d3acb07cc8c6.exeC:\Users\Admin\AppData\Local\Temp\45458ac0ec91f87d1e40d3acb07cc8c6.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵PID:2984
-
-
C:\Users\Admin\AppData\Local\Temp\45458ac0ec91f87d1e40d3acb07cc8c6.exeC:\Users\Admin\AppData\Local\Temp\45458ac0ec91f87d1e40d3acb07cc8c6.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵PID:2156
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a05959df2533474cc59b1d560738c10f
SHA1b6ea37b596a4bb04ed408df774a6b106757b05ba
SHA2560cde4ea238b41f17a5fb2c689d4a7c6dacad37ff6fcdd8af679803e9d273bb4b
SHA5128cb8f2afe3595093988fc3a9a6dc6b559735c1e4ab396bf1d3be995aaf7e2078b79f46f30c17f757f770054aca2504a1f8e3af074bb4947156e7ab7038c6a7ae