Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
12/01/2024, 03:30
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
555dea71f33152b96d5c96f8f2ef5868.exe
Resource
win7-20231129-en
3 signatures
150 seconds
General
-
Target
555dea71f33152b96d5c96f8f2ef5868.exe
-
Size
810KB
-
MD5
555dea71f33152b96d5c96f8f2ef5868
-
SHA1
e4f600837be75f60e062176bbd41c307ab2710fe
-
SHA256
e5b15631a19ef6e4312e22d6b8d4cce2a5eba2a1c954b80ebe6776e6f3e0c250
-
SHA512
4dcb8b357af3be920d741296b8c26795e32b6bb71ffcaf629299c8095e85cab93a029fd355e046af05c4e761031f23949846bf8b9ba54b4f9c3d7806237ddc69
-
SSDEEP
24576:tWRT2WGMCL+K6zE//v8rxWsR8u/sgAzS6zC:tUJNO+K663y5RBdAzS6m
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Program crash 1 IoCs
pid pid_target Process procid_target 400 2996 WerFault.exe 7 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2996 wrote to memory of 400 2996 555dea71f33152b96d5c96f8f2ef5868.exe 28 PID 2996 wrote to memory of 400 2996 555dea71f33152b96d5c96f8f2ef5868.exe 28 PID 2996 wrote to memory of 400 2996 555dea71f33152b96d5c96f8f2ef5868.exe 28 PID 2996 wrote to memory of 400 2996 555dea71f33152b96d5c96f8f2ef5868.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\555dea71f33152b96d5c96f8f2ef5868.exe"C:\Users\Admin\AppData\Local\Temp\555dea71f33152b96d5c96f8f2ef5868.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2996 -s 2122⤵
- Program crash
PID:400
-