Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2024 16:53
Static task
static1
Behavioral task
behavioral1
Sample
56fee8770468e0ce722631fdd6fe405f.exe
Resource
win7-20231129-en
General
-
Target
56fee8770468e0ce722631fdd6fe405f.exe
-
Size
1.6MB
-
MD5
56fee8770468e0ce722631fdd6fe405f
-
SHA1
f457dd68129d65723c07039748b423e41edffeeb
-
SHA256
4fffabe274a18ac209db945b4289b02db2afb4055000f160acad800d0e59773a
-
SHA512
db831a79483db041b2a216c1268e64cfa35f149e3d441ee34c0d369458b8e70ca401f4f66863d03912468854a20d7b4bb9cfb5d80e9c619a9520de2c780ba1d6
-
SSDEEP
49152:o/fwhofLeH4si17tnyKl6ZAZ5a0mLTqbrY:owhweHxiUMaxn
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 820 56fee8770468e0ce722631fdd6fe405f.exe 820 56fee8770468e0ce722631fdd6fe405f.exe 820 56fee8770468e0ce722631fdd6fe405f.exe 820 56fee8770468e0ce722631fdd6fe405f.exe 4408 56fee8770468e0ce722631fdd6fe405f.exe 4408 56fee8770468e0ce722631fdd6fe405f.exe 4408 56fee8770468e0ce722631fdd6fe405f.exe 4408 56fee8770468e0ce722631fdd6fe405f.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4408 56fee8770468e0ce722631fdd6fe405f.exe 4408 56fee8770468e0ce722631fdd6fe405f.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 820 wrote to memory of 4408 820 56fee8770468e0ce722631fdd6fe405f.exe 90 PID 820 wrote to memory of 4408 820 56fee8770468e0ce722631fdd6fe405f.exe 90 PID 820 wrote to memory of 4408 820 56fee8770468e0ce722631fdd6fe405f.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\56fee8770468e0ce722631fdd6fe405f.exe"C:\Users\Admin\AppData\Local\Temp\56fee8770468e0ce722631fdd6fe405f.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Users\Admin\AppData\Local\Temp\56fee8770468e0ce722631fdd6fe405f.exe"C:\Users\Admin\AppData\Local\Temp\56fee8770468e0ce722631fdd6fe405f.exe" /wrapper /dir="C:\Users\Admin\AppData\Local\Temp\pkg_10352c3740"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
115B
MD5f50d08ebf948260bbf516dc91c0baf23
SHA12134bbb5f9934f85ba69269ae47fb14d94394f07
SHA256a739df05572d396a220291f7031a11a146d390be7beb5cbe3728694e432a18fa
SHA512e64b7febbcdc0d00c8a3de791e1f559b2b89d550f01f8aea49b5a25c1d367f1592057c8ee67d3dd2e6fdc93d0ad456084b9cc74f668118329ee64d285262fd64
-
Filesize
798B
MD51d45a29e3511b982a1f91b33c70e964f
SHA1176a47b489be3f27dc354a2b9dd0b580bb2f3904
SHA2560a69c29fe16727b18425df8ded1cfe9d07a380b9f23f1beb32f60fefc000b3dc
SHA512c574719f56a9cc0a3c393001f0774a5826afa5972906d9d9d214a183724a9f7226483a7181a0030e0f801b481a19957761efc170a10850aec786623eb939eb69