Analysis
-
max time kernel
147s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2024, 01:20
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
хиты/laby mod-4 v7.exe
Resource
win7-20231215-en
3 signatures
150 seconds
General
-
Target
хиты/laby mod-4 v7.exe
-
Size
90KB
-
MD5
6813af3faa4c28bca5c1bea36aa4e009
-
SHA1
a9c2fc811420aa6058aa06d31c9d20192309bc48
-
SHA256
2b459cfba71f8d91ecf84289e9ea75abd9050890b2d87dd836f9fcbcfe98dadf
-
SHA512
53938fa727d94fd347334e1ed12a7519639284e921267eb316437ab868842dd4e6123710539d4c6003e8181e45a66508746626b2965e4819a85d652ff8691d77
-
SSDEEP
1536:G1KRDycUDwj7giX6bS1wb2Wgp9xPebSeR5onZh7qJ49l0kZT6Tiz:SKpycYo7grbS1w7GIbVR5IH7qAT6mz
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 laby mod-4 v7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier laby mod-4 v7.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1688 laby mod-4 v7.exe