Analysis
-
max time kernel
141s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
17-01-2024 23:17
Static task
static1
Behavioral task
behavioral1
Sample
63ddfc803fc64226b95b581fbf1ac0ae.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
63ddfc803fc64226b95b581fbf1ac0ae.exe
Resource
win10v2004-20231222-en
General
-
Target
63ddfc803fc64226b95b581fbf1ac0ae.exe
-
Size
22KB
-
MD5
63ddfc803fc64226b95b581fbf1ac0ae
-
SHA1
6db1f6232ef28de58b5c83f1a9e30b8c28b04235
-
SHA256
bd256ce78edece46959c120aad1b0a3939029fa4786df843fd48cf55ee1d5504
-
SHA512
6a0dbcf00a4b342790690197783c2a10ca3013ecc52db66a6fd39d61566fd140e68383b3946e6b1245fa42812b30ea3c1b07ed7d39e7db070c538612bf0f800f
-
SSDEEP
384:Xc45pB5H9mJNRjFKgOnxgAr5r/UwGcOzta+Fy8ee709/JMT+n/ZN1DPc:J5pHHSMLnx/972bz4O709hMT+/X1D
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2720 3012 WerFault.exe 26 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2720 3012 63ddfc803fc64226b95b581fbf1ac0ae.exe 28 PID 3012 wrote to memory of 2720 3012 63ddfc803fc64226b95b581fbf1ac0ae.exe 28 PID 3012 wrote to memory of 2720 3012 63ddfc803fc64226b95b581fbf1ac0ae.exe 28 PID 3012 wrote to memory of 2720 3012 63ddfc803fc64226b95b581fbf1ac0ae.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\63ddfc803fc64226b95b581fbf1ac0ae.exe"C:\Users\Admin\AppData\Local\Temp\63ddfc803fc64226b95b581fbf1ac0ae.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3012 -s 3962⤵
- Program crash
PID:2720
-