Analysis
-
max time kernel
140s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 17:04
Behavioral task
behavioral1
Sample
750b1d4aaac73fcf6457d4a32b7f44ef.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
General
-
Target
750b1d4aaac73fcf6457d4a32b7f44ef.exe
-
Size
977KB
-
MD5
750b1d4aaac73fcf6457d4a32b7f44ef
-
SHA1
c3cba37cdf53ad567984daa8cdd37e9f807b9098
-
SHA256
26898d575c88a05b7041323edeccb3367ee6b83456f9eece44870c19693116f1
-
SHA512
16a5fe139af2a1178919a8c1eb9c55f0404fc9fe52e6840f0bbd1a1fd13eee4d2d1bbdaa0a837452cb70256ea7594f1061c1441a3ba2655629bfd85da733c6bc
-
SSDEEP
24576:H9S16rlzbN1xTalPfmn7FDLBe4o6oYR4mi1RAMSB:H95N/+lS7FDeU4FRALB
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral2/memory/2688-0-0x0000000000040000-0x000000000020D000-memory.dmp upx behavioral2/memory/2688-3-0x0000000000040000-0x000000000020D000-memory.dmp upx behavioral2/memory/2688-4-0x0000000000040000-0x000000000020D000-memory.dmp upx behavioral2/memory/2688-9-0x0000000000040000-0x000000000020D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
750b1d4aaac73fcf6457d4a32b7f44ef.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SmartIndex = "C:\\Users\\Admin\\AppData\\Local\\Temp\\750b1d4aaac73fcf6457d4a32b7f44ef.exe" 750b1d4aaac73fcf6457d4a32b7f44ef.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2688-0-0x0000000000040000-0x000000000020D000-memory.dmpFilesize
1.8MB
-
memory/2688-1-0x0000000003110000-0x0000000003260000-memory.dmpFilesize
1.3MB
-
memory/2688-2-0x0000000001820000-0x00000000018C8000-memory.dmpFilesize
672KB
-
memory/2688-3-0x0000000000040000-0x000000000020D000-memory.dmpFilesize
1.8MB
-
memory/2688-4-0x0000000000040000-0x000000000020D000-memory.dmpFilesize
1.8MB
-
memory/2688-9-0x0000000000040000-0x000000000020D000-memory.dmpFilesize
1.8MB