Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 02:49
Behavioral task
behavioral1
Sample
aacee852488ed2bc855ec26c70c00d36.exe
Resource
win7-20240221-en
General
-
Target
aacee852488ed2bc855ec26c70c00d36.exe
-
Size
388KB
-
MD5
aacee852488ed2bc855ec26c70c00d36
-
SHA1
fd7f596874543b6b84a9a1d169dfc42f46d7e0a4
-
SHA256
6efbae25787b0d19612ea03d71831ff744605d5eae89c385ea46be30251315c0
-
SHA512
0af8e88dc7500e672af1d21120a99eff36057296c49b2dd22ec0c911b9e56a7ef484ea6db8318ea66f523f554b70706f9c81fccc43064d092c353117adcfd52e
-
SSDEEP
6144:q805yHbwOUo6RwLfurlHiIsmyh5yCuCak3vSGo4cFpdc/eekNpoSHzeeg:305OyrfRHiXhquv7Ypdc/eeqpoSTeeg
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/2368-0-0x00000000002A0000-0x00000000003F0000-memory.dmp upx behavioral2/files/0x0008000000023202-5.dat upx behavioral2/memory/2368-6-0x00000000002A0000-0x00000000003F0000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2368 wrote to memory of 4804 2368 aacee852488ed2bc855ec26c70c00d36.exe 95 PID 2368 wrote to memory of 4804 2368 aacee852488ed2bc855ec26c70c00d36.exe 95 PID 2368 wrote to memory of 4804 2368 aacee852488ed2bc855ec26c70c00d36.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\aacee852488ed2bc855ec26c70c00d36.exe"C:\Users\Admin\AppData\Local\Temp\aacee852488ed2bc855ec26c70c00d36.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\562.bat2⤵PID:4804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175B
MD5165a06cb34b43671361c4a2c42f50364
SHA1d8d80dbd8a44e9b92bce82dd3b5932b2387f706e
SHA256ef5d777e28722c5a4a17dfd0f1fbd86f57090315e85089187b16b2090ca18078
SHA5126f8c3c858b52537f5dbf92818b4d7abc4c037918f91e1e288b0a6ad4089cc05ec2bb10405d068e1a7b9b415535bd3af04b698f0399b3048830d37b01a653d7d9
-
Filesize
388KB
MD5aacee852488ed2bc855ec26c70c00d36
SHA1fd7f596874543b6b84a9a1d169dfc42f46d7e0a4
SHA2566efbae25787b0d19612ea03d71831ff744605d5eae89c385ea46be30251315c0
SHA5120af8e88dc7500e672af1d21120a99eff36057296c49b2dd22ec0c911b9e56a7ef484ea6db8318ea66f523f554b70706f9c81fccc43064d092c353117adcfd52e