Analysis
-
max time kernel
92s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 21:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
acd85327122c2ec03bc1dc278fdd5bb1.exe
Resource
win7-20240221-en
5 signatures
150 seconds
General
-
Target
acd85327122c2ec03bc1dc278fdd5bb1.exe
-
Size
636KB
-
MD5
acd85327122c2ec03bc1dc278fdd5bb1
-
SHA1
4a19ed25cb9b5a616d7d2093491382d297ba8b8b
-
SHA256
bca8e56af03ebe6cd4f565066e6c677c696dc672577d90913471cb5964aa7540
-
SHA512
487ed8f3914dc86e6d5dcbf4f3286c5092814f02daa212233f9bec53022e680a7e0d2ea9a8ed4b14ca3245e6bbe431371df07ba6bcf7e323b77e402651c85f39
-
SSDEEP
6144:dZ7KogrkOsr9Pc2lrf2s6Ps/7CsEQDfKRyuMPPA6cNbdV+qjyjJNAySa:dKkOsBE2lrus6U/7CsEQQR7yjJNAy
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\InstallShield\setup.exe acd85327122c2ec03bc1dc278fdd5bb1.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe acd85327122c2ec03bc1dc278fdd5bb1.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-setup-component_31bf3856ad364e35_10.0.19041.1237_none_a6ef3a2e62766c5c\f\Setup.exe acd85327122c2ec03bc1dc278fdd5bb1.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-setup-component_31bf3856ad364e35_10.0.19041.1237_none_a6ef3a2e62766c5c\r\Setup.exe acd85327122c2ec03bc1dc278fdd5bb1.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-setup-component_31bf3856ad364e35_10.0.19041.84_none_29cf9b86db5fb249\Setup.exe acd85327122c2ec03bc1dc278fdd5bb1.exe File opened for modification C:\Windows\WinSxS\wow64_microsoft-windows-i..llshield-wow64-main_31bf3856ad364e35_10.0.19041.1081_none_e34aea343fc255b7\setup.exe acd85327122c2ec03bc1dc278fdd5bb1.exe File opened for modification C:\Windows\WinSxS\wow64_microsoft-windows-i..llshield-wow64-main_31bf3856ad364e35_10.0.19041.1_none_245e11de2a010b62\setup.exe acd85327122c2ec03bc1dc278fdd5bb1.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-setup-component_31bf3856ad364e35_10.0.19041.1237_none_a6ef3a2e62766c5c\Setup.exe acd85327122c2ec03bc1dc278fdd5bb1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3952 acd85327122c2ec03bc1dc278fdd5bb1.exe 3952 acd85327122c2ec03bc1dc278fdd5bb1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\acd85327122c2ec03bc1dc278fdd5bb1.exe"C:\Users\Admin\AppData\Local\Temp\acd85327122c2ec03bc1dc278fdd5bb1.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:3952