Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2024, 10:14
Behavioral task
behavioral1
Sample
b47290b7a723650c34db3d9b1cab8e35.exe
Resource
win7-20240221-en
General
-
Target
b47290b7a723650c34db3d9b1cab8e35.exe
-
Size
916KB
-
MD5
b47290b7a723650c34db3d9b1cab8e35
-
SHA1
46b55bcdd95cad2dd0e72de129c644e3d7d79950
-
SHA256
11f391cc51e29732c91303810cad459d9b1a0984d10a76116f166cb5eaa041b5
-
SHA512
647c78c5433ef37b31e677c21d54988957e247d5921a1b56772e2bdc89da3fef8a20f84ade4406561a74222e77db99b7573a223774e7eee2f0e738651ed6641e
-
SSDEEP
24576:bJnav4dbkHXlQTlACio/uyy5150XxiRE/O:1av48X+TlAfUoteF/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4420 setup.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/2564-0-0x00000000007F0000-0x0000000000AA6000-memory.dmp upx behavioral2/files/0x0007000000023225-3.dat upx behavioral2/memory/2564-5-0x00000000007F0000-0x0000000000AA6000-memory.dmp upx behavioral2/memory/4420-6-0x0000000000E10000-0x00000000010C6000-memory.dmp upx behavioral2/memory/4420-7-0x0000000000E10000-0x00000000010C6000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2564 b47290b7a723650c34db3d9b1cab8e35.exe 2564 b47290b7a723650c34db3d9b1cab8e35.exe 4420 setup.exe 4420 setup.exe 4420 setup.exe 4420 setup.exe 4420 setup.exe 4420 setup.exe 4420 setup.exe 4420 setup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2564 wrote to memory of 4420 2564 b47290b7a723650c34db3d9b1cab8e35.exe 89 PID 2564 wrote to memory of 4420 2564 b47290b7a723650c34db3d9b1cab8e35.exe 89 PID 2564 wrote to memory of 4420 2564 b47290b7a723650c34db3d9b1cab8e35.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\b47290b7a723650c34db3d9b1cab8e35.exe"C:\Users\Admin\AppData\Local\Temp\b47290b7a723650c34db3d9b1cab8e35.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\setup.exeC:\Users\Admin\AppData\Local\Temp\setup.exe relaunch2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4420
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
916KB
MD5b47290b7a723650c34db3d9b1cab8e35
SHA146b55bcdd95cad2dd0e72de129c644e3d7d79950
SHA25611f391cc51e29732c91303810cad459d9b1a0984d10a76116f166cb5eaa041b5
SHA512647c78c5433ef37b31e677c21d54988957e247d5921a1b56772e2bdc89da3fef8a20f84ade4406561a74222e77db99b7573a223774e7eee2f0e738651ed6641e