Analysis
-
max time kernel
146s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06-03-2024 21:07
Static task
static1
Behavioral task
behavioral1
Sample
b83133a8753b573ca7599b90e52884ea.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
General
-
Target
b83133a8753b573ca7599b90e52884ea.exe
-
Size
1.0MB
-
MD5
b83133a8753b573ca7599b90e52884ea
-
SHA1
17e9d7b6b27c95d3f422e3abfa2cd86aad9af6bc
-
SHA256
205218198c2e9a2edd90134b76cb7f66a9e478e75087aae3ecc0de265c47095e
-
SHA512
030c7b9bd93c8265a64b533031eccd9be717feffd0818d112ab1e83fff7a29975ab5e11a79909c2eb631cd5fc5873e0aafa28cdb6b469161d5407c4449225ff8
-
SSDEEP
24576:aqqwKO2JhwtnKqRnrgcCzCUPfJsb3hNmXJ16zLcuqYvw:T7KfrwtnKEnrgrzCU3Jsb3hEXv6/qX
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4084 set thread context of 640 4084 b83133a8753b573ca7599b90e52884ea.exe 96 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 640 b83133a8753b573ca7599b90e52884ea.exe 640 b83133a8753b573ca7599b90e52884ea.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 640 b83133a8753b573ca7599b90e52884ea.exe 640 b83133a8753b573ca7599b90e52884ea.exe 640 b83133a8753b573ca7599b90e52884ea.exe 640 b83133a8753b573ca7599b90e52884ea.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4084 wrote to memory of 640 4084 b83133a8753b573ca7599b90e52884ea.exe 96 PID 4084 wrote to memory of 640 4084 b83133a8753b573ca7599b90e52884ea.exe 96 PID 4084 wrote to memory of 640 4084 b83133a8753b573ca7599b90e52884ea.exe 96 PID 4084 wrote to memory of 640 4084 b83133a8753b573ca7599b90e52884ea.exe 96 PID 4084 wrote to memory of 640 4084 b83133a8753b573ca7599b90e52884ea.exe 96 PID 4084 wrote to memory of 640 4084 b83133a8753b573ca7599b90e52884ea.exe 96 PID 4084 wrote to memory of 640 4084 b83133a8753b573ca7599b90e52884ea.exe 96 PID 4084 wrote to memory of 640 4084 b83133a8753b573ca7599b90e52884ea.exe 96 PID 4084 wrote to memory of 640 4084 b83133a8753b573ca7599b90e52884ea.exe 96 PID 4084 wrote to memory of 640 4084 b83133a8753b573ca7599b90e52884ea.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\b83133a8753b573ca7599b90e52884ea.exe"C:\Users\Admin\AppData\Local\Temp\b83133a8753b573ca7599b90e52884ea.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\b83133a8753b573ca7599b90e52884ea.exe"C:\Users\Admin\AppData\Local\Temp\b83133a8753b573ca7599b90e52884ea.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:640
-