Analysis
-
max time kernel
118s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07-03-2024 17:45
Static task
static1
Behavioral task
behavioral1
Sample
b94b9203b9682e94a0600f8ad2896e59.exe
Resource
win7-20240221-en
General
-
Target
b94b9203b9682e94a0600f8ad2896e59.exe
-
Size
1.1MB
-
MD5
b94b9203b9682e94a0600f8ad2896e59
-
SHA1
f3316cebbc21d9becaa7744f92dc1de6b2ee31ff
-
SHA256
4d76bd31c6cb18d229df1ec8fc0c929f37a4cdf694d2c885f1beaeddad3f14d6
-
SHA512
31f0912abcf2b57ad0f8324ff1db0857c619c13f21be2833d0553ee5586ef9fdc9ec1ba16483ff111a7572627ae5c0619da1f08b7096ac454b39e9609b0dc913
-
SSDEEP
12288:wyLyxYjZb/yKJ4S1ebC68hpaBUZc7U4p12N4IWgswpJRhpQtXjpyECP4WchMMd/J:mwbL4SPX0BecnphaJGqcQla
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 freegeoip.app 3 freegeoip.app -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 b94b9203b9682e94a0600f8ad2896e59.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier b94b9203b9682e94a0600f8ad2896e59.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1300 b94b9203b9682e94a0600f8ad2896e59.exe 1300 b94b9203b9682e94a0600f8ad2896e59.exe 1300 b94b9203b9682e94a0600f8ad2896e59.exe 1300 b94b9203b9682e94a0600f8ad2896e59.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1300 b94b9203b9682e94a0600f8ad2896e59.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397B
MD5e9848ff9f53033f0cce83c7ff4a6d754
SHA18b496435b7c111b610113b90d77a28df5961f12e
SHA2568c4e1d826b5bf926e1d2562e57d1e76a67aef7cc1863ec2d610db5b325211373
SHA5123c78d8a430abce02eef9835ebeb7f6fa4718b63abc96646581f309c6dd5a01b3b0757191c9f7c0c24ee65c8107104873ba8dea520edf5b110687112e82fd6f67