Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 23:24
Behavioral task
behavioral1
Sample
c1de812a59f835237abd9aa99c63a6b8.exe
Resource
win7-20240221-en
General
-
Target
c1de812a59f835237abd9aa99c63a6b8.exe
-
Size
28KB
-
MD5
c1de812a59f835237abd9aa99c63a6b8
-
SHA1
0bf46eb367dc0c60a47e030303a630d96103f845
-
SHA256
a08f928f0704b80968aca4b9b04bbc92aa75ca0bb87d59faf84eee3820d51011
-
SHA512
c1b0d217ae06e5fea90d97f68a332f987af4deee1194239fcd569fbe3f06e8a9cc9124bd154cc1c5cd141aeff9e94edd6fc2ca5027e8ded066db06815a07d985
-
SSDEEP
768:PjQbOmNu40GSptTnfaTQXMI8WpweYcnMbgi9WBNWG7cD+a3l:QOmQLptLfvO0wD2MbbmIKG+I
Malware Config
Signatures
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/1320-0-0x0000000013140000-0x0000000013180000-memory.dmp upx behavioral2/memory/1320-3-0x0000000013140000-0x0000000013180000-memory.dmp upx behavioral2/memory/1320-4-0x0000000013140000-0x0000000013180000-memory.dmp upx behavioral2/memory/1320-5-0x0000000013140000-0x0000000013180000-memory.dmp upx behavioral2/memory/1320-6-0x0000000013140000-0x0000000013180000-memory.dmp upx behavioral2/memory/1320-7-0x0000000013140000-0x0000000013180000-memory.dmp upx behavioral2/memory/1320-8-0x0000000013140000-0x0000000013180000-memory.dmp upx behavioral2/memory/1320-9-0x0000000013140000-0x0000000013180000-memory.dmp upx behavioral2/memory/1320-10-0x0000000013140000-0x0000000013180000-memory.dmp upx behavioral2/memory/1320-11-0x0000000013140000-0x0000000013180000-memory.dmp upx behavioral2/memory/1320-12-0x0000000013140000-0x0000000013180000-memory.dmp upx behavioral2/memory/1320-13-0x0000000013140000-0x0000000013180000-memory.dmp upx behavioral2/memory/1320-14-0x0000000013140000-0x0000000013180000-memory.dmp upx behavioral2/memory/1320-15-0x0000000013140000-0x0000000013180000-memory.dmp upx behavioral2/memory/1320-16-0x0000000013140000-0x0000000013180000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1320 c1de812a59f835237abd9aa99c63a6b8.exe 1320 c1de812a59f835237abd9aa99c63a6b8.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1320 c1de812a59f835237abd9aa99c63a6b8.exe