Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 23:55
Static task
static1
Behavioral task
behavioral1
Sample
c46f066555bae74008b6b2aac011ceb8.exe
Resource
win7-20240215-en
General
-
Target
c46f066555bae74008b6b2aac011ceb8.exe
-
Size
585KB
-
MD5
c46f066555bae74008b6b2aac011ceb8
-
SHA1
61d2bfb7dc5faa94d974bda86f82b2e0c0e32a8f
-
SHA256
8d45c9abb56000c89333861a27dfe09af39fc3c21383920c8397277d20393cca
-
SHA512
ae3ee6818ddec69386f5541c7f7b47dd640c555a8306705d093933f0c784b0e32242f6bfe7819ec0b78e734f8d6d7e076855360df6b487cd257584c11fc0f234
-
SSDEEP
12288:LG2tzSMJb9pZ5RgY2yUNK+upN35jGFpVMbonpEPH0zEBQM1SoSbmKZF:LPxzKtrEPo2QfblF
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1312 set thread context of 4060 1312 c46f066555bae74008b6b2aac011ceb8.exe 89 -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1312 wrote to memory of 4060 1312 c46f066555bae74008b6b2aac011ceb8.exe 89 PID 1312 wrote to memory of 4060 1312 c46f066555bae74008b6b2aac011ceb8.exe 89 PID 1312 wrote to memory of 4060 1312 c46f066555bae74008b6b2aac011ceb8.exe 89 PID 1312 wrote to memory of 4060 1312 c46f066555bae74008b6b2aac011ceb8.exe 89 PID 1312 wrote to memory of 4060 1312 c46f066555bae74008b6b2aac011ceb8.exe 89 PID 1312 wrote to memory of 4060 1312 c46f066555bae74008b6b2aac011ceb8.exe 89 PID 1312 wrote to memory of 4060 1312 c46f066555bae74008b6b2aac011ceb8.exe 89 PID 1312 wrote to memory of 4060 1312 c46f066555bae74008b6b2aac011ceb8.exe 89 PID 1312 wrote to memory of 4060 1312 c46f066555bae74008b6b2aac011ceb8.exe 89 PID 4060 wrote to memory of 1940 4060 c46f066555bae74008b6b2aac011ceb8.exe 98 PID 4060 wrote to memory of 1940 4060 c46f066555bae74008b6b2aac011ceb8.exe 98 PID 4060 wrote to memory of 1940 4060 c46f066555bae74008b6b2aac011ceb8.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\c46f066555bae74008b6b2aac011ceb8.exe"C:\Users\Admin\AppData\Local\Temp\c46f066555bae74008b6b2aac011ceb8.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\c46f066555bae74008b6b2aac011ceb8.exe"C:\Users\Admin\AppData\Local\Temp\c46f066555bae74008b6b2aac011ceb8.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\453.bat3⤵PID:1940
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175B
MD538570a3652de28aec8aa4ae391ac03f7
SHA17aee88a379fdc0dbd976ead81c77fe636e345cdc
SHA256af84cbb2b671c48ea16e5dfdc8a933389202b09cdd7e4ed247b32ec76815d208
SHA512a7f3032bd2bf2d60c5d171c6ead8c72044eb9bfe020837e82535a6f08fcb9fc32ffa8640b3c229afc0fd433be616cfdcd899a052e019bd606a249aa4f61ece08
-
Filesize
585KB
MD5c46f066555bae74008b6b2aac011ceb8
SHA161d2bfb7dc5faa94d974bda86f82b2e0c0e32a8f
SHA2568d45c9abb56000c89333861a27dfe09af39fc3c21383920c8397277d20393cca
SHA512ae3ee6818ddec69386f5541c7f7b47dd640c555a8306705d093933f0c784b0e32242f6bfe7819ec0b78e734f8d6d7e076855360df6b487cd257584c11fc0f234