Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
12/03/2024, 19:06
Behavioral task
behavioral1
Sample
c4226c102573f0db0e5911fd802b38b6.exe
Resource
win7-20240220-en
6 signatures
150 seconds
General
-
Target
c4226c102573f0db0e5911fd802b38b6.exe
-
Size
1.2MB
-
MD5
c4226c102573f0db0e5911fd802b38b6
-
SHA1
04d93959784776a5ce185d6d0898709c53dbc5fe
-
SHA256
5d459afe468d6096fe7bb21c1806347084af3620e7599baef1ba1517e78c9452
-
SHA512
2b85d886bb269457cc93e943cdcc167ae91d0692d99fe8530ce0b0f1dbc8a224a3eb61c8c8ec32d08d6873bc64a33e797ee69b369b2252e7ecc9362e5c4ad746
-
SSDEEP
24576:jFE//Tct4bOsHbJk+Hcb50soxCYwfxrBR6FUwRPk+5MYIZM8Jdyuvb+F6YsU8:JSVHdk+H06zCYw5lR8PkHYI68TyeU6Yw
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2768-0-0x0000000000400000-0x00000000004E5000-memory.dmp upx behavioral1/memory/2768-8-0x0000000000400000-0x00000000004E5000-memory.dmp upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2768-8-0x0000000000400000-0x00000000004E5000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2768 set thread context of 2088 2768 c4226c102573f0db0e5911fd802b38b6.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2768 wrote to memory of 2088 2768 c4226c102573f0db0e5911fd802b38b6.exe 28 PID 2768 wrote to memory of 2088 2768 c4226c102573f0db0e5911fd802b38b6.exe 28 PID 2768 wrote to memory of 2088 2768 c4226c102573f0db0e5911fd802b38b6.exe 28 PID 2768 wrote to memory of 2088 2768 c4226c102573f0db0e5911fd802b38b6.exe 28 PID 2768 wrote to memory of 2088 2768 c4226c102573f0db0e5911fd802b38b6.exe 28 PID 2768 wrote to memory of 2088 2768 c4226c102573f0db0e5911fd802b38b6.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4226c102573f0db0e5911fd802b38b6.exe"C:\Users\Admin\AppData\Local\Temp\c4226c102573f0db0e5911fd802b38b6.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\c4226c102573f0db0e5911fd802b38b6.exeŸ2⤵PID:2088
-