Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/03/2024, 18:17
Behavioral task
behavioral1
Sample
1567b9c4169333d36b9ca2ab65b4e6b4b6dd53ed3e01653f4296528b6f7eb98d.exe
Resource
win7-20240221-en
4 signatures
150 seconds
General
-
Target
1567b9c4169333d36b9ca2ab65b4e6b4b6dd53ed3e01653f4296528b6f7eb98d.exe
-
Size
242KB
-
MD5
fa391b26ddf5dbbd0ed65af1cc30af04
-
SHA1
6dde1621bd1b55f3d1c757b4d1dff50daafabab7
-
SHA256
1567b9c4169333d36b9ca2ab65b4e6b4b6dd53ed3e01653f4296528b6f7eb98d
-
SHA512
8995dd659d76c0f9a7f8aeeeaca0e7d072540d8e8cb446acd2acdae92770b67253c907a649a6fb71113133b5ad81f0335157b076451eeb4a987496aa02d177f9
-
SSDEEP
6144:4HGJFZ4eWl0LPn2mW33hh2H23yv707fVdKn7dO8YHjH:bJ3yGLP2x3cp07nIMjH
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 16 IoCs
resource yara_rule behavioral1/memory/1500-0-0x0000000000400000-0x000000000048B000-memory.dmp UPX behavioral1/memory/1500-2-0x0000000000400000-0x000000000048B000-memory.dmp UPX behavioral1/memory/1500-3-0x0000000000400000-0x000000000048B000-memory.dmp UPX behavioral1/memory/1500-4-0x0000000000400000-0x000000000048B000-memory.dmp UPX behavioral1/memory/1500-5-0x0000000000400000-0x000000000048B000-memory.dmp UPX behavioral1/memory/1500-6-0x0000000000400000-0x000000000048B000-memory.dmp UPX behavioral1/memory/1500-7-0x0000000000400000-0x000000000048B000-memory.dmp UPX behavioral1/memory/1500-8-0x0000000000400000-0x000000000048B000-memory.dmp UPX behavioral1/memory/1500-9-0x0000000000400000-0x000000000048B000-memory.dmp UPX behavioral1/memory/1500-10-0x0000000000400000-0x000000000048B000-memory.dmp UPX behavioral1/memory/1500-11-0x0000000000400000-0x000000000048B000-memory.dmp UPX behavioral1/memory/1500-12-0x0000000000400000-0x000000000048B000-memory.dmp UPX behavioral1/memory/1500-13-0x0000000000400000-0x000000000048B000-memory.dmp UPX behavioral1/memory/1500-14-0x0000000000400000-0x000000000048B000-memory.dmp UPX behavioral1/memory/1500-15-0x0000000000400000-0x000000000048B000-memory.dmp UPX behavioral1/memory/1500-16-0x0000000000400000-0x000000000048B000-memory.dmp UPX -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1500-0-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/1500-2-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/1500-3-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/1500-4-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/1500-5-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/1500-6-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/1500-7-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/1500-8-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/1500-9-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/1500-10-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/1500-11-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/1500-12-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/1500-13-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/1500-14-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/1500-15-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/1500-16-0x0000000000400000-0x000000000048B000-memory.dmp upx -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1500 1567b9c4169333d36b9ca2ab65b4e6b4b6dd53ed3e01653f4296528b6f7eb98d.exe