Analysis
-
max time kernel
77s -
max time network
189s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
03-06-2024 05:33
Static task
static1
Behavioral task
behavioral1
Sample
5ece0d233ac404577a0ae14c8195299d239e4bbf3cb004b56cdeddf77de94733.exe
Resource
win7-20240508-en
General
-
Target
5ece0d233ac404577a0ae14c8195299d239e4bbf3cb004b56cdeddf77de94733.exe
-
Size
2.8MB
-
MD5
64e769e16f853835dd768a9b65626407
-
SHA1
87c0e29f2335809e3e70aaee47187db3ee8ceece
-
SHA256
5ece0d233ac404577a0ae14c8195299d239e4bbf3cb004b56cdeddf77de94733
-
SHA512
f275730523bbf75d6f96bef1255be756fd84ae570d0d5aae7f29a513da15b2d7f9b1b057912accb15be5de27e80067b2e83a07b4e78968cb412c2f0ffdd35879
-
SSDEEP
49152:CfC3GVrnr+KEH4UmEdaiYdwJ6oebqA4hVW1cz6Otqle:CMgtA4UmUaddwAoeOAWVWEtql
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2064 set thread context of 2320 2064 5ece0d233ac404577a0ae14c8195299d239e4bbf3cb004b56cdeddf77de94733.exe 73 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2320 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 2064 5ece0d233ac404577a0ae14c8195299d239e4bbf3cb004b56cdeddf77de94733.exe Token: SeDebugPrivilege 2320 RegAsm.exe Token: SeBackupPrivilege 2320 RegAsm.exe Token: SeSecurityPrivilege 2320 RegAsm.exe Token: SeSecurityPrivilege 2320 RegAsm.exe Token: SeSecurityPrivilege 2320 RegAsm.exe Token: SeSecurityPrivilege 2320 RegAsm.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2064 wrote to memory of 2320 2064 5ece0d233ac404577a0ae14c8195299d239e4bbf3cb004b56cdeddf77de94733.exe 73 PID 2064 wrote to memory of 2320 2064 5ece0d233ac404577a0ae14c8195299d239e4bbf3cb004b56cdeddf77de94733.exe 73 PID 2064 wrote to memory of 2320 2064 5ece0d233ac404577a0ae14c8195299d239e4bbf3cb004b56cdeddf77de94733.exe 73 PID 2064 wrote to memory of 2320 2064 5ece0d233ac404577a0ae14c8195299d239e4bbf3cb004b56cdeddf77de94733.exe 73 PID 2064 wrote to memory of 2320 2064 5ece0d233ac404577a0ae14c8195299d239e4bbf3cb004b56cdeddf77de94733.exe 73 PID 2064 wrote to memory of 2320 2064 5ece0d233ac404577a0ae14c8195299d239e4bbf3cb004b56cdeddf77de94733.exe 73 PID 2064 wrote to memory of 2320 2064 5ece0d233ac404577a0ae14c8195299d239e4bbf3cb004b56cdeddf77de94733.exe 73 PID 2064 wrote to memory of 2320 2064 5ece0d233ac404577a0ae14c8195299d239e4bbf3cb004b56cdeddf77de94733.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ece0d233ac404577a0ae14c8195299d239e4bbf3cb004b56cdeddf77de94733.exe"C:\Users\Admin\AppData\Local\Temp\5ece0d233ac404577a0ae14c8195299d239e4bbf3cb004b56cdeddf77de94733.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2320
-