Analysis
-
max time kernel
32s -
max time network
35s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
04/06/2024, 19:04
Static task
static1
Behavioral task
behavioral1
Sample
filedeletor.bat
Resource
win7-20240220-en
1 signatures
150 seconds
General
-
Target
filedeletor.bat
-
Size
218B
-
MD5
f103a54563aba4d40e084add2b8c32b2
-
SHA1
c109e1b29fde8221941c347264d10bf85974a5f4
-
SHA256
c9c61d1e5bfaa27bd4907e8498632f3173f3a206b9534111801137cc9e3c864f
-
SHA512
43101cb65584a031ec2bd997f3b2d28072f2d8b61c152c9ce84403455217cd49e5ae47bb77ac5d76491ea01d7c82f245adec18700a04b0ee577ce861c84558fb
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification \??\c:\Program Files\Java\jdk-1.8\jre\bin\server\classes.jsa cmd.exe File opened for modification \??\c:\Program Files\Java\jre-1.8\bin\server\classes.jsa cmd.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\Windows\Globalization\ICU\icudtl.dat cmd.exe