Analysis
-
max time kernel
303s -
max time network
305s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06-07-2024 11:52
Static task
static1
Behavioral task
behavioral1
Sample
Loader.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Loader.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
Loader.exe
Resource
win10v2004-20240704-en
General
-
Target
Loader.exe
-
Size
857KB
-
MD5
2b4ca19ce32a373dde70fb0ebdf96fc7
-
SHA1
0273612af7bd1080541d32496162f1a62bac27e6
-
SHA256
6f18bcd3189e785d72b313e0d453eae7548af0b55a36eded240f532475f734da
-
SHA512
89082aaaf1c11159b55ef038c4c7e303708f5b850d82b4302ba6903381c5f70ff80c9c2b54416a1211944fbc7fd9cf4fc6ef121b39a4de62692d277c21ab4b81
-
SSDEEP
12288:kAyjhkgp8WRcJ/VQ/Rm8g5rbEU8cwqAWfg0um2IvZc94WvGGQsh61HdpTmgSBex2:8hk1sJRxyxAgFRZc94QbQsGTmBKy
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3900 set thread context of 3484 3900 Loader.exe 86 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3484 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3484 RegAsm.exe Token: SeBackupPrivilege 3484 RegAsm.exe Token: SeSecurityPrivilege 3484 RegAsm.exe Token: SeSecurityPrivilege 3484 RegAsm.exe Token: SeSecurityPrivilege 3484 RegAsm.exe Token: SeSecurityPrivilege 3484 RegAsm.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3900 wrote to memory of 3484 3900 Loader.exe 86 PID 3900 wrote to memory of 3484 3900 Loader.exe 86 PID 3900 wrote to memory of 3484 3900 Loader.exe 86 PID 3900 wrote to memory of 3484 3900 Loader.exe 86 PID 3900 wrote to memory of 3484 3900 Loader.exe 86 PID 3900 wrote to memory of 3484 3900 Loader.exe 86 PID 3900 wrote to memory of 3484 3900 Loader.exe 86 PID 3900 wrote to memory of 3484 3900 Loader.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Loader.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3484
-