Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 07:25
Static task
static1
Behavioral task
behavioral1
Sample
e6a1df5128979c8014b050f207a1a128.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e6a1df5128979c8014b050f207a1a128.exe
Resource
win10v2004-20240709-en
General
-
Target
e6a1df5128979c8014b050f207a1a128.exe
-
Size
538KB
-
MD5
e6a1df5128979c8014b050f207a1a128
-
SHA1
319c61bac56715cae82ce9aaac390fa8c85f0f4f
-
SHA256
8702ba8988f3c4e83969fe87af26c83d28adeb2cc0b1758ac3c537f750309ba9
-
SHA512
b8f1b634437b9f560a71d9e64ebe129ceb862a0d091ede961dce386b5518be512c0c88c18bfbaab42bb2acb145bd59abcf57343960b494588881e6f62851b2fe
-
SSDEEP
6144:QYqdc0NkzDVWZ9STIlA41ldcN3p0NIb88WsNMPaKFP3b2V122J0sL:Q9J8oLrXcN3CNIb88WsNMP5F1k
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2572 e6a1df5128979c8014b050f207a1a128.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2572 e6a1df5128979c8014b050f207a1a128.exe Token: SeBackupPrivilege 2572 e6a1df5128979c8014b050f207a1a128.exe Token: SeSecurityPrivilege 2572 e6a1df5128979c8014b050f207a1a128.exe Token: SeSecurityPrivilege 2572 e6a1df5128979c8014b050f207a1a128.exe Token: SeSecurityPrivilege 2572 e6a1df5128979c8014b050f207a1a128.exe Token: SeSecurityPrivilege 2572 e6a1df5128979c8014b050f207a1a128.exe