Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 06:13
Static task
static1
Behavioral task
behavioral1
Sample
Sample.Picture.exe
Resource
win7-20240708-en
General
-
Target
Sample.Picture.exe
-
Size
1.6MB
-
MD5
12c2de0cf5eb38984db8b3cd8a123151
-
SHA1
da72e21c7a345bb2af8fbe0926862d6849bff468
-
SHA256
66949b580772fd8b822a25efb149e18e335724cd6a3858f67c2fda9ff66a0c73
-
SHA512
db43a4690ac4a1c9b68dcd3bb980c0e15fd04b79d1434a6c3677760d7bf412147b8d58f80753328112b37aed61ed4116705207c9b6c673cce4002550b6f25aea
-
SSDEEP
24576:iea9rqGw1QRJhAGtyjHT9dBvG30u+FIc:+9wqhAGkNGUFIc
Malware Config
Signatures
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2524 set thread context of 2876 2524 Sample.Picture.exe 31 -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2108 DllHost.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2876 2524 Sample.Picture.exe 31 PID 2524 wrote to memory of 2876 2524 Sample.Picture.exe 31 PID 2524 wrote to memory of 2876 2524 Sample.Picture.exe 31 PID 2524 wrote to memory of 2876 2524 Sample.Picture.exe 31 PID 2524 wrote to memory of 2876 2524 Sample.Picture.exe 31 PID 2524 wrote to memory of 2876 2524 Sample.Picture.exe 31 PID 2524 wrote to memory of 2876 2524 Sample.Picture.exe 31 PID 2524 wrote to memory of 2876 2524 Sample.Picture.exe 31 PID 2524 wrote to memory of 2876 2524 Sample.Picture.exe 31 PID 2524 wrote to memory of 2876 2524 Sample.Picture.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Sample.Picture.exe"C:\Users\Admin\AppData\Local\Temp\Sample.Picture.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:2876
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:2108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
220KB
MD57c23eac058545581e7d1c03fda81bfae
SHA16656e5fc6499a59dd6ccda95ed60a6c1282217ba
SHA256757043e221acddb5d463bdf18a7110564ec0ac58f9bc09db1bdb1df0287f2383
SHA5129e3beaadaa6260b800312958a71d4f42d4fba772e12d322c5dcf7188e38f61ebab1b38e4c69487a4f768ff839c7f978496606cdd668c9b8151dec87466c17e80