Analysis
-
max time kernel
316s -
max time network
1576s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
23-08-2024 09:19
Static task
static1
Behavioral task
behavioral1
Sample
WindowsFormsApp1.exe
Resource
win10-20240404-en
General
-
Target
WindowsFormsApp1.exe
-
Size
934KB
-
MD5
eb0d85ec71b58bd1a78e8b1e13ca065a
-
SHA1
2bcde74520441cf507b6283816169e49120c80c2
-
SHA256
87ca00e040a520b054e1fa1244816250c04a6e8e3fc784275481fe4a3c34d385
-
SHA512
0aae668a60ffb9c43961126eddbc88e08308bb40ce2ee4689b8f65039f86c1b651fac9a8b5418967bb405386abb0dc55433291860836c90a486edf94be457cdb
-
SSDEEP
24576:RcBkcBiBaMvp0LWHP79uVtgVZkBaMvp0LWHP79uVtgVZ:SBZBaa2hHz9uVaga2hHz9uVa
Malware Config
Signatures
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsFormsApp1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2272 WindowsFormsApp1.exe