Analysis
-
max time kernel
95s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-09-2024 19:30
Behavioral task
behavioral1
Sample
1d4946ea77a2bcf432f490d0a38429102a51069b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1d4946ea77a2bcf432f490d0a38429102a51069b.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
d1f0f17e91e91cc4e1647c2aa8a7f39af2793125.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
d1f0f17e91e91cc4e1647c2aa8a7f39af2793125.exe
Resource
win10v2004-20240802-en
General
-
Target
1d4946ea77a2bcf432f490d0a38429102a51069b.exe
-
Size
151KB
-
MD5
f635582929e0b0f2f18e1ee1fb7a84e9
-
SHA1
1d4946ea77a2bcf432f490d0a38429102a51069b
-
SHA256
583c1eb6360379032d7cf7e6a60e09cfe74c7ecd36174016f293b060537fa52d
-
SHA512
0a4ac0362ebf4ce81fb187d93898e3ffdf74e6a0da96913818ebbb59a236a3897ec680cdc4599a9cf8cee8f8b7d527c4fc0abf89016bab48449995d10065d1e7
-
SSDEEP
3072:mQHKadVFHUg2HiFI9ifi5iLLbyq8QL+wI7BJlwEKctby:BqSF/2HQlLLbyq8QL+wI7BJiEK
Malware Config
Extracted
xehook
2.1.5 Stable
https://t.me/+w897k5UK_jIyNDgy
-
id
208
-
token
xehook208262680500151
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 9 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
1d4946ea77a2bcf432f490d0a38429102a51069b.exedescription pid Process Token: SeDebugPrivilege 4956 1d4946ea77a2bcf432f490d0a38429102a51069b.exe