Analysis
-
max time kernel
106s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220331-en -
submitted
07/04/2022, 14:58 UTC
Static task
static1
Behavioral task
behavioral1
Sample
b1d856afe8ffd2649843d64affe9d4c3.exe
Resource
win7-20220310-en
0 signatures
0 seconds
General
-
Target
b1d856afe8ffd2649843d64affe9d4c3.exe
-
Size
3.9MB
-
MD5
b1d856afe8ffd2649843d64affe9d4c3
-
SHA1
6015d16a00f0c4ad3d68c8c83ae20305a1127a99
-
SHA256
37f06f87355592007d3f0a6acc3e0535b0a5d5d2e224280e5a5f8792cf88c9e4
-
SHA512
6c707636d934cfeefc42271d3bc4ca82cb243ed42b5bf2f999f7529cb4a761365bb94382d38ed4c0e9549ff9580d627414d3461ace467a8986faeaaf08707cab
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA b1d856afe8ffd2649843d64affe9d4c3.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeManageVolumePrivilege 4120 b1d856afe8ffd2649843d64affe9d4c3.exe Token: SeManageVolumePrivilege 4120 b1d856afe8ffd2649843d64affe9d4c3.exe Token: SeManageVolumePrivilege 4120 b1d856afe8ffd2649843d64affe9d4c3.exe Token: SeManageVolumePrivilege 4120 b1d856afe8ffd2649843d64affe9d4c3.exe Token: SeManageVolumePrivilege 4120 b1d856afe8ffd2649843d64affe9d4c3.exe Token: SeManageVolumePrivilege 4120 b1d856afe8ffd2649843d64affe9d4c3.exe Token: SeManageVolumePrivilege 4120 b1d856afe8ffd2649843d64affe9d4c3.exe Token: SeManageVolumePrivilege 4120 b1d856afe8ffd2649843d64affe9d4c3.exe Token: SeManageVolumePrivilege 4120 b1d856afe8ffd2649843d64affe9d4c3.exe Token: SeManageVolumePrivilege 4120 b1d856afe8ffd2649843d64affe9d4c3.exe Token: SeManageVolumePrivilege 4120 b1d856afe8ffd2649843d64affe9d4c3.exe Token: SeManageVolumePrivilege 4120 b1d856afe8ffd2649843d64affe9d4c3.exe Token: SeManageVolumePrivilege 4120 b1d856afe8ffd2649843d64affe9d4c3.exe Token: SeManageVolumePrivilege 4120 b1d856afe8ffd2649843d64affe9d4c3.exe Token: SeManageVolumePrivilege 4120 b1d856afe8ffd2649843d64affe9d4c3.exe Token: SeManageVolumePrivilege 4120 b1d856afe8ffd2649843d64affe9d4c3.exe Token: SeManageVolumePrivilege 4120 b1d856afe8ffd2649843d64affe9d4c3.exe Token: SeManageVolumePrivilege 4120 b1d856afe8ffd2649843d64affe9d4c3.exe Token: SeManageVolumePrivilege 4120 b1d856afe8ffd2649843d64affe9d4c3.exe Token: SeManageVolumePrivilege 4120 b1d856afe8ffd2649843d64affe9d4c3.exe Token: SeManageVolumePrivilege 4120 b1d856afe8ffd2649843d64affe9d4c3.exe Token: SeManageVolumePrivilege 4120 b1d856afe8ffd2649843d64affe9d4c3.exe Token: SeManageVolumePrivilege 4120 b1d856afe8ffd2649843d64affe9d4c3.exe Token: SeManageVolumePrivilege 4120 b1d856afe8ffd2649843d64affe9d4c3.exe
Processes
Network
-
Remote address:8.8.8.8:53Request106.89.54.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request9.9.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.0.2.0.0.0.0.2.0.1.3.0.6.2.ip6.arpaIN PTRResponse
-
GEThttp://152.32.193.91/seemorebty/poe.php?e=b1d856afe8ffd2649843d64affe9d4c3b1d856afe8ffd2649843d64affe9d4c3.exeRemote address:152.32.193.91:80RequestGET /seemorebty/poe.php?e=b1d856afe8ffd2649843d64affe9d4c3 HTTP/1.1
Accept: */*
User-Agent: Mozilla/4.0
Host: 152.32.193.91
ResponseHTTP/1.1 200 OK
Server: Apache
Upgrade: h2
Connection: Upgrade, close
Content-Length: 0
Content-Type: text/html; charset=UTF-8
-
260 B 5
-
322 B 7
-
322 B 7
-
322 B 7
-
322 B 7
-
152.32.193.91:80http://152.32.193.91/seemorebty/poe.php?e=b1d856afe8ffd2649843d64affe9d4c3httpb1d856afe8ffd2649843d64affe9d4c3.exe406 B 384 B 6 5
HTTP Request
GET http://152.32.193.91/seemorebty/poe.php?e=b1d856afe8ffd2649843d64affe9d4c3HTTP Response
200