Analysis
-
max time kernel
38s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
05-07-2022 12:43
Static task
static1
Behavioral task
behavioral1
Sample
9e21e39cd313c6974c5ca9133f9c29acd59f09a90d2c78cf6302516fd4d93897.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
9e21e39cd313c6974c5ca9133f9c29acd59f09a90d2c78cf6302516fd4d93897.exe
Resource
win10v2004-20220414-en
General
-
Target
9e21e39cd313c6974c5ca9133f9c29acd59f09a90d2c78cf6302516fd4d93897.exe
-
Size
653KB
-
MD5
9ec150a4c04da6a1087a3cd36086fde3
-
SHA1
d67ef87f7f756ea776ae3f63a2b2a86e2a3fe061
-
SHA256
9e21e39cd313c6974c5ca9133f9c29acd59f09a90d2c78cf6302516fd4d93897
-
SHA512
778955d57edc4395ad64c802a323a6f958aa27a0e32bd496f7b3da805fadc8e7fc19b6703bad9931a74bd8c35297fbfd4591a383efe4fc315a9827b34ca843fd
Malware Config
Extracted
coldstealer
l15
http://topexpertshop.com/
Signatures
-
Cold Stealer
An info stealer written in C#, first seen in Feb 2022.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
9e21e39cd313c6974c5ca9133f9c29acd59f09a90d2c78cf6302516fd4d93897.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 9e21e39cd313c6974c5ca9133f9c29acd59f09a90d2c78cf6302516fd4d93897.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 9e21e39cd313c6974c5ca9133f9c29acd59f09a90d2c78cf6302516fd4d93897.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
9e21e39cd313c6974c5ca9133f9c29acd59f09a90d2c78cf6302516fd4d93897.exepid Process 1240 9e21e39cd313c6974c5ca9133f9c29acd59f09a90d2c78cf6302516fd4d93897.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
9e21e39cd313c6974c5ca9133f9c29acd59f09a90d2c78cf6302516fd4d93897.exedescription pid Process Token: SeDebugPrivilege 1240 9e21e39cd313c6974c5ca9133f9c29acd59f09a90d2c78cf6302516fd4d93897.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e21e39cd313c6974c5ca9133f9c29acd59f09a90d2c78cf6302516fd4d93897.exe"C:\Users\Admin\AppData\Local\Temp\9e21e39cd313c6974c5ca9133f9c29acd59f09a90d2c78cf6302516fd4d93897.exe"1⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1240