Analysis
-
max time kernel
38s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
05-07-2022 12:43
Static task
static1
Behavioral task
behavioral1
Sample
9e21e39cd313c6974c5ca9133f9c29acd59f09a90d2c78cf6302516fd4d93897.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
9e21e39cd313c6974c5ca9133f9c29acd59f09a90d2c78cf6302516fd4d93897.exe
Resource
win10v2004-20220414-en
General
-
Target
9e21e39cd313c6974c5ca9133f9c29acd59f09a90d2c78cf6302516fd4d93897.exe
-
Size
653KB
-
MD5
9ec150a4c04da6a1087a3cd36086fde3
-
SHA1
d67ef87f7f756ea776ae3f63a2b2a86e2a3fe061
-
SHA256
9e21e39cd313c6974c5ca9133f9c29acd59f09a90d2c78cf6302516fd4d93897
-
SHA512
778955d57edc4395ad64c802a323a6f958aa27a0e32bd496f7b3da805fadc8e7fc19b6703bad9931a74bd8c35297fbfd4591a383efe4fc315a9827b34ca843fd
Malware Config
Extracted
coldstealer
l15
http://topexpertshop.com/
Signatures
-
Cold Stealer
An info stealer written in C#, first seen in Feb 2022.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
9e21e39cd313c6974c5ca9133f9c29acd59f09a90d2c78cf6302516fd4d93897.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 9e21e39cd313c6974c5ca9133f9c29acd59f09a90d2c78cf6302516fd4d93897.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 9e21e39cd313c6974c5ca9133f9c29acd59f09a90d2c78cf6302516fd4d93897.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
9e21e39cd313c6974c5ca9133f9c29acd59f09a90d2c78cf6302516fd4d93897.exepid process 1240 9e21e39cd313c6974c5ca9133f9c29acd59f09a90d2c78cf6302516fd4d93897.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
9e21e39cd313c6974c5ca9133f9c29acd59f09a90d2c78cf6302516fd4d93897.exedescription pid process Token: SeDebugPrivilege 1240 9e21e39cd313c6974c5ca9133f9c29acd59f09a90d2c78cf6302516fd4d93897.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e21e39cd313c6974c5ca9133f9c29acd59f09a90d2c78cf6302516fd4d93897.exe"C:\Users\Admin\AppData\Local\Temp\9e21e39cd313c6974c5ca9133f9c29acd59f09a90d2c78cf6302516fd4d93897.exe"1⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1240-56-0x00000000753E1000-0x00000000753E3000-memory.dmpFilesize
8KB
-
memory/1240-55-0x0000000000400000-0x00000000004F1000-memory.dmpFilesize
964KB
-
memory/1240-54-0x0000000000400000-0x00000000004F1000-memory.dmpFilesize
964KB
-
memory/1240-58-0x0000000000390000-0x00000000003BA000-memory.dmpFilesize
168KB
-
memory/1240-64-0x0000000000400000-0x00000000004F1000-memory.dmpFilesize
964KB
-
memory/1240-65-0x00000000003C0000-0x00000000003F9000-memory.dmpFilesize
228KB
-
memory/1240-66-0x0000000000330000-0x000000000034A000-memory.dmpFilesize
104KB