Analysis
-
max time kernel
90s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
05-07-2022 12:43
Static task
static1
Behavioral task
behavioral1
Sample
9e21e39cd313c6974c5ca9133f9c29acd59f09a90d2c78cf6302516fd4d93897.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
9e21e39cd313c6974c5ca9133f9c29acd59f09a90d2c78cf6302516fd4d93897.exe
Resource
win10v2004-20220414-en
General
-
Target
9e21e39cd313c6974c5ca9133f9c29acd59f09a90d2c78cf6302516fd4d93897.exe
-
Size
653KB
-
MD5
9ec150a4c04da6a1087a3cd36086fde3
-
SHA1
d67ef87f7f756ea776ae3f63a2b2a86e2a3fe061
-
SHA256
9e21e39cd313c6974c5ca9133f9c29acd59f09a90d2c78cf6302516fd4d93897
-
SHA512
778955d57edc4395ad64c802a323a6f958aa27a0e32bd496f7b3da805fadc8e7fc19b6703bad9931a74bd8c35297fbfd4591a383efe4fc315a9827b34ca843fd
Malware Config
Signatures
-
Cold Stealer
An info stealer written in C#, first seen in Feb 2022.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
9e21e39cd313c6974c5ca9133f9c29acd59f09a90d2c78cf6302516fd4d93897.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 9e21e39cd313c6974c5ca9133f9c29acd59f09a90d2c78cf6302516fd4d93897.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 9e21e39cd313c6974c5ca9133f9c29acd59f09a90d2c78cf6302516fd4d93897.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
9e21e39cd313c6974c5ca9133f9c29acd59f09a90d2c78cf6302516fd4d93897.exepid process 2324 9e21e39cd313c6974c5ca9133f9c29acd59f09a90d2c78cf6302516fd4d93897.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
9e21e39cd313c6974c5ca9133f9c29acd59f09a90d2c78cf6302516fd4d93897.exedescription pid process Token: SeDebugPrivilege 2324 9e21e39cd313c6974c5ca9133f9c29acd59f09a90d2c78cf6302516fd4d93897.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e21e39cd313c6974c5ca9133f9c29acd59f09a90d2c78cf6302516fd4d93897.exe"C:\Users\Admin\AppData\Local\Temp\9e21e39cd313c6974c5ca9133f9c29acd59f09a90d2c78cf6302516fd4d93897.exe"1⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2324-130-0x0000000000400000-0x00000000004F1000-memory.dmpFilesize
964KB
-
memory/2324-131-0x0000000000400000-0x00000000004F1000-memory.dmpFilesize
964KB
-
memory/2324-133-0x00000000007E0000-0x0000000000819000-memory.dmpFilesize
228KB
-
memory/2324-132-0x0000000000400000-0x00000000004F1000-memory.dmpFilesize
964KB
-
memory/2324-134-0x0000000000400000-0x00000000004F1000-memory.dmpFilesize
964KB
-
memory/2324-135-0x00000000007B0000-0x00000000007DA000-memory.dmpFilesize
168KB
-
memory/2324-141-0x0000000002B00000-0x0000000002B50000-memory.dmpFilesize
320KB
-
memory/2324-142-0x0000000002B50000-0x0000000002BEC000-memory.dmpFilesize
624KB
-
memory/2324-143-0x0000000005240000-0x00000000057E4000-memory.dmpFilesize
5.6MB
-
memory/2324-144-0x0000000005830000-0x00000000058C2000-memory.dmpFilesize
584KB
-
memory/2324-145-0x00000000058D0000-0x0000000005936000-memory.dmpFilesize
408KB