Analysis
-
max time kernel
43s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 08:00
Static task
static1
Behavioral task
behavioral1
Sample
ebc3cb7fb47e4680b48e8951fcee6d60d1c9f30aab110cc77a122f65f4fe2694.exe
Resource
win7-20220901-en
6 signatures
150 seconds
General
-
Target
ebc3cb7fb47e4680b48e8951fcee6d60d1c9f30aab110cc77a122f65f4fe2694.exe
-
Size
58KB
-
MD5
7005c454bb652c62da02da60f1205b77
-
SHA1
0cf302ee60e42cb12b56c394983d53d56fc3c2d1
-
SHA256
ebc3cb7fb47e4680b48e8951fcee6d60d1c9f30aab110cc77a122f65f4fe2694
-
SHA512
ae9de19c672c80977e009b2e03d577e1c2625843b9dc47179b03fe0e48281010334df47c5b8ecab77788387a635dab1954b4b77ddc21b2f97700d95977d1d759
-
SSDEEP
1536:PaHLtZfHy0O/JuSkZWeGkqbT3ckFqtLUNCdJ:PaHzHY/JBOQksAkItZJ
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 620 set thread context of 1708 620 ebc3cb7fb47e4680b48e8951fcee6d60d1c9f30aab110cc77a122f65f4fe2694.exe 27 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} ebc3cb7fb47e4680b48e8951fcee6d60d1c9f30aab110cc77a122f65f4fe2694.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\SuggestionsURLFallback = "http://www.google.com/cse?cx=partner-pub-9588033570232632:rhmyra-cwbb&q={searchTerms}" ebc3cb7fb47e4680b48e8951fcee6d60d1c9f30aab110cc77a122f65f4fe2694.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\URL = "http://www.google.com/cse?cx=partner-pub-9588033570232632:rhmyra-cwbb&q={searchTerms}" ebc3cb7fb47e4680b48e8951fcee6d60d1c9f30aab110cc77a122f65f4fe2694.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\DisplayName = "Google" ebc3cb7fb47e4680b48e8951fcee6d60d1c9f30aab110cc77a122f65f4fe2694.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main ebc3cb7fb47e4680b48e8951fcee6d60d1c9f30aab110cc77a122f65f4fe2694.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\SearchScopes ebc3cb7fb47e4680b48e8951fcee6d60d1c9f30aab110cc77a122f65f4fe2694.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadUpdates = "398336" ebc3cb7fb47e4680b48e8951fcee6d60d1c9f30aab110cc77a122f65f4fe2694.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "file://localhost/C:/www.google.com.htm" ebc3cb7fb47e4680b48e8951fcee6d60d1c9f30aab110cc77a122f65f4fe2694.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1708 ebc3cb7fb47e4680b48e8951fcee6d60d1c9f30aab110cc77a122f65f4fe2694.exe 1708 ebc3cb7fb47e4680b48e8951fcee6d60d1c9f30aab110cc77a122f65f4fe2694.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 620 wrote to memory of 1708 620 ebc3cb7fb47e4680b48e8951fcee6d60d1c9f30aab110cc77a122f65f4fe2694.exe 27 PID 620 wrote to memory of 1708 620 ebc3cb7fb47e4680b48e8951fcee6d60d1c9f30aab110cc77a122f65f4fe2694.exe 27 PID 620 wrote to memory of 1708 620 ebc3cb7fb47e4680b48e8951fcee6d60d1c9f30aab110cc77a122f65f4fe2694.exe 27 PID 620 wrote to memory of 1708 620 ebc3cb7fb47e4680b48e8951fcee6d60d1c9f30aab110cc77a122f65f4fe2694.exe 27 PID 620 wrote to memory of 1708 620 ebc3cb7fb47e4680b48e8951fcee6d60d1c9f30aab110cc77a122f65f4fe2694.exe 27 PID 620 wrote to memory of 1708 620 ebc3cb7fb47e4680b48e8951fcee6d60d1c9f30aab110cc77a122f65f4fe2694.exe 27 PID 620 wrote to memory of 1708 620 ebc3cb7fb47e4680b48e8951fcee6d60d1c9f30aab110cc77a122f65f4fe2694.exe 27 PID 1708 wrote to memory of 1192 1708 ebc3cb7fb47e4680b48e8951fcee6d60d1c9f30aab110cc77a122f65f4fe2694.exe 16 PID 1708 wrote to memory of 1192 1708 ebc3cb7fb47e4680b48e8951fcee6d60d1c9f30aab110cc77a122f65f4fe2694.exe 16 PID 1708 wrote to memory of 1192 1708 ebc3cb7fb47e4680b48e8951fcee6d60d1c9f30aab110cc77a122f65f4fe2694.exe 16 PID 1708 wrote to memory of 1192 1708 ebc3cb7fb47e4680b48e8951fcee6d60d1c9f30aab110cc77a122f65f4fe2694.exe 16
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\ebc3cb7fb47e4680b48e8951fcee6d60d1c9f30aab110cc77a122f65f4fe2694.exe"C:\Users\Admin\AppData\Local\Temp\ebc3cb7fb47e4680b48e8951fcee6d60d1c9f30aab110cc77a122f65f4fe2694.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Users\Admin\AppData\Local\Temp\ebc3cb7fb47e4680b48e8951fcee6d60d1c9f30aab110cc77a122f65f4fe2694.exeC:\Users\Admin\AppData\Local\Temp\ebc3cb7fb47e4680b48e8951fcee6d60d1c9f30aab110cc77a122f65f4fe2694.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1708
-
-