Analysis
-
max time kernel
43s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
18-10-2022 07:22
Behavioral task
behavioral1
Sample
8a93ed0f80b337ece9ffc9380fe6b69b6a1c7c25052a8f8eefecdc5a13e9966c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8a93ed0f80b337ece9ffc9380fe6b69b6a1c7c25052a8f8eefecdc5a13e9966c.exe
Resource
win10v2004-20220812-en
General
-
Target
8a93ed0f80b337ece9ffc9380fe6b69b6a1c7c25052a8f8eefecdc5a13e9966c.exe
-
Size
632KB
-
MD5
d3a9112f8479de6d0bb80daa086ee39d
-
SHA1
c7044e763bddd442c7ff7504efe954ea4dbe6848
-
SHA256
8a93ed0f80b337ece9ffc9380fe6b69b6a1c7c25052a8f8eefecdc5a13e9966c
-
SHA512
0a604cea4bc5e13c6ac8bbbc381b9a1827e47ddde2b6713574e89ffd627eb2ac16be4760264a09d4894450d32359e9f2d233cef59dd5e9add6f1cf802f44d2d2
-
SSDEEP
12288:QAEx4EoqHsQdmxl6zbr+F3KUf79EAN9IT6uOB2f/9E8k:LEx45zxI+bcTFY2dC
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 1744 attrib.exe -
resource yara_rule behavioral1/memory/1788-72-0x000000013F980000-0x000000013FAB5000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 8a93ed0f80b337ece9ffc9380fe6b69b6a1c7c25052a8f8eefecdc5a13e9966c.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run 8a93ed0f80b337ece9ffc9380fe6b69b6a1c7c25052a8f8eefecdc5a13e9966c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 8a93ed0f80b337ece9ffc9380fe6b69b6a1c7c25052a8f8eefecdc5a13e9966c.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\QQDisabled 8a93ed0f80b337ece9ffc9380fe6b69b6a1c7c25052a8f8eefecdc5a13e9966c.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1788-72-0x000000013F980000-0x000000013FAB5000-memory.dmp autoit_exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\MAIN 8a93ed0f80b337ece9ffc9380fe6b69b6a1c7c25052a8f8eefecdc5a13e9966c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\MAIN\Default_Page_URL = "http://www.cbala.com/" 8a93ed0f80b337ece9ffc9380fe6b69b6a1c7c25052a8f8eefecdc5a13e9966c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\MAIN\Search Page = "http://www.cbala.com/" 8a93ed0f80b337ece9ffc9380fe6b69b6a1c7c25052a8f8eefecdc5a13e9966c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\MAIN\First Home Page = "http://www.cbala.com/" 8a93ed0f80b337ece9ffc9380fe6b69b6a1c7c25052a8f8eefecdc5a13e9966c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN 8a93ed0f80b337ece9ffc9380fe6b69b6a1c7c25052a8f8eefecdc5a13e9966c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.cbala.com/" 8a93ed0f80b337ece9ffc9380fe6b69b6a1c7c25052a8f8eefecdc5a13e9966c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Default_Search_URL = "http://www.cbala.com/" 8a93ed0f80b337ece9ffc9380fe6b69b6a1c7c25052a8f8eefecdc5a13e9966c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://www.cbala.com/" 8a93ed0f80b337ece9ffc9380fe6b69b6a1c7c25052a8f8eefecdc5a13e9966c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Default_Page_URL = "http://www.cbala.com/" 8a93ed0f80b337ece9ffc9380fe6b69b6a1c7c25052a8f8eefecdc5a13e9966c.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main 8a93ed0f80b337ece9ffc9380fe6b69b6a1c7c25052a8f8eefecdc5a13e9966c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Search Bar = "http://www.cbala.com/" 8a93ed0f80b337ece9ffc9380fe6b69b6a1c7c25052a8f8eefecdc5a13e9966c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\MAIN\Default_Search_URL = "http://www.cbala.com/" 8a93ed0f80b337ece9ffc9380fe6b69b6a1c7c25052a8f8eefecdc5a13e9966c.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.cbala.com/" 8a93ed0f80b337ece9ffc9380fe6b69b6a1c7c25052a8f8eefecdc5a13e9966c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\MAIN\Start Page = "http://www.cbala.com/" 8a93ed0f80b337ece9ffc9380fe6b69b6a1c7c25052a8f8eefecdc5a13e9966c.exe -
Modifies registry class 11 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\Background\shellex\ContextMenuHandlers\new\ = "{D969A300-E7FF-11d0-A93B-00A0C90F2719}" reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\Background\shellex\ContextMenuHandlers\XXX Groove GFS Context Menu Handler XXX reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\Background\shellex\ContextMenuHandlers\new reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\Background reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\Background\shellex reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\Background\shellex\ContextMenuHandlers reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\Background\shellex\ContextMenuHandlers\Gadgets reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\Background\shellex\ContextMenuHandlers\New reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\Background\shellex\ContextMenuHandlers\Sharing reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\Background\shellex\ContextMenuHandlers reg.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 596 regsvr32.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 1788 wrote to memory of 1496 1788 8a93ed0f80b337ece9ffc9380fe6b69b6a1c7c25052a8f8eefecdc5a13e9966c.exe 27 PID 1788 wrote to memory of 1496 1788 8a93ed0f80b337ece9ffc9380fe6b69b6a1c7c25052a8f8eefecdc5a13e9966c.exe 27 PID 1788 wrote to memory of 1496 1788 8a93ed0f80b337ece9ffc9380fe6b69b6a1c7c25052a8f8eefecdc5a13e9966c.exe 27 PID 1788 wrote to memory of 1732 1788 8a93ed0f80b337ece9ffc9380fe6b69b6a1c7c25052a8f8eefecdc5a13e9966c.exe 29 PID 1788 wrote to memory of 1732 1788 8a93ed0f80b337ece9ffc9380fe6b69b6a1c7c25052a8f8eefecdc5a13e9966c.exe 29 PID 1788 wrote to memory of 1732 1788 8a93ed0f80b337ece9ffc9380fe6b69b6a1c7c25052a8f8eefecdc5a13e9966c.exe 29 PID 1732 wrote to memory of 1744 1732 cmd.exe 31 PID 1732 wrote to memory of 1744 1732 cmd.exe 31 PID 1732 wrote to memory of 1744 1732 cmd.exe 31 PID 1788 wrote to memory of 1272 1788 8a93ed0f80b337ece9ffc9380fe6b69b6a1c7c25052a8f8eefecdc5a13e9966c.exe 32 PID 1788 wrote to memory of 1272 1788 8a93ed0f80b337ece9ffc9380fe6b69b6a1c7c25052a8f8eefecdc5a13e9966c.exe 32 PID 1788 wrote to memory of 1272 1788 8a93ed0f80b337ece9ffc9380fe6b69b6a1c7c25052a8f8eefecdc5a13e9966c.exe 32 PID 1788 wrote to memory of 1752 1788 8a93ed0f80b337ece9ffc9380fe6b69b6a1c7c25052a8f8eefecdc5a13e9966c.exe 34 PID 1788 wrote to memory of 1752 1788 8a93ed0f80b337ece9ffc9380fe6b69b6a1c7c25052a8f8eefecdc5a13e9966c.exe 34 PID 1788 wrote to memory of 1752 1788 8a93ed0f80b337ece9ffc9380fe6b69b6a1c7c25052a8f8eefecdc5a13e9966c.exe 34 PID 1752 wrote to memory of 2012 1752 cmd.exe 36 PID 1752 wrote to memory of 2012 1752 cmd.exe 36 PID 1752 wrote to memory of 2012 1752 cmd.exe 36 PID 1788 wrote to memory of 240 1788 8a93ed0f80b337ece9ffc9380fe6b69b6a1c7c25052a8f8eefecdc5a13e9966c.exe 37 PID 1788 wrote to memory of 240 1788 8a93ed0f80b337ece9ffc9380fe6b69b6a1c7c25052a8f8eefecdc5a13e9966c.exe 37 PID 1788 wrote to memory of 240 1788 8a93ed0f80b337ece9ffc9380fe6b69b6a1c7c25052a8f8eefecdc5a13e9966c.exe 37 PID 240 wrote to memory of 596 240 cmd.exe 39 PID 240 wrote to memory of 596 240 cmd.exe 39 PID 240 wrote to memory of 596 240 cmd.exe 39 PID 240 wrote to memory of 596 240 cmd.exe 39 PID 240 wrote to memory of 596 240 cmd.exe 39 PID 1788 wrote to memory of 520 1788 8a93ed0f80b337ece9ffc9380fe6b69b6a1c7c25052a8f8eefecdc5a13e9966c.exe 40 PID 1788 wrote to memory of 520 1788 8a93ed0f80b337ece9ffc9380fe6b69b6a1c7c25052a8f8eefecdc5a13e9966c.exe 40 PID 1788 wrote to memory of 520 1788 8a93ed0f80b337ece9ffc9380fe6b69b6a1c7c25052a8f8eefecdc5a13e9966c.exe 40 PID 520 wrote to memory of 1476 520 cmd.exe 42 PID 520 wrote to memory of 1476 520 cmd.exe 42 PID 520 wrote to memory of 1476 520 cmd.exe 42 PID 1788 wrote to memory of 804 1788 8a93ed0f80b337ece9ffc9380fe6b69b6a1c7c25052a8f8eefecdc5a13e9966c.exe 43 PID 1788 wrote to memory of 804 1788 8a93ed0f80b337ece9ffc9380fe6b69b6a1c7c25052a8f8eefecdc5a13e9966c.exe 43 PID 1788 wrote to memory of 804 1788 8a93ed0f80b337ece9ffc9380fe6b69b6a1c7c25052a8f8eefecdc5a13e9966c.exe 43 PID 804 wrote to memory of 1828 804 cmd.exe 45 PID 804 wrote to memory of 1828 804 cmd.exe 45 PID 804 wrote to memory of 1828 804 cmd.exe 45 PID 1788 wrote to memory of 964 1788 8a93ed0f80b337ece9ffc9380fe6b69b6a1c7c25052a8f8eefecdc5a13e9966c.exe 46 PID 1788 wrote to memory of 964 1788 8a93ed0f80b337ece9ffc9380fe6b69b6a1c7c25052a8f8eefecdc5a13e9966c.exe 46 PID 1788 wrote to memory of 964 1788 8a93ed0f80b337ece9ffc9380fe6b69b6a1c7c25052a8f8eefecdc5a13e9966c.exe 46 PID 964 wrote to memory of 868 964 cmd.exe 48 PID 964 wrote to memory of 868 964 cmd.exe 48 PID 964 wrote to memory of 868 964 cmd.exe 48 PID 1788 wrote to memory of 1888 1788 8a93ed0f80b337ece9ffc9380fe6b69b6a1c7c25052a8f8eefecdc5a13e9966c.exe 49 PID 1788 wrote to memory of 1888 1788 8a93ed0f80b337ece9ffc9380fe6b69b6a1c7c25052a8f8eefecdc5a13e9966c.exe 49 PID 1788 wrote to memory of 1888 1788 8a93ed0f80b337ece9ffc9380fe6b69b6a1c7c25052a8f8eefecdc5a13e9966c.exe 49 PID 1888 wrote to memory of 1928 1888 cmd.exe 51 PID 1888 wrote to memory of 1928 1888 cmd.exe 51 PID 1888 wrote to memory of 1928 1888 cmd.exe 51 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 1744 attrib.exe 2012 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a93ed0f80b337ece9ffc9380fe6b69b6a1c7c25052a8f8eefecdc5a13e9966c.exe"C:\Users\Admin\AppData\Local\Temp\8a93ed0f80b337ece9ffc9380fe6b69b6a1c7c25052a8f8eefecdc5a13e9966c.exe"1⤵
- Adds Run key to start application
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cd C:\Users2⤵PID:1496
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c attrib +r +h +s desktop.ini2⤵
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\system32\attrib.exeattrib +r +h +s desktop.ini3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1744
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cd ..2⤵PID:1272
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c attrib +r C:\Users2⤵
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\system32\attrib.exeattrib +r C:\Users3⤵
- Views/modifies file attributes
PID:2012
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c regsvr32 /u /s igfxpph.dll2⤵
- Suspicious use of WriteProcessMemory
PID:240 -
C:\Windows\system32\regsvr32.exeregsvr32 /u /s igfxpph.dll3⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:596
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg delete HKEY_CLASSES_ROOT\Directory\Background\shellex\ContextMenuHandlers /f2⤵
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Windows\system32\reg.exereg delete HKEY_CLASSES_ROOT\Directory\Background\shellex\ContextMenuHandlers /f3⤵
- Modifies registry class
PID:1476
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg add HKEY_CLASSES_ROOT\Directory\Background\shellex\ContextMenuHandlers\new /ve /d {D969A300-E7FF-11d0-A93B-00A0C90F2719}2⤵
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\system32\reg.exereg add HKEY_CLASSES_ROOT\Directory\Background\shellex\ContextMenuHandlers\new /ve /d {D969A300-E7FF-11d0-A93B-00A0C90F2719}3⤵
- Modifies registry class
PID:1828
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg delete HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v HotKeysCmds /f2⤵
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\system32\reg.exereg delete HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v HotKeysCmds /f3⤵PID:868
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg delete HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v IgfxTray /f2⤵
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\system32\reg.exereg delete HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v IgfxTray /f3⤵PID:1928
-
-