Analysis
-
max time kernel
122s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/10/2022, 22:45
Static task
static1
Behavioral task
behavioral1
Sample
609643cf3bd73312323d665910bf3a625a3aadd996b7111a8f77f5b917ec05dc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
609643cf3bd73312323d665910bf3a625a3aadd996b7111a8f77f5b917ec05dc.exe
Resource
win10v2004-20220812-en
General
-
Target
609643cf3bd73312323d665910bf3a625a3aadd996b7111a8f77f5b917ec05dc.exe
-
Size
168KB
-
MD5
918a55fb571e76c327ac7cc3f8abafd0
-
SHA1
14537478eb5fc0204d3bea50884122758b8c4451
-
SHA256
609643cf3bd73312323d665910bf3a625a3aadd996b7111a8f77f5b917ec05dc
-
SHA512
75f20f72d2645315c51b58091c9ead88560007f29e8d32d39486d2afc5ae6168154e6bed67af7aaca8b36e7485f89c58b5c61c46ef0a69f5b31384907b774a2b
-
SSDEEP
3072:qSkgkOEcKwJJ5z2IDOMLNpdyb6dol2qUPfAJ7qsu/ipu+kJQAYp9:bdkOPKwX5qQFNpdQ6oV7Trpu+kJY
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\A32A6\\383C5.exe" 609643cf3bd73312323d665910bf3a625a3aadd996b7111a8f77f5b917ec05dc.exe -
resource yara_rule behavioral2/memory/2800-136-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/4668-140-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/2800-141-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/4940-144-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/4940-146-0x0000000000400000-0x0000000000490000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2800 wrote to memory of 4668 2800 609643cf3bd73312323d665910bf3a625a3aadd996b7111a8f77f5b917ec05dc.exe 81 PID 2800 wrote to memory of 4668 2800 609643cf3bd73312323d665910bf3a625a3aadd996b7111a8f77f5b917ec05dc.exe 81 PID 2800 wrote to memory of 4668 2800 609643cf3bd73312323d665910bf3a625a3aadd996b7111a8f77f5b917ec05dc.exe 81 PID 2800 wrote to memory of 4940 2800 609643cf3bd73312323d665910bf3a625a3aadd996b7111a8f77f5b917ec05dc.exe 82 PID 2800 wrote to memory of 4940 2800 609643cf3bd73312323d665910bf3a625a3aadd996b7111a8f77f5b917ec05dc.exe 82 PID 2800 wrote to memory of 4940 2800 609643cf3bd73312323d665910bf3a625a3aadd996b7111a8f77f5b917ec05dc.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\609643cf3bd73312323d665910bf3a625a3aadd996b7111a8f77f5b917ec05dc.exe"C:\Users\Admin\AppData\Local\Temp\609643cf3bd73312323d665910bf3a625a3aadd996b7111a8f77f5b917ec05dc.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\609643cf3bd73312323d665910bf3a625a3aadd996b7111a8f77f5b917ec05dc.exeC:\Users\Admin\AppData\Local\Temp\609643cf3bd73312323d665910bf3a625a3aadd996b7111a8f77f5b917ec05dc.exe startC:\Program Files (x86)\LP\C5CA\E24.exe%C:\Program Files (x86)\LP\C5CA2⤵PID:4668
-
-
C:\Users\Admin\AppData\Local\Temp\609643cf3bd73312323d665910bf3a625a3aadd996b7111a8f77f5b917ec05dc.exeC:\Users\Admin\AppData\Local\Temp\609643cf3bd73312323d665910bf3a625a3aadd996b7111a8f77f5b917ec05dc.exe startC:\Program Files (x86)\A650A\lvvm.exe%C:\Program Files (x86)\A650A2⤵PID:4940
-