Analysis
-
max time kernel
151s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19-10-2022 13:53
Static task
static1
Behavioral task
behavioral1
Sample
sample and order.exe
Resource
win7-20220812-en
General
-
Target
sample and order.exe
-
Size
281KB
-
MD5
7dbd6df3ec4fec51110e44dd2122d166
-
SHA1
078d7b5f3453fcb85908cd9209a07766f613307f
-
SHA256
cf7fc1a1f8101f89f4b4693b664e96f88febde65bc7c0b5f9dc19ce060c45c84
-
SHA512
c17ff24eedc17ac985a894f10546761b08965cf5e4c0d7d94466546b8c723cb7140ed37a99be0af64d8abeb1d0092fd16b8e6efe96eecdcb7d62e56d8b9de3c1
-
SSDEEP
6144:PDRYLF0WnhfA+UOx85VjsXov0Df+FyUzg:rR20Wnt3KsXo8DfCywg
Malware Config
Extracted
formbook
hlpq
mldSsngjzTHzaBZba069RrUmJw==
f0b/EZNM9UFUVxE=
MDL3b5SzuL6PH/Kikfw=
OudWLtIWZJFGaA==
xXgtQAEmIRjnk2vd+TVnrkpcMA==
HNmBV2fv0mP2gxk=
faeiX5TDOI5ltFsZ
bP0KGLe8mXkxmVkO
VRZeZu3VJs1Q2mET
A9mQgvhLDCUYYg==
TvpiStz3fge+3ZpO73Vj
fBaaUHWI3y02WQXrUa5r
54L6DSGvfeO1tVb9e6sktVDY
yM0Iv3K6hwXriE3Nu+N2eB60w0VNNgo=
obVogUsv0CTETtGGNqAktVDY
zuyrKkdHKGP2gxk=
ZnYxy5BL3u+4qVgkuJufqg==
0P24HCo4h+iuJfKikfw=
gaVk/JEbvFmbJDqNk+s=
bTekCo8Z5gcepjtsjtmGzZ0=
UhfQUXquEkXUdSojVZNh
uurQ029w2zH8rUPwZaAktVDY
ZwB7AaE5Qa94rnv5IWlkEcPFcnRadiDm
/S/wfRCptgCQYD2kvQ==
xMXA/DLQOy/8CqpzfvR8
4x8YQf8HatCkVgH3UdfGE3HQ
cDy1X5TXWaCXq1TdCGGn5MQdbXv8PAHu
GMZwXhQfMjHulT4sxvGj6EdyifsPYA==
cqyUgQopoKIxmVkO
YyTadgitjqK0QeONa6P3+ow=
Dj4lq4dEJYJUWP6IAXwktVDY
eVQMwWr/xuLnexhMrutttow=
jci91t1FvPqQAY+Be61Tn4Q=
UFAQCzzxzi4LBAmRtw==
XhaKC7ZkDCUYYg==
kETqcKC1t+/rdypsh61Tn4Q=
vuanPPmWYb+HYD2kvQ==
G+VqmZEiJmh0H/Kikfw=
7Q7V86fEIIxjF+0hPrgjcHwEifsPYA==
/Am8wLUzwe7yBphTQpC8uw==
uFLWDjaHUP/BXwQ=
JT4/HCOzQkUUMu/rUa5r
/a2nbAg08EBJ
Q1sUlLjW3bq8uldTd69y
7igxbYF2uvb5HbREHkDHRrUmJw==
mE7j3//GIMKRTRY=
LMZOhaATaYyXtFHR9SAUTiZpOg==
QdRRZm/VWtSlVPPrUa5r
8Qa7zVTIK1ZN
kp5TZSNKoQzpNhMd7XNj
5/Ku3oOct+q0z5VfA0OKk5Td
Ql4m8gUVZsaf4Jpiqg==
h7+5WRm6supxfWe1x61Tn4Q=
wmQXMPITcZ0VchuNtQ==
cYY/T9e7rriUIfKikfw=
Pfr3LRJvd4o=
B46XQABQFWNe
bDgsAMvx6/KpZhnkuPQqNzpzifsPYA==
2+18kE1W0C4pYSWq5URSpnL1OQ==
E7w6u2geFWP2gxk=
O0fKwGeBzriPkjUnycPJE3fQ
OsxBrWnFe3ZJIwN3lOw2dJ+s6us=
c/xEVODh9gTfdypmh61Tn4Q=
krWmUgmfcGwvxVgbZ7T9Sl/WLy2R5aqKzg==
dbd2.top
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 400 set thread context of 5004 400 sample and order.exe 82 PID 5004 set thread context of 2228 5004 Regsvcs.exe 50 PID 1136 set thread context of 2228 1136 rundll32.exe 50 -
description ioc Process Key created \Registry\User\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 5004 Regsvcs.exe 5004 Regsvcs.exe 5004 Regsvcs.exe 5004 Regsvcs.exe 5004 Regsvcs.exe 5004 Regsvcs.exe 5004 Regsvcs.exe 5004 Regsvcs.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2228 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 5004 Regsvcs.exe 5004 Regsvcs.exe 5004 Regsvcs.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5004 Regsvcs.exe Token: SeDebugPrivilege 1136 rundll32.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 400 wrote to memory of 5004 400 sample and order.exe 82 PID 400 wrote to memory of 5004 400 sample and order.exe 82 PID 400 wrote to memory of 5004 400 sample and order.exe 82 PID 400 wrote to memory of 5004 400 sample and order.exe 82 PID 400 wrote to memory of 5004 400 sample and order.exe 82 PID 400 wrote to memory of 5004 400 sample and order.exe 82 PID 2228 wrote to memory of 1136 2228 Explorer.EXE 83 PID 2228 wrote to memory of 1136 2228 Explorer.EXE 83 PID 2228 wrote to memory of 1136 2228 Explorer.EXE 83 PID 1136 wrote to memory of 4372 1136 rundll32.exe 91 PID 1136 wrote to memory of 4372 1136 rundll32.exe 91 PID 1136 wrote to memory of 4372 1136 rundll32.exe 91
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\sample and order.exe"C:\Users\Admin\AppData\Local\Temp\sample and order.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Regsvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Regsvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:5004
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:4372
-
-