Analysis
-
max time kernel
152s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 09:57
Static task
static1
Behavioral task
behavioral1
Sample
e126825effd0b02dc23d42e2775a30d00e78a57f3ca2e1ebac95d733a85ff163.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e126825effd0b02dc23d42e2775a30d00e78a57f3ca2e1ebac95d733a85ff163.exe
Resource
win10v2004-20220812-en
General
-
Target
e126825effd0b02dc23d42e2775a30d00e78a57f3ca2e1ebac95d733a85ff163.exe
-
Size
817KB
-
MD5
081cf88e8d8525cceacf2a53c4bc73d0
-
SHA1
b692f9a9091462bfd5460161bb1e49cecdfcaa53
-
SHA256
e126825effd0b02dc23d42e2775a30d00e78a57f3ca2e1ebac95d733a85ff163
-
SHA512
70bac6cce2797de5c131f9d0c93c88558bb05adfc97106fc95d34d693b879febd891c1de126d09555470fc15333ffe85602082c3d56453e007736f32a85412a2
-
SSDEEP
24576:LtlybcWOIivsnJ3vUo9p+TOE92m2lHZedM0S/:plcJ1JfUApAOE9PdR
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1424-54-0x0000000000400000-0x000000000063F000-memory.dmp upx behavioral1/memory/1424-55-0x0000000000400000-0x000000000063F000-memory.dmp upx behavioral1/memory/1424-57-0x0000000000400000-0x000000000063F000-memory.dmp upx behavioral1/memory/1424-58-0x0000000000400000-0x000000000063F000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run e126825effd0b02dc23d42e2775a30d00e78a57f3ca2e1ebac95d733a85ff163.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\NetworkChecker = "C:\\Users\\Admin\\AppData\\Local\\Temp\\e126825effd0b02dc23d42e2775a30d00e78a57f3ca2e1ebac95d733a85ff163.exe" e126825effd0b02dc23d42e2775a30d00e78a57f3ca2e1ebac95d733a85ff163.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.