Analysis
-
max time kernel
90s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:53
Static task
static1
Behavioral task
behavioral1
Sample
3ae0a792dfc52a2e0af92eae76222ea3d00196bd92ee6bacaeed57338b079489.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3ae0a792dfc52a2e0af92eae76222ea3d00196bd92ee6bacaeed57338b079489.exe
Resource
win10v2004-20221111-en
General
-
Target
3ae0a792dfc52a2e0af92eae76222ea3d00196bd92ee6bacaeed57338b079489.exe
-
Size
75KB
-
MD5
9c6444dff31d5faebd5f6178ea06405b
-
SHA1
a37e10283bc8e2cbfde7c59c56c8e63fa965cea5
-
SHA256
3ae0a792dfc52a2e0af92eae76222ea3d00196bd92ee6bacaeed57338b079489
-
SHA512
63fa6cfa4316854497e1afc8d8c16d86f3bfc17d0bb98e7dbf368dd34bd6ab163f2e5086b93bce8da1eb9ba63831da2275d7a678e5bb94f27187841a20e695c2
-
SSDEEP
1536:kjrqL9dAlxVGAZ+cpIbVuSCc98Sad7xaY1gnOIqjybLm77D:kj2hdAlxUAVIbiu4EYeOxy+XD
Malware Config
Signatures
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
3ae0a792dfc52a2e0af92eae76222ea3d00196bd92ee6bacaeed57338b079489.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Service Helper = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\winsvc.exe" 3ae0a792dfc52a2e0af92eae76222ea3d00196bd92ee6bacaeed57338b079489.exe -
Processes:
3ae0a792dfc52a2e0af92eae76222ea3d00196bd92ee6bacaeed57338b079489.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Main 3ae0a792dfc52a2e0af92eae76222ea3d00196bd92ee6bacaeed57338b079489.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
3ae0a792dfc52a2e0af92eae76222ea3d00196bd92ee6bacaeed57338b079489.exepid process 2028 3ae0a792dfc52a2e0af92eae76222ea3d00196bd92ee6bacaeed57338b079489.exe 2028 3ae0a792dfc52a2e0af92eae76222ea3d00196bd92ee6bacaeed57338b079489.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ae0a792dfc52a2e0af92eae76222ea3d00196bd92ee6bacaeed57338b079489.exe"C:\Users\Admin\AppData\Local\Temp\3ae0a792dfc52a2e0af92eae76222ea3d00196bd92ee6bacaeed57338b079489.exe"1⤵
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2028