Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 12:39
Static task
static1
Behavioral task
behavioral1
Sample
f9d0ec1be89894a98bdc2389e5e498266da3981a98e707dbfeec785be444e651.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f9d0ec1be89894a98bdc2389e5e498266da3981a98e707dbfeec785be444e651.exe
Resource
win10v2004-20220812-en
General
-
Target
f9d0ec1be89894a98bdc2389e5e498266da3981a98e707dbfeec785be444e651.exe
-
Size
822KB
-
MD5
f79a70cfd7f00f1953576a46fcc80a53
-
SHA1
ac6e0aa5ad578b42114ac99c896029086a60424d
-
SHA256
f9d0ec1be89894a98bdc2389e5e498266da3981a98e707dbfeec785be444e651
-
SHA512
9560c91287ca9947e5ee50cdd304b69681a7449095814cb2c8cb100018f4fb1621e4a4fb9b952fbc893c1946db8cfc30cfd7b150d50ef448c02504662ef0505e
-
SSDEEP
12288:GN9d3wtH2Q574FJ0nNTp/ptPQK+hnYoMqChyBW5VbH6+LgFfzyuajt4e0UVCVl:yYtHP576Mf/ptPQdPChyBga+LgNy14
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/768-55-0x0000000000400000-0x0000000000644000-memory.dmp upx behavioral1/memory/768-56-0x0000000000400000-0x0000000000644000-memory.dmp upx behavioral1/memory/768-58-0x0000000000400000-0x0000000000644000-memory.dmp upx behavioral1/memory/768-59-0x0000000000400000-0x0000000000644000-memory.dmp upx behavioral1/memory/768-60-0x0000000000400000-0x0000000000644000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
f9d0ec1be89894a98bdc2389e5e498266da3981a98e707dbfeec785be444e651.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run f9d0ec1be89894a98bdc2389e5e498266da3981a98e707dbfeec785be444e651.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\NetworkChecker = "C:\\Users\\Admin\\AppData\\Local\\Temp\\f9d0ec1be89894a98bdc2389e5e498266da3981a98e707dbfeec785be444e651.exe" f9d0ec1be89894a98bdc2389e5e498266da3981a98e707dbfeec785be444e651.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.