Analysis
-
max time kernel
153s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 13:46
Static task
static1
Behavioral task
behavioral1
Sample
8712292b3ab867d4128a83297c2507df3be712217ea7b0a347045a396f31af8b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8712292b3ab867d4128a83297c2507df3be712217ea7b0a347045a396f31af8b.exe
Resource
win10v2004-20220812-en
General
-
Target
8712292b3ab867d4128a83297c2507df3be712217ea7b0a347045a396f31af8b.exe
-
Size
1.1MB
-
MD5
ea6b3587b3e8815af030f45256f1d188
-
SHA1
276825ef7410d95e62a189c7ec580959c0f72739
-
SHA256
8712292b3ab867d4128a83297c2507df3be712217ea7b0a347045a396f31af8b
-
SHA512
caafa540846c7a35de1d5b36ec263a19ed06dfbb7b4a504994d0da1b8581d6948019d6709a68bf030494e8dcbf33ce8bf4c83cc75e6beefbe50393c1d7208588
-
SSDEEP
24576:yPa6fMw6UGlehyaIaXfmJlYIUQ0KNrQ9uRl/5:e8998QqcB5L
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/4308-133-0x0000000000400000-0x000000000065A000-memory.dmp upx behavioral2/memory/4308-135-0x0000000000400000-0x000000000065A000-memory.dmp upx behavioral2/memory/4308-136-0x0000000000400000-0x000000000065A000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
8712292b3ab867d4128a83297c2507df3be712217ea7b0a347045a396f31af8b.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 8712292b3ab867d4128a83297c2507df3be712217ea7b0a347045a396f31af8b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NetworkChecker = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8712292b3ab867d4128a83297c2507df3be712217ea7b0a347045a396f31af8b.exe" 8712292b3ab867d4128a83297c2507df3be712217ea7b0a347045a396f31af8b.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
8712292b3ab867d4128a83297c2507df3be712217ea7b0a347045a396f31af8b.exedescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\DefaultCompressedRecord = 0a80f97f73be93a0102d4f5be5d2750b85a883c10328eef5b71860f6effa60f39b939824953b5931a7ad7aaeb62d2ffba5a4917e037f68c354f22429d634699cadf4f5da780757100d48b1e13c0ff09f07783e1e3e677f63fa3a448517bb52be214f8be7d6bc60 8712292b3ab867d4128a83297c2507df3be712217ea7b0a347045a396f31af8b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\RecordModifiedMax = "DKSMb0k+YaQGNjgCyWdS+MXxcVmgBMylCa3/VWg24jv05GojVVoZWLbLXJ0DgPQolA==" 8712292b3ab867d4128a83297c2507df3be712217ea7b0a347045a396f31af8b.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FlagsModifiedValid = 0000000000000000 8712292b3ab867d4128a83297c2507df3be712217ea7b0a347045a396f31af8b.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main 8712292b3ab867d4128a83297c2507df3be712217ea7b0a347045a396f31af8b.exe