Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 13:56
Static task
static1
Behavioral task
behavioral1
Sample
7785e6f7b814b54c8af852de9411d2b147f47847b4cf3d2487572ff0c9086605.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7785e6f7b814b54c8af852de9411d2b147f47847b4cf3d2487572ff0c9086605.exe
Resource
win10v2004-20220901-en
General
-
Target
7785e6f7b814b54c8af852de9411d2b147f47847b4cf3d2487572ff0c9086605.exe
-
Size
813KB
-
MD5
d8e64dea4131bf6820584218c699f424
-
SHA1
4a15c1da8d8aa8c9641806215fd3283c8f8ee770
-
SHA256
7785e6f7b814b54c8af852de9411d2b147f47847b4cf3d2487572ff0c9086605
-
SHA512
f27fd072418ba0a99f11769a350c77def2ea308d1929bd321f751098a00584ac4e54fcbee8f61c079f54466b2716bb81f09372b6d3543bd426c0b37515b7793a
-
SSDEEP
24576:jFy/I8xNX1jpdC9j+IKbD4cH8dtPDnqeRKTyd:pQVh1ZIKb8ccdRn3d
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/784-54-0x0000000000400000-0x00000000007AE000-memory.dmp upx behavioral1/memory/784-55-0x0000000000400000-0x00000000007AE000-memory.dmp upx behavioral1/memory/784-57-0x0000000000400000-0x00000000007AE000-memory.dmp upx behavioral1/memory/784-58-0x0000000000400000-0x00000000007AE000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
7785e6f7b814b54c8af852de9411d2b147f47847b4cf3d2487572ff0c9086605.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 7785e6f7b814b54c8af852de9411d2b147f47847b4cf3d2487572ff0c9086605.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\NetworkChecker = "C:\\Users\\Admin\\AppData\\Local\\Temp\\7785e6f7b814b54c8af852de9411d2b147f47847b4cf3d2487572ff0c9086605.exe" 7785e6f7b814b54c8af852de9411d2b147f47847b4cf3d2487572ff0c9086605.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.