Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 13:23
Static task
static1
Behavioral task
behavioral1
Sample
ade1dca75ef112d7f965b076fdfabff597156c80788da53d619133af594d353b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ade1dca75ef112d7f965b076fdfabff597156c80788da53d619133af594d353b.exe
Resource
win10v2004-20220812-en
General
-
Target
ade1dca75ef112d7f965b076fdfabff597156c80788da53d619133af594d353b.exe
-
Size
768KB
-
MD5
ccfac39175fea6b4e52d9b3a3977a435
-
SHA1
8b8e9bbbe899c16eb0efae3eddccfa76abc6bae9
-
SHA256
ade1dca75ef112d7f965b076fdfabff597156c80788da53d619133af594d353b
-
SHA512
0eb9ef5c2ad89cb4d8c1cdd69d5d31b161294f18b2557c96e0559fa57b0f17dd4ab613ba0eee24b49db2488eaf91b5917f10519dae28a50e17b8fd4b82cc8b93
-
SSDEEP
12288:CHEUdIFVIfMG6oUaU9QyC5CbM+aXG0sammTwlLLevY:CkNE0ZarXT1m91LKY
Malware Config
Signatures
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
Processes:
ade1dca75ef112d7f965b076fdfabff597156c80788da53d619133af594d353b.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest ade1dca75ef112d7f965b076fdfabff597156c80788da53d619133af594d353b.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ade1dca75ef112d7f965b076fdfabff597156c80788da53d619133af594d353b.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\5w5555 = "\"C:\\Users\\Admin\\AppData\\Roaming\\5w5555.exe\" opt" ade1dca75ef112d7f965b076fdfabff597156c80788da53d619133af594d353b.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce ade1dca75ef112d7f965b076fdfabff597156c80788da53d619133af594d353b.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
ade1dca75ef112d7f965b076fdfabff597156c80788da53d619133af594d353b.exepid process 948 ade1dca75ef112d7f965b076fdfabff597156c80788da53d619133af594d353b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ade1dca75ef112d7f965b076fdfabff597156c80788da53d619133af594d353b.exe"C:\Users\Admin\AppData\Local\Temp\ade1dca75ef112d7f965b076fdfabff597156c80788da53d619133af594d353b.exe"1⤵
- Enumerates VirtualBox registry keys
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:948