Analysis
-
max time kernel
210s -
max time network
285s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 15:41
Behavioral task
behavioral1
Sample
88b0f30e64908abf1c10e4d0df5588c627cdcbde00013d4669d2e810d0863c73.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
88b0f30e64908abf1c10e4d0df5588c627cdcbde00013d4669d2e810d0863c73.exe
Resource
win10v2004-20220901-en
General
-
Target
88b0f30e64908abf1c10e4d0df5588c627cdcbde00013d4669d2e810d0863c73.exe
-
Size
895KB
-
MD5
44abf1317bed424bff31f27d5478b9bc
-
SHA1
87b768834f44ed76c2841e20c6ed7906a9b2efd7
-
SHA256
88b0f30e64908abf1c10e4d0df5588c627cdcbde00013d4669d2e810d0863c73
-
SHA512
a0c3e73a41152c7deeaa7d10d1ce58bfe8c2b3c04885082a2b9e50a126e5fa7f67d1e6fe7c6efb910ca2028ef7fc91a637b40a4dc158e025d445913191dab6dc
-
SSDEEP
24576:hloxEeSPPoK3IcHxcM6toNTGETPMHfKWjr:hXPwKVRN79VT+
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1276-55-0x00000000001F0000-0x000000000042E000-memory.dmp upx behavioral1/memory/1276-56-0x00000000001F0000-0x000000000042E000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
88b0f30e64908abf1c10e4d0df5588c627cdcbde00013d4669d2e810d0863c73.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 88b0f30e64908abf1c10e4d0df5588c627cdcbde00013d4669d2e810d0863c73.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\NetworkChecker = "C:\\Users\\Admin\\AppData\\Local\\Temp\\88b0f30e64908abf1c10e4d0df5588c627cdcbde00013d4669d2e810d0863c73.exe" 88b0f30e64908abf1c10e4d0df5588c627cdcbde00013d4669d2e810d0863c73.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.