Analysis
-
max time kernel
151s -
max time network
195s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 15:42
Behavioral task
behavioral1
Sample
2524706b5b9cdfaa5a31fbaf95989958086af50e1aab1d632c97a9f3eb38e664.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2524706b5b9cdfaa5a31fbaf95989958086af50e1aab1d632c97a9f3eb38e664.exe
Resource
win10v2004-20221111-en
General
-
Target
2524706b5b9cdfaa5a31fbaf95989958086af50e1aab1d632c97a9f3eb38e664.exe
-
Size
895KB
-
MD5
3c63c14babebc877936abb363c6da118
-
SHA1
b4e928b088dfaf8c6beb119fccab340c6d259a8a
-
SHA256
2524706b5b9cdfaa5a31fbaf95989958086af50e1aab1d632c97a9f3eb38e664
-
SHA512
82bf8d7ee5c4f78e0f78f21aca5e7c7ea6776e33492c1c83ec219d09fd64b76a6dd1209a7bb401369731a5d2048173f975a77157e6647c21b2d015c11df8d15a
-
SSDEEP
24576:RS/EKKA1XZCMp5nPPkLuQhHxGTqkEt6Rpu2mGPQ5rBvbMb:RIEKKAHR5PMLu0g7Rppgrx
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/2456-132-0x0000000000A10000-0x0000000000C4E000-memory.dmp upx behavioral2/memory/2456-133-0x0000000000A10000-0x0000000000C4E000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
2524706b5b9cdfaa5a31fbaf95989958086af50e1aab1d632c97a9f3eb38e664.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NetworkChecker = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2524706b5b9cdfaa5a31fbaf95989958086af50e1aab1d632c97a9f3eb38e664.exe" 2524706b5b9cdfaa5a31fbaf95989958086af50e1aab1d632c97a9f3eb38e664.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 2524706b5b9cdfaa5a31fbaf95989958086af50e1aab1d632c97a9f3eb38e664.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
2524706b5b9cdfaa5a31fbaf95989958086af50e1aab1d632c97a9f3eb38e664.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\Main 2524706b5b9cdfaa5a31fbaf95989958086af50e1aab1d632c97a9f3eb38e664.exe Set value (data) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\Main\DefaultCompressedRecord = d980f97f73f71605a3380736f92dbbd953b0c273ded8d288a9855637fb1916a7499df37217cdf7517a7ee85d69918c10ae1cfe690677cc6e8cc228aee3c1b3487514aa2c484d1a167e13f3372f5616af5fa0ae79c9677f19bb981b87c9b7577b78087eea6b1045 2524706b5b9cdfaa5a31fbaf95989958086af50e1aab1d632c97a9f3eb38e664.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\Main\RecordModifiedMax = "DA/DgVsjPLPGwbWctYgqM9/i3tvKzAeKZp2b3t+KCOcf+7M9FqQT0Ps5BdpCFowoig==" 2524706b5b9cdfaa5a31fbaf95989958086af50e1aab1d632c97a9f3eb38e664.exe Set value (data) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FlagsModifiedValid = 0000000000000000 2524706b5b9cdfaa5a31fbaf95989958086af50e1aab1d632c97a9f3eb38e664.exe