Analysis
-
max time kernel
228s -
max time network
293s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 15:42
Static task
static1
Behavioral task
behavioral1
Sample
eaeb7541e030c05a36a7f08fc1b4b0245bd943538104a0f0f6adad29540c04ea.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
eaeb7541e030c05a36a7f08fc1b4b0245bd943538104a0f0f6adad29540c04ea.exe
Resource
win10v2004-20220812-en
General
-
Target
eaeb7541e030c05a36a7f08fc1b4b0245bd943538104a0f0f6adad29540c04ea.exe
-
Size
812KB
-
MD5
ef3b323ba1d2632dcd4f916b607b01f8
-
SHA1
fce4edeaea484a3c577a7015f9431ffec33bb880
-
SHA256
eaeb7541e030c05a36a7f08fc1b4b0245bd943538104a0f0f6adad29540c04ea
-
SHA512
3d47781d07bbf0482c4a3bfa5b4d87dd959ad50819fdfe2be5020428c72c32968f6fa17b04642f6abb7ffe8ede85198fb3bd8a7bd1e788e96e1b2d78d78e2416
-
SSDEEP
12288:fyyaiQP9xLfe4HX+x21qMzNT4eXnMb9F12+qnZIui9Gx9Kio0GJtaMZ7SIev:CiSXL2Gn1qkNT48nMb3gyGbnGf9SI
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/964-54-0x0000000000400000-0x000000000063E000-memory.dmp upx behavioral1/memory/964-55-0x0000000000400000-0x000000000063E000-memory.dmp upx behavioral1/memory/964-57-0x0000000000400000-0x000000000063E000-memory.dmp upx behavioral1/memory/964-58-0x0000000000400000-0x000000000063E000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
eaeb7541e030c05a36a7f08fc1b4b0245bd943538104a0f0f6adad29540c04ea.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run eaeb7541e030c05a36a7f08fc1b4b0245bd943538104a0f0f6adad29540c04ea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\NetworkChecker = "C:\\Users\\Admin\\AppData\\Local\\Temp\\eaeb7541e030c05a36a7f08fc1b4b0245bd943538104a0f0f6adad29540c04ea.exe" eaeb7541e030c05a36a7f08fc1b4b0245bd943538104a0f0f6adad29540c04ea.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.