Analysis
-
max time kernel
164s -
max time network
198s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 04:22
Static task
static1
Behavioral task
behavioral1
Sample
abe316c5078cfa9fd14cf235c928b107c18f8899a7ab654026c7a08b1ddfb5bf.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
abe316c5078cfa9fd14cf235c928b107c18f8899a7ab654026c7a08b1ddfb5bf.exe
Resource
win10v2004-20221111-en
General
-
Target
abe316c5078cfa9fd14cf235c928b107c18f8899a7ab654026c7a08b1ddfb5bf.exe
-
Size
815KB
-
MD5
0c07c4123748585130394b6b4a91d3d2
-
SHA1
c31422bdde083a3f37f04879baf1a199cfd2ad9e
-
SHA256
abe316c5078cfa9fd14cf235c928b107c18f8899a7ab654026c7a08b1ddfb5bf
-
SHA512
9e76206653e4cff6793591d3f75b58fb058338637951f68a8f561a6a2c8be705a3abc26775969fe103007986f61155b6360c2b7fd68a1f1c6c9c6821a79940aa
-
SSDEEP
12288:idtEhkGucJLrtZWgMJp286W04E9lZxpX/fxHxS6Arb3xj1D5wLePDT:IEhkGuS7Wxq8vSfxVJRDIBhDDT
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/956-54-0x0000000000400000-0x000000000063E000-memory.dmp upx behavioral1/memory/956-55-0x0000000000400000-0x000000000063E000-memory.dmp upx behavioral1/memory/956-57-0x0000000000400000-0x000000000063E000-memory.dmp upx behavioral1/memory/956-58-0x0000000000400000-0x000000000063E000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
abe316c5078cfa9fd14cf235c928b107c18f8899a7ab654026c7a08b1ddfb5bf.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run abe316c5078cfa9fd14cf235c928b107c18f8899a7ab654026c7a08b1ddfb5bf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\NetworkChecker = "C:\\Users\\Admin\\AppData\\Local\\Temp\\abe316c5078cfa9fd14cf235c928b107c18f8899a7ab654026c7a08b1ddfb5bf.exe" abe316c5078cfa9fd14cf235c928b107c18f8899a7ab654026c7a08b1ddfb5bf.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.