Analysis
-
max time kernel
152s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 08:09
Static task
static1
Behavioral task
behavioral1
Sample
90cba81cd0870405b92f596d3dd024d3651d18a9d93365eb70bfb5c13bf00610.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
90cba81cd0870405b92f596d3dd024d3651d18a9d93365eb70bfb5c13bf00610.exe
Resource
win10v2004-20220901-en
General
-
Target
90cba81cd0870405b92f596d3dd024d3651d18a9d93365eb70bfb5c13bf00610.exe
-
Size
815KB
-
MD5
cd8dbaf9e92043cf5384f1994c0925e8
-
SHA1
6de6b3bbe528c15451bd3005efa6ecc172079b13
-
SHA256
90cba81cd0870405b92f596d3dd024d3651d18a9d93365eb70bfb5c13bf00610
-
SHA512
feca041f4b33492a5b135e167a14b843b693afcc915f28d5a4e9dcee0b19349e88feeb42bbdc9a5fe400ddd6b5542a3d2fbfd2e5b0dcd39a6eadd7b363f25bfc
-
SSDEEP
12288:pjsaFq2V4qT4pbqckPnRKhnPG9caFVGb7abZdYFkFWxMjcaiiBA/qQ:pl4JrkPnRcPecaz67absxxMBs
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1928-54-0x0000000000400000-0x00000000007AE000-memory.dmp upx behavioral1/memory/1928-55-0x0000000000400000-0x00000000007AE000-memory.dmp upx behavioral1/memory/1928-57-0x0000000000400000-0x00000000007AE000-memory.dmp upx behavioral1/memory/1928-58-0x0000000000400000-0x00000000007AE000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
90cba81cd0870405b92f596d3dd024d3651d18a9d93365eb70bfb5c13bf00610.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 90cba81cd0870405b92f596d3dd024d3651d18a9d93365eb70bfb5c13bf00610.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\NetworkChecker = "C:\\Users\\Admin\\AppData\\Local\\Temp\\90cba81cd0870405b92f596d3dd024d3651d18a9d93365eb70bfb5c13bf00610.exe" 90cba81cd0870405b92f596d3dd024d3651d18a9d93365eb70bfb5c13bf00610.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.