Analysis
-
max time kernel
47s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
25/11/2022, 21:41
Static task
static1
Behavioral task
behavioral1
Sample
7b6a10573df8759c30caeb5dc0a1a726f91ac017961a0348deac4d8559535f22.exe
Resource
win7-20220901-en
General
-
Target
7b6a10573df8759c30caeb5dc0a1a726f91ac017961a0348deac4d8559535f22.exe
-
Size
3.1MB
-
MD5
d2c43a719535bd8d859f8ad885e06381
-
SHA1
38af1dab6f0ecae3f1c1186d3ee0f87435ee92ee
-
SHA256
7b6a10573df8759c30caeb5dc0a1a726f91ac017961a0348deac4d8559535f22
-
SHA512
f993d6dd4d1a3c9ac3e9ca407d805dda9323c0e1621496a84fbb9a272f9db304fb5e298651012b5f9f4312f0d4cfa01de9607691bf6e62ccbff8cfaba86745f9
-
SSDEEP
98304:/Nhshj4TTjfi8QzCvMVrKLCsa7GsDJiTAz:yQirx7Gsj
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\aapbdbdomjkkjkaonfhkkikfgjllcleb\182\manifest.json 7b6a10573df8759c30caeb5dc0a1a726f91ac017961a0348deac4d8559535f22.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\aapbdbdomjkkjkaonfhkkikfgjllcleb\182\manifest.json 7b6a10573df8759c30caeb5dc0a1a726f91ac017961a0348deac4d8559535f22.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\aapbdbdomjkkjkaonfhkkikfgjllcleb\182\manifest.json 7b6a10573df8759c30caeb5dc0a1a726f91ac017961a0348deac4d8559535f22.exe