Analysis
-
max time kernel
328s -
max time network
341s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2022, 11:41
Behavioral task
behavioral1
Sample
de8a1ac6e275428b41488f973dc98baf1b281b2110e88e35a80ca777caec27d2.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
de8a1ac6e275428b41488f973dc98baf1b281b2110e88e35a80ca777caec27d2.exe
Resource
win10v2004-20221111-en
General
-
Target
de8a1ac6e275428b41488f973dc98baf1b281b2110e88e35a80ca777caec27d2.exe
-
Size
895KB
-
MD5
48069efb73c7da115546bec67e4c6aed
-
SHA1
857c4584fd5eac3bec2f8d9bef18cb25ed1823fa
-
SHA256
de8a1ac6e275428b41488f973dc98baf1b281b2110e88e35a80ca777caec27d2
-
SHA512
94203bb91b1bbb57391baaeed5ec514137888a2c273c4b33428190e72d7125fea6e92005433af8d395a8587002c750dbfda4fd36fc438eed97dee3294f34c823
-
SSDEEP
12288:eQPOKjA1699/lIV380g7+Pe54/VztS+grM0bCTPw0qzp8YoiEpn4r9D/ydJwp/D:J2KjA09LIJ8c73SN9fzCYApn4rYda
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/204-132-0x0000000000700000-0x000000000093E000-memory.dmp upx behavioral2/memory/204-133-0x0000000000700000-0x000000000093E000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run de8a1ac6e275428b41488f973dc98baf1b281b2110e88e35a80ca777caec27d2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NetworkChecker = "C:\\Users\\Admin\\AppData\\Local\\Temp\\de8a1ac6e275428b41488f973dc98baf1b281b2110e88e35a80ca777caec27d2.exe" de8a1ac6e275428b41488f973dc98baf1b281b2110e88e35a80ca777caec27d2.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Main\RecordModifiedMax = "DD/FeMGmw7dhXvdZ7YYcSfXg7SQwrlJIji58rFFTds/woIVmdv3DMFttlnzriu86fA==" de8a1ac6e275428b41488f973dc98baf1b281b2110e88e35a80ca777caec27d2.exe Set value (data) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FlagsModifiedValid = 0000000000000000 de8a1ac6e275428b41488f973dc98baf1b281b2110e88e35a80ca777caec27d2.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Main de8a1ac6e275428b41488f973dc98baf1b281b2110e88e35a80ca777caec27d2.exe Set value (data) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Main\DefaultCompressedRecord = d980f97f739f932822fa55512a4531daf0ed3a5e2a4f8be49740c66343f614af7f367e42b88da52b66df8a9f2cea51b215044641f68467ee681083538bea3c5ecb71303bf6494286e5cc25f8787605b04d9404e98c677fa6a2ea0e38ead4aae1c3b0ae81133691 de8a1ac6e275428b41488f973dc98baf1b281b2110e88e35a80ca777caec27d2.exe