Analysis
-
max time kernel
151s -
max time network
191s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26/11/2022, 22:50
Static task
static1
Behavioral task
behavioral1
Sample
21d74555b5d872f9170f7fc5c5c16faaa6a7788ffb25d103aca644e31ac8bed1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
21d74555b5d872f9170f7fc5c5c16faaa6a7788ffb25d103aca644e31ac8bed1.exe
Resource
win10v2004-20220901-en
General
-
Target
21d74555b5d872f9170f7fc5c5c16faaa6a7788ffb25d103aca644e31ac8bed1.exe
-
Size
1.1MB
-
MD5
23f8408e384963490f0e27f692e71d31
-
SHA1
e73c160b9cd415665daac6c6c09cb791f0d383ab
-
SHA256
21d74555b5d872f9170f7fc5c5c16faaa6a7788ffb25d103aca644e31ac8bed1
-
SHA512
104c2c29c8f3559d2f5de0f2684d8660fc55b9a61d130202b3e6d626cbcc690faa2c1eb1021220249802b77f2d475403a3408962b8c8e13b45649d1d58f0b805
-
SSDEEP
24576:y9J0Mqc6H34ZSa8tR6nGGDxRBNzIzNpdTt9hwiqU18Y9ljUy:ul668yj3BNszh5cNU1J9lwy
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1972-70-0x0000000000400000-0x0000000000645000-memory.dmp upx behavioral1/memory/1972-71-0x0000000000400000-0x0000000000645000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 21d74555b5d872f9170f7fc5c5c16faaa6a7788ffb25d103aca644e31ac8bed1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\NetworkChecker = "C:\\Users\\Admin\\AppData\\Local\\Temp\\21d74555b5d872f9170f7fc5c5c16faaa6a7788ffb25d103aca644e31ac8bed1.exe" 21d74555b5d872f9170f7fc5c5c16faaa6a7788ffb25d103aca644e31ac8bed1.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 976 set thread context of 1972 976 21d74555b5d872f9170f7fc5c5c16faaa6a7788ffb25d103aca644e31ac8bed1.exe 29 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 976 21d74555b5d872f9170f7fc5c5c16faaa6a7788ffb25d103aca644e31ac8bed1.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 976 21d74555b5d872f9170f7fc5c5c16faaa6a7788ffb25d103aca644e31ac8bed1.exe 976 21d74555b5d872f9170f7fc5c5c16faaa6a7788ffb25d103aca644e31ac8bed1.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 976 wrote to memory of 848 976 21d74555b5d872f9170f7fc5c5c16faaa6a7788ffb25d103aca644e31ac8bed1.exe 27 PID 976 wrote to memory of 848 976 21d74555b5d872f9170f7fc5c5c16faaa6a7788ffb25d103aca644e31ac8bed1.exe 27 PID 976 wrote to memory of 848 976 21d74555b5d872f9170f7fc5c5c16faaa6a7788ffb25d103aca644e31ac8bed1.exe 27 PID 976 wrote to memory of 848 976 21d74555b5d872f9170f7fc5c5c16faaa6a7788ffb25d103aca644e31ac8bed1.exe 27 PID 976 wrote to memory of 664 976 21d74555b5d872f9170f7fc5c5c16faaa6a7788ffb25d103aca644e31ac8bed1.exe 28 PID 976 wrote to memory of 664 976 21d74555b5d872f9170f7fc5c5c16faaa6a7788ffb25d103aca644e31ac8bed1.exe 28 PID 976 wrote to memory of 664 976 21d74555b5d872f9170f7fc5c5c16faaa6a7788ffb25d103aca644e31ac8bed1.exe 28 PID 976 wrote to memory of 664 976 21d74555b5d872f9170f7fc5c5c16faaa6a7788ffb25d103aca644e31ac8bed1.exe 28 PID 976 wrote to memory of 1972 976 21d74555b5d872f9170f7fc5c5c16faaa6a7788ffb25d103aca644e31ac8bed1.exe 29 PID 976 wrote to memory of 1972 976 21d74555b5d872f9170f7fc5c5c16faaa6a7788ffb25d103aca644e31ac8bed1.exe 29 PID 976 wrote to memory of 1972 976 21d74555b5d872f9170f7fc5c5c16faaa6a7788ffb25d103aca644e31ac8bed1.exe 29 PID 976 wrote to memory of 1972 976 21d74555b5d872f9170f7fc5c5c16faaa6a7788ffb25d103aca644e31ac8bed1.exe 29 PID 976 wrote to memory of 1972 976 21d74555b5d872f9170f7fc5c5c16faaa6a7788ffb25d103aca644e31ac8bed1.exe 29 PID 976 wrote to memory of 1972 976 21d74555b5d872f9170f7fc5c5c16faaa6a7788ffb25d103aca644e31ac8bed1.exe 29 PID 976 wrote to memory of 1972 976 21d74555b5d872f9170f7fc5c5c16faaa6a7788ffb25d103aca644e31ac8bed1.exe 29 PID 976 wrote to memory of 1972 976 21d74555b5d872f9170f7fc5c5c16faaa6a7788ffb25d103aca644e31ac8bed1.exe 29 PID 976 wrote to memory of 1972 976 21d74555b5d872f9170f7fc5c5c16faaa6a7788ffb25d103aca644e31ac8bed1.exe 29 PID 976 wrote to memory of 1972 976 21d74555b5d872f9170f7fc5c5c16faaa6a7788ffb25d103aca644e31ac8bed1.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\21d74555b5d872f9170f7fc5c5c16faaa6a7788ffb25d103aca644e31ac8bed1.exe"C:\Users\Admin\AppData\Local\Temp\21d74555b5d872f9170f7fc5c5c16faaa6a7788ffb25d103aca644e31ac8bed1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Users\Admin\AppData\Local\Temp\21d74555b5d872f9170f7fc5c5c16faaa6a7788ffb25d103aca644e31ac8bed1.exe"C:\Users\Admin\AppData\Local\Temp\21d74555b5d872f9170f7fc5c5c16faaa6a7788ffb25d103aca644e31ac8bed1.exe"2⤵PID:848
-
-
C:\Users\Admin\AppData\Local\Temp\21d74555b5d872f9170f7fc5c5c16faaa6a7788ffb25d103aca644e31ac8bed1.exe"C:\Users\Admin\AppData\Local\Temp\21d74555b5d872f9170f7fc5c5c16faaa6a7788ffb25d103aca644e31ac8bed1.exe"2⤵PID:664
-
-
C:\Users\Admin\AppData\Local\Temp\21d74555b5d872f9170f7fc5c5c16faaa6a7788ffb25d103aca644e31ac8bed1.exe"C:\Users\Admin\AppData\Local\Temp\21d74555b5d872f9170f7fc5c5c16faaa6a7788ffb25d103aca644e31ac8bed1.exe"2⤵
- Adds Run key to start application
PID:1972
-