Analysis
-
max time kernel
181s -
max time network
184s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 01:59
Static task
static1
Behavioral task
behavioral1
Sample
7f22be23fd66f0985c13bcd13db28fbcf839e709ece6292c7a39cb4b31f597bd.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7f22be23fd66f0985c13bcd13db28fbcf839e709ece6292c7a39cb4b31f597bd.exe
Resource
win10v2004-20221111-en
General
-
Target
7f22be23fd66f0985c13bcd13db28fbcf839e709ece6292c7a39cb4b31f597bd.exe
-
Size
1.3MB
-
MD5
bd19feb22b9c3ca61f43f40712d8709b
-
SHA1
86d8be54db2d63bd9e0630c1c19853dc83a07fab
-
SHA256
7f22be23fd66f0985c13bcd13db28fbcf839e709ece6292c7a39cb4b31f597bd
-
SHA512
f7495efda68d44b97be6abc3f3c391212dfe45f8bade2181f1d6c93e9fdb3387e8ac09ab960e494f6e95636aac6bd719d4b26e17a3114ee6878c2731c15d2375
-
SSDEEP
24576:K+OhmKLnZzGI86dRl/sMtuyCN24CFf6V5imWWW:90FZzGI8SRl/Eyq2pfYxrW
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1676-56-0x0000000000400000-0x0000000001BD1000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 7f22be23fd66f0985c13bcd13db28fbcf839e709ece6292c7a39cb4b31f597bd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\NetworkChecker = "C:\\Users\\Admin\\AppData\\Local\\Temp\\7f22be23fd66f0985c13bcd13db28fbcf839e709ece6292c7a39cb4b31f597bd.exe" 7f22be23fd66f0985c13bcd13db28fbcf839e709ece6292c7a39cb4b31f597bd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1676 7f22be23fd66f0985c13bcd13db28fbcf839e709ece6292c7a39cb4b31f597bd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f22be23fd66f0985c13bcd13db28fbcf839e709ece6292c7a39cb4b31f597bd.exe"C:\Users\Admin\AppData\Local\Temp\7f22be23fd66f0985c13bcd13db28fbcf839e709ece6292c7a39cb4b31f597bd.exe"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1676