Analysis
-
max time kernel
185s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 01:59
Static task
static1
Behavioral task
behavioral1
Sample
7f22be23fd66f0985c13bcd13db28fbcf839e709ece6292c7a39cb4b31f597bd.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7f22be23fd66f0985c13bcd13db28fbcf839e709ece6292c7a39cb4b31f597bd.exe
Resource
win10v2004-20221111-en
General
-
Target
7f22be23fd66f0985c13bcd13db28fbcf839e709ece6292c7a39cb4b31f597bd.exe
-
Size
1.3MB
-
MD5
bd19feb22b9c3ca61f43f40712d8709b
-
SHA1
86d8be54db2d63bd9e0630c1c19853dc83a07fab
-
SHA256
7f22be23fd66f0985c13bcd13db28fbcf839e709ece6292c7a39cb4b31f597bd
-
SHA512
f7495efda68d44b97be6abc3f3c391212dfe45f8bade2181f1d6c93e9fdb3387e8ac09ab960e494f6e95636aac6bd719d4b26e17a3114ee6878c2731c15d2375
-
SSDEEP
24576:K+OhmKLnZzGI86dRl/sMtuyCN24CFf6V5imWWW:90FZzGI8SRl/Eyq2pfYxrW
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4204-133-0x0000000000400000-0x0000000001BD1000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 7f22be23fd66f0985c13bcd13db28fbcf839e709ece6292c7a39cb4b31f597bd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NetworkChecker = "C:\\Users\\Admin\\AppData\\Local\\Temp\\7f22be23fd66f0985c13bcd13db28fbcf839e709ece6292c7a39cb4b31f597bd.exe" 7f22be23fd66f0985c13bcd13db28fbcf839e709ece6292c7a39cb4b31f597bd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4204 7f22be23fd66f0985c13bcd13db28fbcf839e709ece6292c7a39cb4b31f597bd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main 7f22be23fd66f0985c13bcd13db28fbcf839e709ece6292c7a39cb4b31f597bd.exe Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\DefaultCompressedRecord = c880f97f733f7d0b51675e8c546421ac73308c910ad5413e74d0ddbb5c30342ebda0d245f3230dd762cbbfca7bb3dfc86d09dac8a9248c01000426ff4d2b65277a68e876622275ad93b6564869a6d544aac45ddd1b677f5d7cfd45ce00bdb73a03fe9642257e93 7f22be23fd66f0985c13bcd13db28fbcf839e709ece6292c7a39cb4b31f597bd.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\RecordModifiedMax = "DNCJm5aMcDz8Kmr78LIhLkvPPcupt8wsDWWdXU5xFkXAvjTwmyxb3Oatar100lE0Bw==" 7f22be23fd66f0985c13bcd13db28fbcf839e709ece6292c7a39cb4b31f597bd.exe Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FlagsModifiedValid = 0000000000000000 7f22be23fd66f0985c13bcd13db28fbcf839e709ece6292c7a39cb4b31f597bd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f22be23fd66f0985c13bcd13db28fbcf839e709ece6292c7a39cb4b31f597bd.exe"C:\Users\Admin\AppData\Local\Temp\7f22be23fd66f0985c13bcd13db28fbcf839e709ece6292c7a39cb4b31f597bd.exe"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Internet Explorer settings
PID:4204