Analysis
-
max time kernel
151s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 03:20
Static task
static1
Behavioral task
behavioral1
Sample
056c0429b9d6e5cb9712122b1d5b595266770f18fbee401190f7b6a121688b70.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
056c0429b9d6e5cb9712122b1d5b595266770f18fbee401190f7b6a121688b70.exe
Resource
win10v2004-20220812-en
General
-
Target
056c0429b9d6e5cb9712122b1d5b595266770f18fbee401190f7b6a121688b70.exe
-
Size
604KB
-
MD5
edd1c81a483697c75f84c16047060bff
-
SHA1
42511be0a2374fe81e2bd23e222341eadb18ab2d
-
SHA256
056c0429b9d6e5cb9712122b1d5b595266770f18fbee401190f7b6a121688b70
-
SHA512
b2f8624bbcf7caa016656a6051682420a3e195646d72f74b2420b7b19c9c1697b348d512139831c83f197ff0ddc4245b05d5ae2cc3a546cda8880b57064278bd
-
SSDEEP
6144:psNyDWv14FcGtk1+Of1GhTNCTmEfbRE0687sqYMEcLmFoMj8S9xlNI43wIRzvsg2:pgwWa6G8pGJA5REuE91xlNI4Jzvsggv
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\enablelua = "0" 056c0429b9d6e5cb9712122b1d5b595266770f18fbee401190f7b6a121688b70.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 056c0429b9d6e5cb9712122b1d5b595266770f18fbee401190f7b6a121688b70.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run 056c0429b9d6e5cb9712122b1d5b595266770f18fbee401190f7b6a121688b70.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\Winlogon = "C:\\Users\\Admin\\AppData\\Local\\Temp\\windowe.exe" 056c0429b9d6e5cb9712122b1d5b595266770f18fbee401190f7b6a121688b70.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\enablelua = "0" 056c0429b9d6e5cb9712122b1d5b595266770f18fbee401190f7b6a121688b70.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 988 set thread context of 1456 988 056c0429b9d6e5cb9712122b1d5b595266770f18fbee401190f7b6a121688b70.exe 27 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\SOFTWARE\Microsoft\Internet Explorer\Main\ 056c0429b9d6e5cb9712122b1d5b595266770f18fbee401190f7b6a121688b70.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "www.farama.tk" 056c0429b9d6e5cb9712122b1d5b595266770f18fbee401190f7b6a121688b70.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1456 056c0429b9d6e5cb9712122b1d5b595266770f18fbee401190f7b6a121688b70.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 988 056c0429b9d6e5cb9712122b1d5b595266770f18fbee401190f7b6a121688b70.exe 1456 056c0429b9d6e5cb9712122b1d5b595266770f18fbee401190f7b6a121688b70.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 988 wrote to memory of 1456 988 056c0429b9d6e5cb9712122b1d5b595266770f18fbee401190f7b6a121688b70.exe 27 PID 988 wrote to memory of 1456 988 056c0429b9d6e5cb9712122b1d5b595266770f18fbee401190f7b6a121688b70.exe 27 PID 988 wrote to memory of 1456 988 056c0429b9d6e5cb9712122b1d5b595266770f18fbee401190f7b6a121688b70.exe 27 PID 988 wrote to memory of 1456 988 056c0429b9d6e5cb9712122b1d5b595266770f18fbee401190f7b6a121688b70.exe 27 PID 988 wrote to memory of 1456 988 056c0429b9d6e5cb9712122b1d5b595266770f18fbee401190f7b6a121688b70.exe 27 PID 988 wrote to memory of 1456 988 056c0429b9d6e5cb9712122b1d5b595266770f18fbee401190f7b6a121688b70.exe 27 PID 988 wrote to memory of 1456 988 056c0429b9d6e5cb9712122b1d5b595266770f18fbee401190f7b6a121688b70.exe 27 PID 988 wrote to memory of 1456 988 056c0429b9d6e5cb9712122b1d5b595266770f18fbee401190f7b6a121688b70.exe 27 PID 988 wrote to memory of 1456 988 056c0429b9d6e5cb9712122b1d5b595266770f18fbee401190f7b6a121688b70.exe 27 PID 988 wrote to memory of 1456 988 056c0429b9d6e5cb9712122b1d5b595266770f18fbee401190f7b6a121688b70.exe 27 PID 988 wrote to memory of 1456 988 056c0429b9d6e5cb9712122b1d5b595266770f18fbee401190f7b6a121688b70.exe 27 PID 988 wrote to memory of 1456 988 056c0429b9d6e5cb9712122b1d5b595266770f18fbee401190f7b6a121688b70.exe 27 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system 056c0429b9d6e5cb9712122b1d5b595266770f18fbee401190f7b6a121688b70.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\enablelua = "0" 056c0429b9d6e5cb9712122b1d5b595266770f18fbee401190f7b6a121688b70.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\056c0429b9d6e5cb9712122b1d5b595266770f18fbee401190f7b6a121688b70.exe"C:\Users\Admin\AppData\Local\Temp\056c0429b9d6e5cb9712122b1d5b595266770f18fbee401190f7b6a121688b70.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Users\Admin\AppData\Local\Temp\056c0429b9d6e5cb9712122b1d5b595266770f18fbee401190f7b6a121688b70.exeC:\Users\Admin\AppData\Local\Temp\056c0429b9d6e5cb9712122b1d5b595266770f18fbee401190f7b6a121688b70.exe2⤵
- UAC bypass
- Disables RegEdit via registry modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1456
-