Analysis
-
max time kernel
152s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 16:37
Static task
static1
Behavioral task
behavioral1
Sample
244f5346d580d4c0f6e4ec5a22b114822284f6ff6ea3d7c7f3a0d56f6bfa1054.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
244f5346d580d4c0f6e4ec5a22b114822284f6ff6ea3d7c7f3a0d56f6bfa1054.exe
Resource
win10v2004-20220812-en
General
-
Target
244f5346d580d4c0f6e4ec5a22b114822284f6ff6ea3d7c7f3a0d56f6bfa1054.exe
-
Size
1.3MB
-
MD5
b16b0e783dad79dee5ceec5a8e8d81aa
-
SHA1
d0fb4f7e61a2a258e321a0f766bc69b85a4aae85
-
SHA256
244f5346d580d4c0f6e4ec5a22b114822284f6ff6ea3d7c7f3a0d56f6bfa1054
-
SHA512
72150d13b182d1b7e23ad8d21f5ee4b65e64487767fe2dac3ffea130da2ebb36fb57bbcea62aca272d0b874b420cbf326a473a16ce816b93352bffcfe974ad5f
-
SSDEEP
24576:wbXpz2cwelTkLXWjs4rOvuR/H3Pos25vWRAiXz98iE4McxH:k2NacRuBLaWSwGVnE
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2020-56-0x0000000000400000-0x0000000001BD9000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 244f5346d580d4c0f6e4ec5a22b114822284f6ff6ea3d7c7f3a0d56f6bfa1054.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\NetworkChecker = "C:\\Users\\Admin\\AppData\\Local\\Temp\\244f5346d580d4c0f6e4ec5a22b114822284f6ff6ea3d7c7f3a0d56f6bfa1054.exe" 244f5346d580d4c0f6e4ec5a22b114822284f6ff6ea3d7c7f3a0d56f6bfa1054.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2020 244f5346d580d4c0f6e4ec5a22b114822284f6ff6ea3d7c7f3a0d56f6bfa1054.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\244f5346d580d4c0f6e4ec5a22b114822284f6ff6ea3d7c7f3a0d56f6bfa1054.exe"C:\Users\Admin\AppData\Local\Temp\244f5346d580d4c0f6e4ec5a22b114822284f6ff6ea3d7c7f3a0d56f6bfa1054.exe"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2020