Analysis
-
max time kernel
176s -
max time network
213s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 20:27
Static task
static1
Behavioral task
behavioral1
Sample
45c192a39f53883c514c6e348c94d92eac4bfaf1536cbc6215a224a5d0fcbc61.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
45c192a39f53883c514c6e348c94d92eac4bfaf1536cbc6215a224a5d0fcbc61.exe
Resource
win10v2004-20221111-en
General
-
Target
45c192a39f53883c514c6e348c94d92eac4bfaf1536cbc6215a224a5d0fcbc61.exe
-
Size
1.4MB
-
MD5
f00fa3463339db0e2067377e05f816c2
-
SHA1
f2a1d9e9cb210f99464901169dde0069b6d67fcf
-
SHA256
45c192a39f53883c514c6e348c94d92eac4bfaf1536cbc6215a224a5d0fcbc61
-
SHA512
a27d1be733f634846ff4c6bc629e09472145705729858fe41e6f44bdc58e1d6eba5b1468ca2812ee705324f29d244f17002a95b1d291f7f66de8d3a035b7a689
-
SSDEEP
12288:2bZ7vG1OKQ6ILQ8a/i4N+9eEgYVwpZbY/Nlbr+ROs4OslS17F8PooJ7KNniLYu:2v7KrItDk+wEgGwrUrX+OAsotFdNPu
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 45c192a39f53883c514c6e348c94d92eac4bfaf1536cbc6215a224a5d0fcbc61.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NetworkChecker = "C:\\Users\\Admin\\AppData\\Local\\Temp\\45c192a39f53883c514c6e348c94d92eac4bfaf1536cbc6215a224a5d0fcbc61.exe" 45c192a39f53883c514c6e348c94d92eac4bfaf1536cbc6215a224a5d0fcbc61.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1876 45c192a39f53883c514c6e348c94d92eac4bfaf1536cbc6215a224a5d0fcbc61.exe -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\DefaultCompressedRecord = c880f97f736fbb96c7ca0bcb2d2476514b7ff627024cc816f33ef711e9fcf335edc5a1eb2457190b1cc25112497de1d4aaadccbe2231a97f40a34cc20ee5ce125dce3a225be3667ef58b3c1b391db6ebb0961175db677fa9ee03d93fda91a54fe1414ea498d826 45c192a39f53883c514c6e348c94d92eac4bfaf1536cbc6215a224a5d0fcbc61.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\RecordModifiedMax = "DD/V1E0favib3for4DKcOxsuj7TdC80JXt6paQQSRuX1z6zRK//OHnz9gM0mipc9NQ==" 45c192a39f53883c514c6e348c94d92eac4bfaf1536cbc6215a224a5d0fcbc61.exe Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FlagsModifiedValid = 0000000000000000 45c192a39f53883c514c6e348c94d92eac4bfaf1536cbc6215a224a5d0fcbc61.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main 45c192a39f53883c514c6e348c94d92eac4bfaf1536cbc6215a224a5d0fcbc61.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4304 45c192a39f53883c514c6e348c94d92eac4bfaf1536cbc6215a224a5d0fcbc61.exe 1876 45c192a39f53883c514c6e348c94d92eac4bfaf1536cbc6215a224a5d0fcbc61.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4304 wrote to memory of 1876 4304 45c192a39f53883c514c6e348c94d92eac4bfaf1536cbc6215a224a5d0fcbc61.exe 85 PID 4304 wrote to memory of 1876 4304 45c192a39f53883c514c6e348c94d92eac4bfaf1536cbc6215a224a5d0fcbc61.exe 85 PID 4304 wrote to memory of 1876 4304 45c192a39f53883c514c6e348c94d92eac4bfaf1536cbc6215a224a5d0fcbc61.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\45c192a39f53883c514c6e348c94d92eac4bfaf1536cbc6215a224a5d0fcbc61.exe"C:\Users\Admin\AppData\Local\Temp\45c192a39f53883c514c6e348c94d92eac4bfaf1536cbc6215a224a5d0fcbc61.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Users\Admin\AppData\Local\Temp\45c192a39f53883c514c6e348c94d92eac4bfaf1536cbc6215a224a5d0fcbc61.exe"C:\Users\Admin\AppData\Local\Temp\45c192a39f53883c514c6e348c94d92eac4bfaf1536cbc6215a224a5d0fcbc61.exe"2⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
PID:1876
-