Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
28/11/2022, 06:36
Static task
static1
Behavioral task
behavioral1
Sample
acff4632818930fc1cdc03bc7a119f910d5ef177c2af7abd05b36266569649f3.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
acff4632818930fc1cdc03bc7a119f910d5ef177c2af7abd05b36266569649f3.exe
Resource
win10v2004-20220901-en
General
-
Target
acff4632818930fc1cdc03bc7a119f910d5ef177c2af7abd05b36266569649f3.exe
-
Size
1.4MB
-
MD5
00db48da4fc9a6ae8a29eaa8a65a5bbf
-
SHA1
c7a4db8ca7f729b8b643c36879969af8d5f49af4
-
SHA256
acff4632818930fc1cdc03bc7a119f910d5ef177c2af7abd05b36266569649f3
-
SHA512
b90677c4993010452e0be392a0ec90dd1599ae0848089994ae176a48e76dfb852959344f992aef3afdd54a43b88f30d9f3384fbb8943297c5dbf1df1520eed38
-
SSDEEP
24576:P3ll3TMV5V6Xsl3ZD/ebRwIG5/5E+BOJLHp:fb3TM/VjltWbRwny9JLJ
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4488-136-0x0000000000400000-0x000000000063E000-memory.dmp upx behavioral2/memory/4488-137-0x0000000000400000-0x000000000063E000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run acff4632818930fc1cdc03bc7a119f910d5ef177c2af7abd05b36266569649f3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NetworkChecker = "C:\\Users\\Admin\\AppData\\Local\\Temp\\acff4632818930fc1cdc03bc7a119f910d5ef177c2af7abd05b36266569649f3.exe" acff4632818930fc1cdc03bc7a119f910d5ef177c2af7abd05b36266569649f3.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4488 acff4632818930fc1cdc03bc7a119f910d5ef177c2af7abd05b36266569649f3.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main acff4632818930fc1cdc03bc7a119f910d5ef177c2af7abd05b36266569649f3.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\DefaultCompressedRecord = c880f97f7308f55439461da32d508355075b019fe219a3091f67dadb858c90e838b9130027b987cde2dac559fb299c8dcb68d655db5e119c7904db7983352dae59fd99d8fafdafc1c94bd350f197c41fab2ed5a593677f666d641f67e6f813cdc01035debe3543 acff4632818930fc1cdc03bc7a119f910d5ef177c2af7abd05b36266569649f3.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\RecordModifiedMax = "DBx8l2APAalTwqztls8pv9G3YxF2oPUwh77rDnCPTdIBIlpKRXnLDNPddkZIWPS1dQ==" acff4632818930fc1cdc03bc7a119f910d5ef177c2af7abd05b36266569649f3.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FlagsModifiedValid = 0000000000000000 acff4632818930fc1cdc03bc7a119f910d5ef177c2af7abd05b36266569649f3.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4900 acff4632818930fc1cdc03bc7a119f910d5ef177c2af7abd05b36266569649f3.exe 4488 acff4632818930fc1cdc03bc7a119f910d5ef177c2af7abd05b36266569649f3.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4900 wrote to memory of 4488 4900 acff4632818930fc1cdc03bc7a119f910d5ef177c2af7abd05b36266569649f3.exe 80 PID 4900 wrote to memory of 4488 4900 acff4632818930fc1cdc03bc7a119f910d5ef177c2af7abd05b36266569649f3.exe 80 PID 4900 wrote to memory of 4488 4900 acff4632818930fc1cdc03bc7a119f910d5ef177c2af7abd05b36266569649f3.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\acff4632818930fc1cdc03bc7a119f910d5ef177c2af7abd05b36266569649f3.exe"C:\Users\Admin\AppData\Local\Temp\acff4632818930fc1cdc03bc7a119f910d5ef177c2af7abd05b36266569649f3.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\acff4632818930fc1cdc03bc7a119f910d5ef177c2af7abd05b36266569649f3.exe"C:\Users\Admin\AppData\Local\Temp\acff4632818930fc1cdc03bc7a119f910d5ef177c2af7abd05b36266569649f3.exe"2⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
PID:4488
-