Analysis
-
max time kernel
191s -
max time network
199s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 05:15
Static task
static1
Behavioral task
behavioral1
Sample
9355f2a1ad4d1e5de72da2520b8f8b8d0c5213dd87743e00a018e2733f213758.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9355f2a1ad4d1e5de72da2520b8f8b8d0c5213dd87743e00a018e2733f213758.exe
Resource
win10v2004-20221111-en
General
-
Target
9355f2a1ad4d1e5de72da2520b8f8b8d0c5213dd87743e00a018e2733f213758.exe
-
Size
1.2MB
-
MD5
f2de7ad903bb18acc778c4175b5c0eb3
-
SHA1
18991662a4389412ff9c56ef4debd3d55128d384
-
SHA256
9355f2a1ad4d1e5de72da2520b8f8b8d0c5213dd87743e00a018e2733f213758
-
SHA512
5fe0dc51c49b5af08c148d5f0780eebca26501b4277624e4878a67ad33d59d1678e576ea9d5d19d7213ac54d9374070bebf6ddb376ec8a4a698c3c2b16351952
-
SSDEEP
12288:cEqQmf49lUNT8H2Ah4385hUHVNVqGFaTwNLSzbDcikVxGPODovUnkWQ3CQtEMyAq:2Qt9lBN4s5hsLBoiC9/2nvMyKvTBy2+R
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3660-133-0x0000000000400000-0x00000000006ED000-memory.dmp upx behavioral2/memory/3660-135-0x0000000000400000-0x00000000006ED000-memory.dmp upx behavioral2/memory/3660-136-0x0000000000400000-0x00000000006ED000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 9355f2a1ad4d1e5de72da2520b8f8b8d0c5213dd87743e00a018e2733f213758.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NetworkChecker = "C:\\Users\\Admin\\AppData\\Local\\Temp\\9355f2a1ad4d1e5de72da2520b8f8b8d0c5213dd87743e00a018e2733f213758.exe" 9355f2a1ad4d1e5de72da2520b8f8b8d0c5213dd87743e00a018e2733f213758.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main 9355f2a1ad4d1e5de72da2520b8f8b8d0c5213dd87743e00a018e2733f213758.exe Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\DefaultCompressedRecord = 2e80f97f735ed4f9b747cab95208d93f09121a4452b5502e03e2460f8192258e7219d40d9d4fefa9a58c615429bb779c9777522d0c0874f52b98809b08b2e6aa7675b1b726436745072f7a6fe4319314de43418691677f303a697a576c2c9adb86ddf0a7499a0e 9355f2a1ad4d1e5de72da2520b8f8b8d0c5213dd87743e00a018e2733f213758.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\RecordModifiedMax = "DLHoY9MNcyJ2Y2vsipc/SDiocGC8gFN/qiDndyebTzRaZ6nkzPuxWI/tzDraWQWIUA==" 9355f2a1ad4d1e5de72da2520b8f8b8d0c5213dd87743e00a018e2733f213758.exe Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FlagsModifiedValid = 0000000000000000 9355f2a1ad4d1e5de72da2520b8f8b8d0c5213dd87743e00a018e2733f213758.exe