Analysis
-
max time kernel
169s -
max time network
222s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2022 01:31
Static task
static1
Behavioral task
behavioral1
Sample
8e3a47927aa6c1173d640e1ffe26f7a533ef3d623f517fc1f3c87598e7f751e8.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8e3a47927aa6c1173d640e1ffe26f7a533ef3d623f517fc1f3c87598e7f751e8.exe
Resource
win10v2004-20220812-en
General
-
Target
8e3a47927aa6c1173d640e1ffe26f7a533ef3d623f517fc1f3c87598e7f751e8.exe
-
Size
1.2MB
-
MD5
b7c704a215da3a8771572670e3acca2b
-
SHA1
3f4b426a907eaefb94e15b54ecd1890beec90993
-
SHA256
8e3a47927aa6c1173d640e1ffe26f7a533ef3d623f517fc1f3c87598e7f751e8
-
SHA512
21f1ebc162a9b0fcde3da7ae23ff2667e0e5444ab9eefdf8c0ac3575a2d9c49bf143828ab230704d1c568b2917634e7c1e086b4c1c40e685404ba505acd6aeed
-
SSDEEP
24576:bac7yLgZEPsDrfPxWbpbdOTnIAXVBA4xx:zO8SKW1bdOTPU4xx
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1428-133-0x0000000000400000-0x00000000006E1000-memory.dmp upx behavioral2/memory/1428-135-0x0000000000400000-0x00000000006E1000-memory.dmp upx behavioral2/memory/1428-136-0x0000000000400000-0x00000000006E1000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 8e3a47927aa6c1173d640e1ffe26f7a533ef3d623f517fc1f3c87598e7f751e8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NetworkChecker = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8e3a47927aa6c1173d640e1ffe26f7a533ef3d623f517fc1f3c87598e7f751e8.exe" 8e3a47927aa6c1173d640e1ffe26f7a533ef3d623f517fc1f3c87598e7f751e8.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main 8e3a47927aa6c1173d640e1ffe26f7a533ef3d623f517fc1f3c87598e7f751e8.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\DefaultCompressedRecord = 0980f97f73487997e25a70004931e6bfab5b9ff52b5e53c95160097be5e3ead9aac59e2f6ecc93dd3c08fd1e5b4ef0ebc0d5230f02c57a90f6a3b0f47c63f3ff74f763cf257905e36ab37bc5dfb1b2c523342651b0677f01928f357d02eb6ec0ba009f622b0512 8e3a47927aa6c1173d640e1ffe26f7a533ef3d623f517fc1f3c87598e7f751e8.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\RecordModifiedMax = "DBALr2B4HygQwoYGl8YxOQJOcVmlWh0UwLGKkDDqwOpShF7gMXoWpUbpOTvCrHECEA==" 8e3a47927aa6c1173d640e1ffe26f7a533ef3d623f517fc1f3c87598e7f751e8.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FlagsModifiedValid = 0000000000000000 8e3a47927aa6c1173d640e1ffe26f7a533ef3d623f517fc1f3c87598e7f751e8.exe