Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2022 05:28
Static task
static1
Behavioral task
behavioral1
Sample
44b774581d0e5dc0b0e9d43ad80ed96f35e29ec5652f84156a8368905b56c367.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
44b774581d0e5dc0b0e9d43ad80ed96f35e29ec5652f84156a8368905b56c367.exe
Resource
win10v2004-20220901-en
General
-
Target
44b774581d0e5dc0b0e9d43ad80ed96f35e29ec5652f84156a8368905b56c367.exe
-
Size
1.2MB
-
MD5
84856004617eba883e17c762f3f87862
-
SHA1
d830a6c278cf821ac4578dda4e14f55832cf92aa
-
SHA256
44b774581d0e5dc0b0e9d43ad80ed96f35e29ec5652f84156a8368905b56c367
-
SHA512
f1d283fa49a09fc26d194e2108428770821cbf4f42ce8f7d421a978e456312a66d1b9eb10905ff6237e9dd492e60e675e85ddb549a9b075ba57217ffad127f3a
-
SSDEEP
24576:hrJeRELxi11c2Svxsm1GeL9Xsm7eGvKodmUgZC+WyjB00Xkzk:5JPi11c2Svx7Mi9gY7gZCz4
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3040-133-0x0000000000400000-0x00000000006E6000-memory.dmp upx behavioral2/memory/3040-135-0x0000000000400000-0x00000000006E6000-memory.dmp upx behavioral2/memory/3040-136-0x0000000000400000-0x00000000006E6000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 44b774581d0e5dc0b0e9d43ad80ed96f35e29ec5652f84156a8368905b56c367.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NetworkChecker = "C:\\Users\\Admin\\AppData\\Local\\Temp\\44b774581d0e5dc0b0e9d43ad80ed96f35e29ec5652f84156a8368905b56c367.exe" 44b774581d0e5dc0b0e9d43ad80ed96f35e29ec5652f84156a8368905b56c367.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main 44b774581d0e5dc0b0e9d43ad80ed96f35e29ec5652f84156a8368905b56c367.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\DefaultCompressedRecord = 0f80f97f73418296340b6b50cae0a8217b5c6fbb8cbe3c6c6fd5485ad76053100aa9ffb9729152233a315f416af2424363c2129c21cd9d9bb81932b06eba9f66ad38c46ada7a42fd69f3fa39caeb1d30673237273c677f05e2bf48245a8821f3cd888341dbb209 44b774581d0e5dc0b0e9d43ad80ed96f35e29ec5652f84156a8368905b56c367.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\RecordModifiedMax = "DOQ/sg7E2dBIm8sC9cAL6OzVN8LGUOjqjLjWHYe86lbEwzBLpaIEr6daoDCO+BLB5g==" 44b774581d0e5dc0b0e9d43ad80ed96f35e29ec5652f84156a8368905b56c367.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FlagsModifiedValid = 0000000000000000 44b774581d0e5dc0b0e9d43ad80ed96f35e29ec5652f84156a8368905b56c367.exe