Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 06:29
Static task
static1
Behavioral task
behavioral1
Sample
182822ef0e011e0dba6c073469ec4a1ff80351d0c8d179396cf0ae22cfb0746d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
182822ef0e011e0dba6c073469ec4a1ff80351d0c8d179396cf0ae22cfb0746d.exe
Resource
win10v2004-20220812-en
General
-
Target
182822ef0e011e0dba6c073469ec4a1ff80351d0c8d179396cf0ae22cfb0746d.exe
-
Size
960KB
-
MD5
2a43ed0c782fcd7abbbdd4f58f9faa70
-
SHA1
876ff0937bf22bd4a399e91d29254dd842cd20a3
-
SHA256
182822ef0e011e0dba6c073469ec4a1ff80351d0c8d179396cf0ae22cfb0746d
-
SHA512
11aa6f623a15c8696d1a5700b9eade3b0f0004860fd29c3d569246f19c453216c7fe85eed64e7eb736aaf99c7645bd49d27ca77364d91007e67fb6936f4fd04c
-
SSDEEP
24576:Rv5o5woW6h4/HDE1oHR8uEkt2G2He7QWeib/ihj:hC5wNM4v02J5t9QWfLih
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4648-133-0x0000000000400000-0x000000000064C000-memory.dmp upx behavioral2/memory/4648-135-0x0000000000400000-0x000000000064C000-memory.dmp upx behavioral2/memory/4648-136-0x0000000000400000-0x000000000064C000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 182822ef0e011e0dba6c073469ec4a1ff80351d0c8d179396cf0ae22cfb0746d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NetworkChecker = "C:\\Users\\Admin\\AppData\\Local\\Temp\\182822ef0e011e0dba6c073469ec4a1ff80351d0c8d179396cf0ae22cfb0746d.exe" 182822ef0e011e0dba6c073469ec4a1ff80351d0c8d179396cf0ae22cfb0746d.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\DefaultCompressedRecord = e980f97f7387c4537c97009e5f398fd744c1eaf367efc2d12e408f20f5568a494c830586235c1b87ede637fdafca5fb389949679ca378e3752ddb45bda2a920f70538ac485a29663e135f800b92181dcfa4b0398b1677f3a6be5b6880dcb14ab224ac11c00a92c 182822ef0e011e0dba6c073469ec4a1ff80351d0c8d179396cf0ae22cfb0746d.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\RecordModifiedMax = "DMX85mbFzVgp64bBjOFVpNHCtYHTc8eJCaneWgYYkayFkTpT6nOzsK7FYq0iisPlCA==" 182822ef0e011e0dba6c073469ec4a1ff80351d0c8d179396cf0ae22cfb0746d.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FlagsModifiedValid = 0000000000000000 182822ef0e011e0dba6c073469ec4a1ff80351d0c8d179396cf0ae22cfb0746d.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main 182822ef0e011e0dba6c073469ec4a1ff80351d0c8d179396cf0ae22cfb0746d.exe