Analysis
-
max time kernel
152s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 05:50
Static task
static1
Behavioral task
behavioral1
Sample
33d049c933119d5b2f187075c43456dee3331ff7432300309f075b3fd385b1c9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
33d049c933119d5b2f187075c43456dee3331ff7432300309f075b3fd385b1c9.exe
Resource
win10v2004-20221111-en
General
-
Target
33d049c933119d5b2f187075c43456dee3331ff7432300309f075b3fd385b1c9.exe
-
Size
1.2MB
-
MD5
a58e37b562bfc596dc8942816e03b405
-
SHA1
b83a7fac84ac5a49d96612f47f5bf1089398c7ea
-
SHA256
33d049c933119d5b2f187075c43456dee3331ff7432300309f075b3fd385b1c9
-
SHA512
d9cfff310078a7fbb0bdf323da667327b09625d114fbf12bbf0f172df8d01e9da1110de7fbe2831979da5ed0a4197bbf0ec46bfc1b803fb170b6ea0ae9a0124f
-
SSDEEP
12288:REmjQja4EG6sfMC+GmN2Bdjp9OxvV3M6qPJl9P9Jp4RhWqoVVoIOfJJ601A5fl:PjQpEGjXK8lo6PJ7FghHoVVoZfJHA5N
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1704-133-0x0000000000400000-0x00000000006ED000-memory.dmp upx behavioral2/memory/1704-135-0x0000000000400000-0x00000000006ED000-memory.dmp upx behavioral2/memory/1704-136-0x0000000000400000-0x00000000006ED000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 33d049c933119d5b2f187075c43456dee3331ff7432300309f075b3fd385b1c9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NetworkChecker = "C:\\Users\\Admin\\AppData\\Local\\Temp\\33d049c933119d5b2f187075c43456dee3331ff7432300309f075b3fd385b1c9.exe" 33d049c933119d5b2f187075c43456dee3331ff7432300309f075b3fd385b1c9.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\RecordModifiedMax = "DCFPQLuX40lv6yEL7FKKGrba0S0wim2RMN3nNY1JfPpns2KMxYA8IiyY9Ph9y0qs+g==" 33d049c933119d5b2f187075c43456dee3331ff7432300309f075b3fd385b1c9.exe Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FlagsModifiedValid = 0000000000000000 33d049c933119d5b2f187075c43456dee3331ff7432300309f075b3fd385b1c9.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main 33d049c933119d5b2f187075c43456dee3331ff7432300309f075b3fd385b1c9.exe Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\DefaultCompressedRecord = d380f97f7351a2d55a83f3e777f7e8230aee2715834567347691e4764f91080a18599f744c1784790e910a621f31a2097cbb0e884544c4614f26a220fa03d647045ecf6bb8b5d4ade08bf467dd8f32e3f1cee1a6e7677f615b65d9f4be324f605f656e28582638 33d049c933119d5b2f187075c43456dee3331ff7432300309f075b3fd385b1c9.exe