Analysis
-
max time kernel
125s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 18:25
Static task
static1
Behavioral task
behavioral1
Sample
bfbeab9fa4bcf3165e302180ca636cec1dcdebc458ab07bb08ec4a4bda6026e4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bfbeab9fa4bcf3165e302180ca636cec1dcdebc458ab07bb08ec4a4bda6026e4.exe
Resource
win10v2004-20220812-en
General
-
Target
bfbeab9fa4bcf3165e302180ca636cec1dcdebc458ab07bb08ec4a4bda6026e4.exe
-
Size
166KB
-
MD5
0fe723bcaf904778d078ac93c0929957
-
SHA1
1c0edcab4093b98eae04fada18bcb2afd1159bb3
-
SHA256
bfbeab9fa4bcf3165e302180ca636cec1dcdebc458ab07bb08ec4a4bda6026e4
-
SHA512
0e2c95dc2d273dec23aa5a5d0b528b71ef536b6c7b6e3feb2b4d7931a85269a0a54e49060860d9147a57e20ac2e592252a9a359f741b54c8eaa0483e6c21e6bf
-
SSDEEP
3072:NKv0qrbcezlnFcv5VgT4+YPTSHXY/bufobOAKQTKxDJnHI/K/:NW0EjmGlYPTSHXerbbKFx
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/656-55-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/1964-59-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/656-61-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/1812-65-0x0000000000400000-0x0000000000446000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" bfbeab9fa4bcf3165e302180ca636cec1dcdebc458ab07bb08ec4a4bda6026e4.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 656 wrote to memory of 1964 656 bfbeab9fa4bcf3165e302180ca636cec1dcdebc458ab07bb08ec4a4bda6026e4.exe 27 PID 656 wrote to memory of 1964 656 bfbeab9fa4bcf3165e302180ca636cec1dcdebc458ab07bb08ec4a4bda6026e4.exe 27 PID 656 wrote to memory of 1964 656 bfbeab9fa4bcf3165e302180ca636cec1dcdebc458ab07bb08ec4a4bda6026e4.exe 27 PID 656 wrote to memory of 1964 656 bfbeab9fa4bcf3165e302180ca636cec1dcdebc458ab07bb08ec4a4bda6026e4.exe 27 PID 656 wrote to memory of 1812 656 bfbeab9fa4bcf3165e302180ca636cec1dcdebc458ab07bb08ec4a4bda6026e4.exe 29 PID 656 wrote to memory of 1812 656 bfbeab9fa4bcf3165e302180ca636cec1dcdebc458ab07bb08ec4a4bda6026e4.exe 29 PID 656 wrote to memory of 1812 656 bfbeab9fa4bcf3165e302180ca636cec1dcdebc458ab07bb08ec4a4bda6026e4.exe 29 PID 656 wrote to memory of 1812 656 bfbeab9fa4bcf3165e302180ca636cec1dcdebc458ab07bb08ec4a4bda6026e4.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\bfbeab9fa4bcf3165e302180ca636cec1dcdebc458ab07bb08ec4a4bda6026e4.exe"C:\Users\Admin\AppData\Local\Temp\bfbeab9fa4bcf3165e302180ca636cec1dcdebc458ab07bb08ec4a4bda6026e4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Users\Admin\AppData\Local\Temp\bfbeab9fa4bcf3165e302180ca636cec1dcdebc458ab07bb08ec4a4bda6026e4.exeC:\Users\Admin\AppData\Local\Temp\bfbeab9fa4bcf3165e302180ca636cec1dcdebc458ab07bb08ec4a4bda6026e4.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵PID:1964
-
-
C:\Users\Admin\AppData\Local\Temp\bfbeab9fa4bcf3165e302180ca636cec1dcdebc458ab07bb08ec4a4bda6026e4.exeC:\Users\Admin\AppData\Local\Temp\bfbeab9fa4bcf3165e302180ca636cec1dcdebc458ab07bb08ec4a4bda6026e4.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵PID:1812
-