Analysis
-
max time kernel
162s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2022 05:04
Static task
static1
Behavioral task
behavioral1
Sample
c93c90ecbd578abc34f566a6c6a0a75aff5ff59f89645d3b53f0fcdc43a5cfaa.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c93c90ecbd578abc34f566a6c6a0a75aff5ff59f89645d3b53f0fcdc43a5cfaa.exe
Resource
win10v2004-20220812-en
General
-
Target
c93c90ecbd578abc34f566a6c6a0a75aff5ff59f89645d3b53f0fcdc43a5cfaa.exe
-
Size
1.1MB
-
MD5
b4b33b11ad1d5c49f1d91915644b8294
-
SHA1
821279835ff864a2f4897a748199b146ff0de108
-
SHA256
c93c90ecbd578abc34f566a6c6a0a75aff5ff59f89645d3b53f0fcdc43a5cfaa
-
SHA512
c27a205392c5d50a496716adae870c9c2432e66105ca48c53124b4bfe238e39343af28cbb7ad7490576bf8d0f77da36516631855aae1b61bea1d8f2c8a6d6582
-
SSDEEP
24576:TMWCHMAScMMJLTkiRFVv8ZhSJ3ZTDjrBYhm:2sAdL9Tk88SjBwm
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1648-132-0x0000000000400000-0x00000000006CB000-memory.dmp upx behavioral2/memory/1648-134-0x0000000000400000-0x00000000006CB000-memory.dmp upx behavioral2/memory/1648-135-0x0000000000400000-0x00000000006CB000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run c93c90ecbd578abc34f566a6c6a0a75aff5ff59f89645d3b53f0fcdc43a5cfaa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NetworkChecker = "C:\\Users\\Admin\\AppData\\Local\\Temp\\c93c90ecbd578abc34f566a6c6a0a75aff5ff59f89645d3b53f0fcdc43a5cfaa.exe" c93c90ecbd578abc34f566a6c6a0a75aff5ff59f89645d3b53f0fcdc43a5cfaa.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\RecordModifiedMax = "DAKAHUoVNXpr+u2q7vhBwE5BhZYQ4ovxpTpoctoxczFh1WpVb8tuCuzPaekt5+f4AQ==" c93c90ecbd578abc34f566a6c6a0a75aff5ff59f89645d3b53f0fcdc43a5cfaa.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FlagsModifiedValid = 0000000000000000 c93c90ecbd578abc34f566a6c6a0a75aff5ff59f89645d3b53f0fcdc43a5cfaa.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main c93c90ecbd578abc34f566a6c6a0a75aff5ff59f89645d3b53f0fcdc43a5cfaa.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\DefaultCompressedRecord = d680f97f73f126ec3b0506631d0ee48967e71c061dbfaef72be4341b6d838cbb07a757f12c91d15369c7a4e9e725356bd62b094b2c6968a32b0f3f1c8bafd2951ef4089fe26c494939b068fa3d6603359b89a9f24b677f86ea039fbb85845a468da817f63eb6e0 c93c90ecbd578abc34f566a6c6a0a75aff5ff59f89645d3b53f0fcdc43a5cfaa.exe