Analysis
-
max time kernel
121s -
max time network
105s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 15:55
Behavioral task
behavioral1
Sample
a798796412e0ea1b1ba6e95b40e6f824e4dc12911f34313aa190e58decd6bc65.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a798796412e0ea1b1ba6e95b40e6f824e4dc12911f34313aa190e58decd6bc65.exe
Resource
win10v2004-20220901-en
General
-
Target
a798796412e0ea1b1ba6e95b40e6f824e4dc12911f34313aa190e58decd6bc65.exe
-
Size
133KB
-
MD5
9554bf61d3869a210a22cd8adbae4d65
-
SHA1
cfd958d825c6eb2520262773a766051cc28338f5
-
SHA256
a798796412e0ea1b1ba6e95b40e6f824e4dc12911f34313aa190e58decd6bc65
-
SHA512
92cd2701cdc09f1521eac29f85a34bf307f0b3f80f692a51372c85ac4ea85a8418145ff804817a946c52b40f4e6ef29689ccc9309e65e281e061a72251ddc0ea
-
SSDEEP
3072:oEpjuktkk1uu4A0QMsZ8QpJH0eiiVWv8NqVFQuIGZ+JHW:D5hB0dc8QPI0Wv8NqV2ulZ+J
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\7F0C3\\400D5.exe" a798796412e0ea1b1ba6e95b40e6f824e4dc12911f34313aa190e58decd6bc65.exe -
resource yara_rule behavioral1/memory/1128-57-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/1448-58-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/1312-62-0x0000000000400000-0x000000000048E000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1448 wrote to memory of 1128 1448 a798796412e0ea1b1ba6e95b40e6f824e4dc12911f34313aa190e58decd6bc65.exe 27 PID 1448 wrote to memory of 1128 1448 a798796412e0ea1b1ba6e95b40e6f824e4dc12911f34313aa190e58decd6bc65.exe 27 PID 1448 wrote to memory of 1128 1448 a798796412e0ea1b1ba6e95b40e6f824e4dc12911f34313aa190e58decd6bc65.exe 27 PID 1448 wrote to memory of 1128 1448 a798796412e0ea1b1ba6e95b40e6f824e4dc12911f34313aa190e58decd6bc65.exe 27 PID 1448 wrote to memory of 1312 1448 a798796412e0ea1b1ba6e95b40e6f824e4dc12911f34313aa190e58decd6bc65.exe 29 PID 1448 wrote to memory of 1312 1448 a798796412e0ea1b1ba6e95b40e6f824e4dc12911f34313aa190e58decd6bc65.exe 29 PID 1448 wrote to memory of 1312 1448 a798796412e0ea1b1ba6e95b40e6f824e4dc12911f34313aa190e58decd6bc65.exe 29 PID 1448 wrote to memory of 1312 1448 a798796412e0ea1b1ba6e95b40e6f824e4dc12911f34313aa190e58decd6bc65.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\a798796412e0ea1b1ba6e95b40e6f824e4dc12911f34313aa190e58decd6bc65.exe"C:\Users\Admin\AppData\Local\Temp\a798796412e0ea1b1ba6e95b40e6f824e4dc12911f34313aa190e58decd6bc65.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\a798796412e0ea1b1ba6e95b40e6f824e4dc12911f34313aa190e58decd6bc65.exeC:\Users\Admin\AppData\Local\Temp\a798796412e0ea1b1ba6e95b40e6f824e4dc12911f34313aa190e58decd6bc65.exe startC:\Program Files (x86)\LP\D5F7\2C1.exe%C:\Program Files (x86)\LP\D5F72⤵PID:1128
-
-
C:\Users\Admin\AppData\Local\Temp\a798796412e0ea1b1ba6e95b40e6f824e4dc12911f34313aa190e58decd6bc65.exeC:\Users\Admin\AppData\Local\Temp\a798796412e0ea1b1ba6e95b40e6f824e4dc12911f34313aa190e58decd6bc65.exe startC:\Program Files (x86)\C3AD5\lvvm.exe%C:\Program Files (x86)\C3AD52⤵PID:1312
-