Analysis
-
max time kernel
154s -
max time network
195s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 19:53 UTC
Static task
static1
Behavioral task
behavioral1
Sample
aeb208cb0a41ae6453508c12e2873b0f8079da89c10bf8735e0d2b4d4ead184a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aeb208cb0a41ae6453508c12e2873b0f8079da89c10bf8735e0d2b4d4ead184a.exe
Resource
win10v2004-20221111-en
General
-
Target
aeb208cb0a41ae6453508c12e2873b0f8079da89c10bf8735e0d2b4d4ead184a.exe
-
Size
817KB
-
MD5
fda22cca531a5955a7bc7302661e020a
-
SHA1
74bf8f5188f32d9663dc13c72f7a10d280317dfb
-
SHA256
aeb208cb0a41ae6453508c12e2873b0f8079da89c10bf8735e0d2b4d4ead184a
-
SHA512
a0d167b0e244766dc08ab076cf88b221301c0cb61bcfaa7f11da86c1b379050179019a3644b3e00ab48e4a09e9eab74cada7153f91dece78b9cc1cd2085b6f2f
-
SSDEEP
24576:U5ZHwdBltEgsKrp58UThku0SuEU+Y/TEd:UXHw9KgssdD05rTE
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/5064-132-0x0000000000400000-0x00000000007A6000-memory.dmp upx behavioral2/memory/5064-134-0x0000000000400000-0x00000000007A6000-memory.dmp upx behavioral2/memory/5064-135-0x0000000000400000-0x00000000007A6000-memory.dmp upx behavioral2/memory/5064-136-0x0000000000400000-0x00000000007A6000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NetworkChecker = "C:\\Users\\Admin\\AppData\\Local\\Temp\\aeb208cb0a41ae6453508c12e2873b0f8079da89c10bf8735e0d2b4d4ead184a.exe" aeb208cb0a41ae6453508c12e2873b0f8079da89c10bf8735e0d2b4d4ead184a.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run aeb208cb0a41ae6453508c12e2873b0f8079da89c10bf8735e0d2b4d4ead184a.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main aeb208cb0a41ae6453508c12e2873b0f8079da89c10bf8735e0d2b4d4ead184a.exe Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\DefaultCompressedRecord = d580f97f7396723f8dfbfe5f69e466d0dbf11bda2d40baaecaee5f4253cce6a663e520f81e9f1b95ff7130cc76ad0681a4f8f1b0c5b94ef5ac51b4bb99863202bf6655a4587acd5fac102af3a259a1cea8bf23d6b5677fff1b4646f4e96f654f625ea345ea1ee8 aeb208cb0a41ae6453508c12e2873b0f8079da89c10bf8735e0d2b4d4ead184a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\RecordModifiedMax = "DMyBKnMRNxqfF3dICbqQ8qx3uuhSpp0fiQER4K+UXvp9ubId2tTDEq/wg9e6cXJ0lA==" aeb208cb0a41ae6453508c12e2873b0f8079da89c10bf8735e0d2b4d4ead184a.exe Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FlagsModifiedValid = 0000000000000000 aeb208cb0a41ae6453508c12e2873b0f8079da89c10bf8735e0d2b4d4ead184a.exe
Processes
Network
-
Remote address:8.8.8.8:53Request14.110.152.52.in-addr.arpaIN PTRResponse
-
322 B 7
-
322 B 7
-
322 B 7
-
322 B 7
-
322 B 7
-
322 B 7
-
208 B 4
-
-
208 B 4
-
-
208 B 4
-
-
208 B 4
-
-
208 B 4
-
-
208 B 4
-
-
208 B 4
-
-
208 B 4
-
-
208 B 4
-
-
208 B 4
-
-
208 B 4
-
-
208 B 4
-
-
208 B 4
-