Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 19:53
Static task
static1
Behavioral task
behavioral1
Sample
ae56118e6b426ee662f5eaa4a2fd5c143ea6fd07154226103631b999b5ea9f79.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ae56118e6b426ee662f5eaa4a2fd5c143ea6fd07154226103631b999b5ea9f79.exe
Resource
win10v2004-20220812-en
General
-
Target
ae56118e6b426ee662f5eaa4a2fd5c143ea6fd07154226103631b999b5ea9f79.exe
-
Size
818KB
-
MD5
39c127fc08499ecdc0bd55f5acaf626f
-
SHA1
e5d466b3efc4c2d0bce1fcba07a9f82bebc9885a
-
SHA256
ae56118e6b426ee662f5eaa4a2fd5c143ea6fd07154226103631b999b5ea9f79
-
SHA512
d408878173608805b7eec699a4c1f6f506c49fc1f69433a598ffedd80abb088143ea4e2dd3e8ddc6cb986aa72d6d4f031124600d90b982fe5b508eca52d2948f
-
SSDEEP
24576:QCuYGMNMsnFuEuEHzLnZt9mnq6vQGbAAwk+Vo:QCxGsMGV3Ztwnq6vQQ3+V
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4892-132-0x0000000000400000-0x00000000007A6000-memory.dmp upx behavioral2/memory/4892-134-0x0000000000400000-0x00000000007A6000-memory.dmp upx behavioral2/memory/4892-135-0x0000000000400000-0x00000000007A6000-memory.dmp upx behavioral2/memory/4892-136-0x0000000000400000-0x00000000007A6000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NetworkChecker = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ae56118e6b426ee662f5eaa4a2fd5c143ea6fd07154226103631b999b5ea9f79.exe" ae56118e6b426ee662f5eaa4a2fd5c143ea6fd07154226103631b999b5ea9f79.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run ae56118e6b426ee662f5eaa4a2fd5c143ea6fd07154226103631b999b5ea9f79.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FlagsModifiedValid = 0000000000000000 ae56118e6b426ee662f5eaa4a2fd5c143ea6fd07154226103631b999b5ea9f79.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main ae56118e6b426ee662f5eaa4a2fd5c143ea6fd07154226103631b999b5ea9f79.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\DefaultCompressedRecord = d580f97f7341984022cde2490c75877249af42810fce9efd3d6113680e5d5501dab9ff1c5ac83f64c6874c96f121b84989b9ad3514e146532d002f160460ccaefdd9ebaac32bd5787e38c5258596a3227cac2edb80677facf8cda9cdddaaa4d43354c0b4ed81f1 ae56118e6b426ee662f5eaa4a2fd5c143ea6fd07154226103631b999b5ea9f79.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\RecordModifiedMax = "DEAKXFa4Ggkx8SsbeEqH/HQtxAyuN3NRIYiGPEUHkc2GiPfDa3C2WDYEcguMyzhDug==" ae56118e6b426ee662f5eaa4a2fd5c143ea6fd07154226103631b999b5ea9f79.exe