Analysis
-
max time kernel
186s -
max time network
197s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 19:58
Static task
static1
Behavioral task
behavioral1
Sample
9be656a732d9fa3eaf9b88a60d9d1eb93c9214037c2c94d35d0ab0c1a5d9e008.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9be656a732d9fa3eaf9b88a60d9d1eb93c9214037c2c94d35d0ab0c1a5d9e008.exe
Resource
win10v2004-20221111-en
General
-
Target
9be656a732d9fa3eaf9b88a60d9d1eb93c9214037c2c94d35d0ab0c1a5d9e008.exe
-
Size
817KB
-
MD5
7a1abc46fa68db0367f2ca3d042c3ac1
-
SHA1
f557d15e953b2c4d3bff5df0d5cdaf591bac8e0e
-
SHA256
9be656a732d9fa3eaf9b88a60d9d1eb93c9214037c2c94d35d0ab0c1a5d9e008
-
SHA512
ee5aa569ed8719e392f404b0642ade1ae332618d4d66abc98b1be6ce735666b6eb509ca9700730de825ff615bf03f011d5e8cca2d90c499411888ff040c70a5c
-
SSDEEP
24576:gKkxplC0jSd+YRNatEunGd3kRuVzzOW+0oxE:RClR+BytWdlzf+V
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2044-54-0x0000000000400000-0x00000000007A9000-memory.dmp upx behavioral1/memory/2044-56-0x0000000000400000-0x00000000007A9000-memory.dmp upx behavioral1/memory/2044-58-0x0000000000400000-0x00000000007A9000-memory.dmp upx behavioral1/memory/2044-59-0x0000000000400000-0x00000000007A9000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 9be656a732d9fa3eaf9b88a60d9d1eb93c9214037c2c94d35d0ab0c1a5d9e008.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\NetworkChecker = "C:\\Users\\Admin\\AppData\\Local\\Temp\\9be656a732d9fa3eaf9b88a60d9d1eb93c9214037c2c94d35d0ab0c1a5d9e008.exe" 9be656a732d9fa3eaf9b88a60d9d1eb93c9214037c2c94d35d0ab0c1a5d9e008.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.