Analysis
-
max time kernel
140s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
21-03-2023 13:26
Static task
static1
Behavioral task
behavioral1
Sample
21e4c999735b8078454d3407c9556aade8d9d477c3b7d2aebc3eee5b5670a3bd.exe
Resource
win7-20230220-en
General
-
Target
21e4c999735b8078454d3407c9556aade8d9d477c3b7d2aebc3eee5b5670a3bd.exe
-
Size
6.8MB
-
MD5
31a11a0b81f43eeb43887467bbebf5fd
-
SHA1
187eb286dd68d8421c55a8615ab584cdc280b108
-
SHA256
21e4c999735b8078454d3407c9556aade8d9d477c3b7d2aebc3eee5b5670a3bd
-
SHA512
924efe7a92bac35662e5a0e12f49ee18fcd37866d9e2fe7fed3776bc94d87c3a738bffa9bf1b87b47dc1a58154160f5bea2cb026b8204aecaa3cca759386a0f8
-
SSDEEP
98304:zNESvhK3NdZ79CL5ii5wSreJUHKX0l+6p1TzUbjOl9czfxkcVrnkF9QUa8RP:5dKV9CYSwSrgUHKXXKijWWzfxkornzc
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 21e4c999735b8078454d3407c9556aade8d9d477c3b7d2aebc3eee5b5670a3bd.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 21e4c999735b8078454d3407c9556aade8d9d477c3b7d2aebc3eee5b5670a3bd.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 21e4c999735b8078454d3407c9556aade8d9d477c3b7d2aebc3eee5b5670a3bd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 21e4c999735b8078454d3407c9556aade8d9d477c3b7d2aebc3eee5b5670a3bd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 21e4c999735b8078454d3407c9556aade8d9d477c3b7d2aebc3eee5b5670a3bd.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4996 21e4c999735b8078454d3407c9556aade8d9d477c3b7d2aebc3eee5b5670a3bd.exe 4996 21e4c999735b8078454d3407c9556aade8d9d477c3b7d2aebc3eee5b5670a3bd.exe 4996 21e4c999735b8078454d3407c9556aade8d9d477c3b7d2aebc3eee5b5670a3bd.exe 4996 21e4c999735b8078454d3407c9556aade8d9d477c3b7d2aebc3eee5b5670a3bd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\21e4c999735b8078454d3407c9556aade8d9d477c3b7d2aebc3eee5b5670a3bd.exe"C:\Users\Admin\AppData\Local\Temp\21e4c999735b8078454d3407c9556aade8d9d477c3b7d2aebc3eee5b5670a3bd.exe"1⤵
- Maps connected drives based on registry
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4996
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD518da5c19d469f921ff9d44f1f17de97b
SHA1bef606053494e1f516431d40f2aca29cf1deeb20
SHA256662f6389650db2471a13412664d05cfed46fef73dd1d30cf16d2c8ceeee33eb0
SHA5129eee1b05c10544813c2eb89c48369d78e5b9260fddd8e90a34f06ac8ea2955860083c6c8ac31089276e97e269b87b4ac0c43e9dcdb7bd6091759dccb4ac0e71d
-
Filesize
32B
MD5987fa44e8f2f322577a051e857d5b710
SHA1d2979061a67d821dd5ea34175af95c2533a1ff29
SHA256cc65477af5d0510692c50feaf90d4c089b7dbcf7d967c3a9d0213a7ae7444e15
SHA512554ad7d00b0874bb4c53e817e2df5a068e4061e1fb67d51c57122919c41f047e9c73efab6ba6482e2479391a4277cf7872f1eb6b28012c732e5bdede3f782220
-
Filesize
71KB
MD546988a922937a39036d6b71e62d0f966
SHA14a997f2a0360274ec7990aac156870a5a7030665
SHA2565954db23a8424f6cb1e933387d0866910c45615f54342aa0f6dd597174393de6
SHA512dd7774668cd24c303e670e7d096794aca67593b8d8a9b3b38aa08c148f67e74c07041f25941465b3ae030bafd76384b4b79d41c1eeebe5bd11d94ab25ef00e9d