Analysis
-
max time kernel
144s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2023 17:27
Static task
static1
Behavioral task
behavioral1
Sample
91a0106c0b58cd6fde7a66bb181b3dbb.exe
Resource
win7-20230712-en
General
-
Target
91a0106c0b58cd6fde7a66bb181b3dbb.exe
-
Size
345KB
-
MD5
91a0106c0b58cd6fde7a66bb181b3dbb
-
SHA1
17bdbdb35a47154fec7fdfc4e9f59a053e5d5d7a
-
SHA256
84843ae0e91bbacae720437937f1bcea3fcae4d9933d71a07a26a8e81479c0f0
-
SHA512
de013483c8564801292d33a1103fbee5fa3ff41f21c4ddf447a870e5c1ee883bd15e95a2e7440c09b2a049e3578cec3d7f10d1182d4a30729790a1aa1ade5aab
-
SSDEEP
3072:AP2ZBBNQdf3BgVy/pC35i/fcax7YN9+SVtkwFn1oOKlOvJO2bNLg3r3XN3:zZRQN3Bg0GincaGhVtkU0sxOuq3
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{0DDEC57E-DFFB-4698-9453-0120740E8CE8}.catalogItem svchost.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3980 484 WerFault.exe 84 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 484 91a0106c0b58cd6fde7a66bb181b3dbb.exe 484 91a0106c0b58cd6fde7a66bb181b3dbb.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 484 91a0106c0b58cd6fde7a66bb181b3dbb.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\91a0106c0b58cd6fde7a66bb181b3dbb.exe"C:\Users\Admin\AppData\Local\Temp\91a0106c0b58cd6fde7a66bb181b3dbb.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:484 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 484 -s 12922⤵
- Program crash
PID:3980
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
PID:4252
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 484 -ip 4841⤵PID:1948