Analysis
-
max time kernel
143s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
20-07-2023 14:46
Static task
static1
Behavioral task
behavioral1
Sample
f4f147d270e98a7598f02362ddd2f927.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
f4f147d270e98a7598f02362ddd2f927.exe
Resource
win10v2004-20230703-en
General
-
Target
f4f147d270e98a7598f02362ddd2f927.exe
-
Size
3.1MB
-
MD5
f4f147d270e98a7598f02362ddd2f927
-
SHA1
c79df640b839d8fb01ede7d91c397212a3e1da0c
-
SHA256
d0130399fd404226ae5b90897e8e3affe29b7d34081ee1bf11ecb3750ca342c5
-
SHA512
519bf57ec999ef477b0d16af2eac6beefd2e2e50f491163f327919aa759b2aa10d0adf8e9ee23c8838cbcbb018e96943dd118b1660ecfdb41601689e1b57ff99
-
SSDEEP
98304:FRyJKKbIFlOLLN3z71neq1VKj7J2tB5pu:FkwKbqeJ171Yj7Ep
Malware Config
Signatures
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
f4f147d270e98a7598f02362ddd2f927.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tddecerhb = "C:\\Users\\Admin\\AppData\\Roaming\\Tddecerhb.exe" f4f147d270e98a7598f02362ddd2f927.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
f4f147d270e98a7598f02362ddd2f927.exedescription pid process target process PID 3764 set thread context of 4232 3764 f4f147d270e98a7598f02362ddd2f927.exe f4f147d270e98a7598f02362ddd2f927.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
f4f147d270e98a7598f02362ddd2f927.exepid process 4232 f4f147d270e98a7598f02362ddd2f927.exe 4232 f4f147d270e98a7598f02362ddd2f927.exe 4232 f4f147d270e98a7598f02362ddd2f927.exe 4232 f4f147d270e98a7598f02362ddd2f927.exe 4232 f4f147d270e98a7598f02362ddd2f927.exe 4232 f4f147d270e98a7598f02362ddd2f927.exe 4232 f4f147d270e98a7598f02362ddd2f927.exe 4232 f4f147d270e98a7598f02362ddd2f927.exe 4232 f4f147d270e98a7598f02362ddd2f927.exe 4232 f4f147d270e98a7598f02362ddd2f927.exe 4232 f4f147d270e98a7598f02362ddd2f927.exe 4232 f4f147d270e98a7598f02362ddd2f927.exe 4232 f4f147d270e98a7598f02362ddd2f927.exe 4232 f4f147d270e98a7598f02362ddd2f927.exe 4232 f4f147d270e98a7598f02362ddd2f927.exe 4232 f4f147d270e98a7598f02362ddd2f927.exe 4232 f4f147d270e98a7598f02362ddd2f927.exe 4232 f4f147d270e98a7598f02362ddd2f927.exe 4232 f4f147d270e98a7598f02362ddd2f927.exe 4232 f4f147d270e98a7598f02362ddd2f927.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
f4f147d270e98a7598f02362ddd2f927.exedescription pid process Token: SeDebugPrivilege 3764 f4f147d270e98a7598f02362ddd2f927.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
f4f147d270e98a7598f02362ddd2f927.exedescription pid process target process PID 3764 wrote to memory of 4232 3764 f4f147d270e98a7598f02362ddd2f927.exe f4f147d270e98a7598f02362ddd2f927.exe PID 3764 wrote to memory of 4232 3764 f4f147d270e98a7598f02362ddd2f927.exe f4f147d270e98a7598f02362ddd2f927.exe PID 3764 wrote to memory of 4232 3764 f4f147d270e98a7598f02362ddd2f927.exe f4f147d270e98a7598f02362ddd2f927.exe PID 3764 wrote to memory of 4232 3764 f4f147d270e98a7598f02362ddd2f927.exe f4f147d270e98a7598f02362ddd2f927.exe PID 3764 wrote to memory of 4232 3764 f4f147d270e98a7598f02362ddd2f927.exe f4f147d270e98a7598f02362ddd2f927.exe PID 3764 wrote to memory of 4232 3764 f4f147d270e98a7598f02362ddd2f927.exe f4f147d270e98a7598f02362ddd2f927.exe PID 3764 wrote to memory of 4232 3764 f4f147d270e98a7598f02362ddd2f927.exe f4f147d270e98a7598f02362ddd2f927.exe PID 3764 wrote to memory of 4232 3764 f4f147d270e98a7598f02362ddd2f927.exe f4f147d270e98a7598f02362ddd2f927.exe PID 3764 wrote to memory of 4232 3764 f4f147d270e98a7598f02362ddd2f927.exe f4f147d270e98a7598f02362ddd2f927.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4f147d270e98a7598f02362ddd2f927.exe"C:\Users\Admin\AppData\Local\Temp\f4f147d270e98a7598f02362ddd2f927.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Users\Admin\AppData\Local\Temp\f4f147d270e98a7598f02362ddd2f927.exeC:\Users\Admin\AppData\Local\Temp\f4f147d270e98a7598f02362ddd2f927.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4232
-