Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 23:54
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1b01535ce052861c30df0ad33a137fcf.exe
Resource
win7-20231215-en
6 signatures
150 seconds
General
-
Target
1b01535ce052861c30df0ad33a137fcf.exe
-
Size
82KB
-
MD5
1b01535ce052861c30df0ad33a137fcf
-
SHA1
854a744e62f80537b1f137bb819b4f9fa44bd88f
-
SHA256
22e40f5ed1f690eb2527a76d65f7afb1e64690d22776c734ceb29cf53cb58dcb
-
SHA512
5f381d2f360bed2fd1cc522c30c6adcfb510fe1fe989e1385489c8e145c7f44e4ec28b1f916deeb32aba3f9a94fd290f74f65cf140bb658d1207b611f0f6cc45
-
SSDEEP
1536:PaHLtZfHy0O/JuSkZWeGkqbT3ckFqtLUNCdbbEToYJOWYlppiu0C5hbs:PaHzHY/JBOQksAkItZnETHOrlplhA
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4240 set thread context of 3468 4240 1b01535ce052861c30df0ad33a137fcf.exe 19 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Software\Microsoft\Internet Explorer\Main 1b01535ce052861c30df0ad33a137fcf.exe Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Software\Microsoft\Internet Explorer\SearchScopes 1b01535ce052861c30df0ad33a137fcf.exe Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\DownloadUpdates = "329728" 1b01535ce052861c30df0ad33a137fcf.exe Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} 1b01535ce052861c30df0ad33a137fcf.exe Set value (str) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\SuggestionsURLFallback = "http://www.google.com/cse?cx=partner-pub-9588033570232632:rhmyra-cwbb&q={searchTerms}" 1b01535ce052861c30df0ad33a137fcf.exe Set value (str) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\URL = "http://www.google.com/cse?cx=partner-pub-9588033570232632:rhmyra-cwbb&q={searchTerms}" 1b01535ce052861c30df0ad33a137fcf.exe Set value (str) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\DisplayName = "Google" 1b01535ce052861c30df0ad33a137fcf.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "file://localhost/C:/www.google.com.htm" 1b01535ce052861c30df0ad33a137fcf.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3468 1b01535ce052861c30df0ad33a137fcf.exe 3468 1b01535ce052861c30df0ad33a137fcf.exe 3468 1b01535ce052861c30df0ad33a137fcf.exe 3468 1b01535ce052861c30df0ad33a137fcf.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4240 wrote to memory of 3468 4240 1b01535ce052861c30df0ad33a137fcf.exe 19 PID 4240 wrote to memory of 3468 4240 1b01535ce052861c30df0ad33a137fcf.exe 19 PID 4240 wrote to memory of 3468 4240 1b01535ce052861c30df0ad33a137fcf.exe 19 PID 4240 wrote to memory of 3468 4240 1b01535ce052861c30df0ad33a137fcf.exe 19 PID 4240 wrote to memory of 3468 4240 1b01535ce052861c30df0ad33a137fcf.exe 19 PID 4240 wrote to memory of 3468 4240 1b01535ce052861c30df0ad33a137fcf.exe 19 PID 3468 wrote to memory of 3372 3468 1b01535ce052861c30df0ad33a137fcf.exe 48 PID 3468 wrote to memory of 3372 3468 1b01535ce052861c30df0ad33a137fcf.exe 48 PID 3468 wrote to memory of 3372 3468 1b01535ce052861c30df0ad33a137fcf.exe 48 PID 3468 wrote to memory of 3372 3468 1b01535ce052861c30df0ad33a137fcf.exe 48
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b01535ce052861c30df0ad33a137fcf.exe"C:\Users\Admin\AppData\Local\Temp\1b01535ce052861c30df0ad33a137fcf.exe"1⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\1b01535ce052861c30df0ad33a137fcf.exeC:\Users\Admin\AppData\Local\Temp\1b01535ce052861c30df0ad33a137fcf.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3468
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3372