Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 07:49
Behavioral task
behavioral1
Sample
10089d117ddd2b90375f906fa9757656.exe
Resource
win7-20231129-en
General
-
Target
10089d117ddd2b90375f906fa9757656.exe
-
Size
1.2MB
-
MD5
10089d117ddd2b90375f906fa9757656
-
SHA1
95eefc8fe4b78a5b7976bfe210a6403e7a3a906d
-
SHA256
cab6ca57035bcef3e271c9a9062b86f6d3eddda393ce6cae44c34437ba848b18
-
SHA512
448e3c0aae875ed4c5976dcae817401a0c1e1fc24c4959687644bf87f85cdc866cb076dfade4d7465840bb7f3cb4249ecca1abb2529fc55cd275946bece1f448
-
SSDEEP
24576:1DNOvwRI2Ud5GniNdjETQ0bLaFjfD59x3SZ/10OWTBGVsLJvsyi7:1DaN/DNdjEE3tPSH0LBGVsLdb
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/2692-0-0x0000000000C20000-0x0000000000F2C000-memory.dmp upx behavioral2/memory/2692-45-0x0000000000C20000-0x0000000000F2C000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2692 10089d117ddd2b90375f906fa9757656.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4188 2692 WerFault.exe 86 -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\10089d117ddd2b90375f906fa9757656.exe = "11001" 10089d117ddd2b90375f906fa9757656.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl 10089d117ddd2b90375f906fa9757656.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION 10089d117ddd2b90375f906fa9757656.exe -
Modifies registry class 36 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90} 10089d117ddd2b90375f906fa9757656.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\ = "Setup.Application" 10089d117ddd2b90375f906fa9757656.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\InprocHandler32\ = "ole32.dll" 10089d117ddd2b90375f906fa9757656.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0\HELPDIR 10089d117ddd2b90375f906fa9757656.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\TypeLib\Version = "1.0" 10089d117ddd2b90375f906fa9757656.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\ProgID 10089d117ddd2b90375f906fa9757656.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\ProgID\ = "Setup.Application" 10089d117ddd2b90375f906fa9757656.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0\FLAGS 10089d117ddd2b90375f906fa9757656.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\ = "ISetup" 10089d117ddd2b90375f906fa9757656.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\TypeLib\ = "{F126C9FC-9299-40F2-BD42-C59023AD1E7F}" 10089d117ddd2b90375f906fa9757656.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0 10089d117ddd2b90375f906fa9757656.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0\FLAGS\ = "0" 10089d117ddd2b90375f906fa9757656.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967} 10089d117ddd2b90375f906fa9757656.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\ = "ISetup" 10089d117ddd2b90375f906fa9757656.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\TypeLib\ = "{F126C9FC-9299-40F2-BD42-C59023AD1E7F}" 10089d117ddd2b90375f906fa9757656.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\TypeLib 10089d117ddd2b90375f906fa9757656.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Setup.Application\CLSID\ = "{017E057B-DACF-4A07-B878-E294565E3F90}" 10089d117ddd2b90375f906fa9757656.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\InprocHandler32 10089d117ddd2b90375f906fa9757656.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\LocalServer32 10089d117ddd2b90375f906fa9757656.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0\0\win32 10089d117ddd2b90375f906fa9757656.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10089d117ddd2b90375f906fa9757656.exe" 10089d117ddd2b90375f906fa9757656.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\ProxyStubClsid32 10089d117ddd2b90375f906fa9757656.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967} 10089d117ddd2b90375f906fa9757656.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Setup.Application 10089d117ddd2b90375f906fa9757656.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Setup.Application\ = "Setup.Application" 10089d117ddd2b90375f906fa9757656.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F} 10089d117ddd2b90375f906fa9757656.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0\ = "Setup" 10089d117ddd2b90375f906fa9757656.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\TypeLib 10089d117ddd2b90375f906fa9757656.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\ProxyStubClsid32 10089d117ddd2b90375f906fa9757656.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0\HELPDIR\ 10089d117ddd2b90375f906fa9757656.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" 10089d117ddd2b90375f906fa9757656.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\TypeLib\Version = "1.0" 10089d117ddd2b90375f906fa9757656.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" 10089d117ddd2b90375f906fa9757656.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Setup.Application\CLSID 10089d117ddd2b90375f906fa9757656.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\LocalServer32\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\10089d117ddd2b90375f906fa9757656.exe\"" 10089d117ddd2b90375f906fa9757656.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0\0 10089d117ddd2b90375f906fa9757656.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2692 10089d117ddd2b90375f906fa9757656.exe 2692 10089d117ddd2b90375f906fa9757656.exe 2692 10089d117ddd2b90375f906fa9757656.exe 2692 10089d117ddd2b90375f906fa9757656.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2692 10089d117ddd2b90375f906fa9757656.exe 2692 10089d117ddd2b90375f906fa9757656.exe 2692 10089d117ddd2b90375f906fa9757656.exe 2692 10089d117ddd2b90375f906fa9757656.exe 2692 10089d117ddd2b90375f906fa9757656.exe 2692 10089d117ddd2b90375f906fa9757656.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\10089d117ddd2b90375f906fa9757656.exe"C:\Users\Admin\AppData\Local\Temp\10089d117ddd2b90375f906fa9757656.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2692 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 24802⤵
- Program crash
PID:4188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2692 -ip 26921⤵PID:5028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
114KB
MD566e54644c10dffe878cf7aa17584d330
SHA1430a2661767c0572246f4e1fbe8bfbb6bf277547
SHA256df5e5f6125c8f524b4f21e4cde233b25fe24fa266a1f80a15f999fb96ad31886
SHA51258ecc1f323c1610afac8a1f9f544301a8422c07dac06f7cd1740478f49ce882682ff7e22be60b47e69f64ce88efafde5b8cc5db395ef888156ca464941b6b884