Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 14:14
Static task
static1
Behavioral task
behavioral1
Sample
74da59a02bda4187b6dfd064e9c3c398.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
74da59a02bda4187b6dfd064e9c3c398.exe
Resource
win10v2004-20231215-en
General
-
Target
74da59a02bda4187b6dfd064e9c3c398.exe
-
Size
789KB
-
MD5
74da59a02bda4187b6dfd064e9c3c398
-
SHA1
42709e861c447df02dec4197804d7efaa72c7606
-
SHA256
40f155eb123c55ee7a2a988729d1f373c22c971044e3b0dcda65f719fe66aeab
-
SHA512
5ec1cc9ea33bd3e42ae0f090e7543f41462f2950113162fa8a4316ef88e42b96689e48164996d81ca52ac93f0bbb57b3f7fbbe3f9fc2f730510baf8713ed455c
-
SSDEEP
24576:dx9pGLmU3n26/Z/OMP5uAERALR7JQWcfI5lTCmEx:H9UG6R/P5rERydxcQTEx
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2548-1-0x0000000000400000-0x000000000063D000-memory.dmp upx behavioral1/memory/2548-3-0x0000000000400000-0x000000000063D000-memory.dmp upx behavioral1/memory/2548-4-0x0000000000400000-0x000000000063D000-memory.dmp upx behavioral1/memory/2548-5-0x0000000000400000-0x000000000063D000-memory.dmp upx behavioral1/memory/2548-6-0x0000000000400000-0x000000000063D000-memory.dmp upx behavioral1/memory/2548-13-0x0000000000400000-0x000000000063D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AmdAgent = "C:\\Users\\Admin\\AppData\\Local\\Temp\\74da59a02bda4187b6dfd064e9c3c398.exe" 74da59a02bda4187b6dfd064e9c3c398.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 74da59a02bda4187b6dfd064e9c3c398.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 74da59a02bda4187b6dfd064e9c3c398.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 74da59a02bda4187b6dfd064e9c3c398.exe