Analysis
-
max time kernel
140s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 01:13
Behavioral task
behavioral1
Sample
09b58aa45b6f20e01306ed429c389dc0.exe
Resource
win7-20231129-en
General
-
Target
09b58aa45b6f20e01306ed429c389dc0.exe
-
Size
1.0MB
-
MD5
09b58aa45b6f20e01306ed429c389dc0
-
SHA1
6cdc0c487ecb7d6dc216ae9e9db84fe8e6282178
-
SHA256
14357c3c693fc3d373615e7404659f3c74430e5172f38d40b29b679568593d5c
-
SHA512
a7a4183ac69ad1e4f5bbea6544b3fb101f9978d615961f6b14f07ed72cd4cb22666f567724257a01f4f46db4c36bbc21a4192a215d1ff81d49cb52cb2f5a6477
-
SSDEEP
24576:KUDrUESIbjror2ahLIYOPJPiKY2houGHox6Hk+UcwlyV0:gpI7ohUYOPcL2hbkKYUO
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/1248-0-0x00000000002E0000-0x0000000000587000-memory.dmp upx behavioral2/memory/1248-2-0x00000000002E0000-0x0000000000587000-memory.dmp upx behavioral2/memory/1248-12-0x00000000002E0000-0x0000000000587000-memory.dmp upx behavioral2/memory/1248-13-0x00000000002E0000-0x0000000000587000-memory.dmp upx behavioral2/memory/1248-14-0x00000000002E0000-0x0000000000587000-memory.dmp upx behavioral2/memory/1248-15-0x00000000002E0000-0x0000000000587000-memory.dmp upx behavioral2/memory/1248-16-0x00000000002E0000-0x0000000000587000-memory.dmp upx behavioral2/memory/1248-21-0x00000000002E0000-0x0000000000587000-memory.dmp upx behavioral2/memory/1248-22-0x00000000002E0000-0x0000000000587000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\09b58aa45b6f20e01306ed429c389dc0.exe = "10000" 09b58aa45b6f20e01306ed429c389dc0.exe -
Modifies registry class 36 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Setup.Application\CLSID\ = "{017E057B-DACF-4A07-B878-E294565E3F90}" 09b58aa45b6f20e01306ed429c389dc0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\ProgID 09b58aa45b6f20e01306ed429c389dc0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0\ = "Setup" 09b58aa45b6f20e01306ed429c389dc0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0\FLAGS\ = "0" 09b58aa45b6f20e01306ed429c389dc0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\TypeLib 09b58aa45b6f20e01306ed429c389dc0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F} 09b58aa45b6f20e01306ed429c389dc0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0\0\win32 09b58aa45b6f20e01306ed429c389dc0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\TypeLib\ = "{F126C9FC-9299-40F2-BD42-C59023AD1E7F}" 09b58aa45b6f20e01306ed429c389dc0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0\HELPDIR\ 09b58aa45b6f20e01306ed429c389dc0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\ProxyStubClsid32 09b58aa45b6f20e01306ed429c389dc0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\ = "ISetup" 09b58aa45b6f20e01306ed429c389dc0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" 09b58aa45b6f20e01306ed429c389dc0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90} 09b58aa45b6f20e01306ed429c389dc0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\ = "Setup.Application" 09b58aa45b6f20e01306ed429c389dc0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\InprocHandler32 09b58aa45b6f20e01306ed429c389dc0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0 09b58aa45b6f20e01306ed429c389dc0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Setup.Application\CLSID 09b58aa45b6f20e01306ed429c389dc0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\09b58aa45b6f20e01306ed429c389dc0.exe" 09b58aa45b6f20e01306ed429c389dc0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\09b58aa45b6f20e01306ed429c389dc0.exe" 09b58aa45b6f20e01306ed429c389dc0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\ProxyStubClsid32 09b58aa45b6f20e01306ed429c389dc0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" 09b58aa45b6f20e01306ed429c389dc0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\TypeLib 09b58aa45b6f20e01306ed429c389dc0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967} 09b58aa45b6f20e01306ed429c389dc0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\ = "ISetup" 09b58aa45b6f20e01306ed429c389dc0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Setup.Application 09b58aa45b6f20e01306ed429c389dc0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Setup.Application\ = "Setup.Application" 09b58aa45b6f20e01306ed429c389dc0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\InprocHandler32\ = "ole32.dll" 09b58aa45b6f20e01306ed429c389dc0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967} 09b58aa45b6f20e01306ed429c389dc0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\TypeLib\ = "{F126C9FC-9299-40F2-BD42-C59023AD1E7F}" 09b58aa45b6f20e01306ed429c389dc0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\TypeLib\Version = "1.0" 09b58aa45b6f20e01306ed429c389dc0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0\HELPDIR 09b58aa45b6f20e01306ed429c389dc0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\TypeLib\Version = "1.0" 09b58aa45b6f20e01306ed429c389dc0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\ProgID\ = "Setup.Application" 09b58aa45b6f20e01306ed429c389dc0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\LocalServer32 09b58aa45b6f20e01306ed429c389dc0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0\FLAGS 09b58aa45b6f20e01306ed429c389dc0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0\0 09b58aa45b6f20e01306ed429c389dc0.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1248 09b58aa45b6f20e01306ed429c389dc0.exe 1248 09b58aa45b6f20e01306ed429c389dc0.exe 1248 09b58aa45b6f20e01306ed429c389dc0.exe 1248 09b58aa45b6f20e01306ed429c389dc0.exe 1248 09b58aa45b6f20e01306ed429c389dc0.exe 1248 09b58aa45b6f20e01306ed429c389dc0.exe 1248 09b58aa45b6f20e01306ed429c389dc0.exe 1248 09b58aa45b6f20e01306ed429c389dc0.exe 1248 09b58aa45b6f20e01306ed429c389dc0.exe 1248 09b58aa45b6f20e01306ed429c389dc0.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91B
MD599bde3452748e34d6c50275110a6a8d4
SHA1e79cb2a8db7d8490523529d3861f95ba73a20c23
SHA256d07311acf641866e7e84823d2962f593bb655792301dc61ad6f0c6869d9c5937
SHA51219fd529c6fe60bbbe3710fed93f14d723a13ad427431f855ed84f5e5e496b9f3eb8a6e8c31d740239eb225753d52a4f464b489fdbdeff4477480026263d0f691