Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
06/01/2024, 15:59
Static task
static1
Behavioral task
behavioral1
Sample
46a0bc120953b1e430c919dc10831ca6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
46a0bc120953b1e430c919dc10831ca6.exe
Resource
win10v2004-20231222-en
General
-
Target
46a0bc120953b1e430c919dc10831ca6.exe
-
Size
787KB
-
MD5
46a0bc120953b1e430c919dc10831ca6
-
SHA1
268795b472f1d5a524ba7cdac499254645e12e5c
-
SHA256
5b7075dab6a13dab589f1d9fc80efa7c1a3cf6b4793cf8448f55ff70bce7162d
-
SHA512
a1387e41329c2087e5ab610781e9e39676f15756f25238edeed9431d39f956346677a2ae15fe7ef6a6a47004a91fd97f3873c83ab0a57c25cd0c6f8022053a21
-
SSDEEP
24576:rDxK0A5yOSPNxoe45BIbklZXEbiMpFLPLu:r456PEBIQl0DpFri
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2976-0-0x0000000000400000-0x00000000006FC000-memory.dmp upx behavioral1/memory/2976-4-0x0000000000400000-0x00000000006FC000-memory.dmp upx behavioral1/memory/2976-6-0x0000000000400000-0x00000000006FC000-memory.dmp upx behavioral1/memory/2976-5-0x0000000000400000-0x00000000006FC000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AmdAgent = "C:\\Users\\Admin\\AppData\\Local\\Temp\\46a0bc120953b1e430c919dc10831ca6.exe" 46a0bc120953b1e430c919dc10831ca6.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 46a0bc120953b1e430c919dc10831ca6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 46a0bc120953b1e430c919dc10831ca6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 46a0bc120953b1e430c919dc10831ca6.exe