Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 13:45
Behavioral task
behavioral1
Sample
74d87d58cb074298a76acf835d0af98f.exe
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
General
-
Target
74d87d58cb074298a76acf835d0af98f.exe
-
Size
48KB
-
MD5
74d87d58cb074298a76acf835d0af98f
-
SHA1
355be0484ce416354f196e5e41938352636f31c1
-
SHA256
8f834e363ced478910b3238b40f59ad53ba976c3bcb6100e3528b1ed98762a92
-
SHA512
26324a8929fcd04155a4d98139d6fa8d995059cddb59f546bf4e9d16eb90a3e1db1e1f04df369c69b3a4e334b8886c9d3d957e81021d12a2b68ce6df63667bf8
-
SSDEEP
768:T/xb/wki9VkSGeGOWlZe9KjGUASTp6/4+wBmwdT+5Nu:T/xD0LpGedgZeUpnTp04+kf1yNu
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\74d87d58cb074298a76acf835d0af98f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\74d87d58cb074298a76acf835d0af98f.exe:*:Enabled:ldrsoft" 74d87d58cb074298a76acf835d0af98f.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 74d87d58cb074298a76acf835d0af98f.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 74d87d58cb074298a76acf835d0af98f.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2068-1-0x0000000000400000-0x000000000145A000-memory.dmp upx behavioral1/memory/2068-2-0x0000000000400000-0x000000000145A000-memory.dmp upx behavioral1/memory/2068-3-0x0000000000400000-0x000000000145A000-memory.dmp upx behavioral1/memory/2068-4-0x0000000000400000-0x000000000145A000-memory.dmp upx behavioral1/memory/2068-8-0x0000000000400000-0x000000000145A000-memory.dmp upx behavioral1/memory/2068-12-0x0000000000400000-0x000000000145A000-memory.dmp upx behavioral1/memory/2068-16-0x0000000000400000-0x000000000145A000-memory.dmp upx