Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14/02/2024, 08:14
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
9b2d2052fa43b3c0473337da75c0f2b1.exe
Resource
win7-20231215-en
6 signatures
150 seconds
General
-
Target
9b2d2052fa43b3c0473337da75c0f2b1.exe
-
Size
77KB
-
MD5
9b2d2052fa43b3c0473337da75c0f2b1
-
SHA1
b6802c11491fe9a64e41ede917a3c11fc5921ccb
-
SHA256
b98e6cad8ae08d6c7dc06e6075735fe7b9d0443044291d9ecff5f6570a09ac1d
-
SHA512
43c3b807641f988eb62c785c0d1c769a169f71617fd34ffe8e7c08cfbb0ec1d0367b41c213fce383a24a536f182159a31c456da5d57bba0ec7bfb0fecedbdfb5
-
SSDEEP
1536:raHLtZfByDUJuSkZWeGkqbT3ckFqtWUOQv2HqgVIZKzKAIRPwtuYwPw:raHzB+UJBOQksAkItqQvSVIAzx4wtYo
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1948 set thread context of 2080 1948 9b2d2052fa43b3c0473337da75c0f2b1.exe 28 -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\SuggestionsURLFallback = "http://www.google.com/cse?cx=partner-pub-9588033570232632:rhmyra-cwbb&q={searchTerms}" 9b2d2052fa43b3c0473337da75c0f2b1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\URL = "http://www.google.com/cse?cx=partner-pub-9588033570232632:rhmyra-cwbb&q={searchTerms}" 9b2d2052fa43b3c0473337da75c0f2b1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\DisplayName = "Google" 9b2d2052fa43b3c0473337da75c0f2b1.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main 9b2d2052fa43b3c0473337da75c0f2b1.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes 9b2d2052fa43b3c0473337da75c0f2b1.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadUpdates = "398336" 9b2d2052fa43b3c0473337da75c0f2b1.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} 9b2d2052fa43b3c0473337da75c0f2b1.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "file://localhost/C:/www.google.com.htm" 9b2d2052fa43b3c0473337da75c0f2b1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2080 9b2d2052fa43b3c0473337da75c0f2b1.exe 2080 9b2d2052fa43b3c0473337da75c0f2b1.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1948 wrote to memory of 2080 1948 9b2d2052fa43b3c0473337da75c0f2b1.exe 28 PID 1948 wrote to memory of 2080 1948 9b2d2052fa43b3c0473337da75c0f2b1.exe 28 PID 1948 wrote to memory of 2080 1948 9b2d2052fa43b3c0473337da75c0f2b1.exe 28 PID 1948 wrote to memory of 2080 1948 9b2d2052fa43b3c0473337da75c0f2b1.exe 28 PID 1948 wrote to memory of 2080 1948 9b2d2052fa43b3c0473337da75c0f2b1.exe 28 PID 1948 wrote to memory of 2080 1948 9b2d2052fa43b3c0473337da75c0f2b1.exe 28 PID 1948 wrote to memory of 2080 1948 9b2d2052fa43b3c0473337da75c0f2b1.exe 28 PID 2080 wrote to memory of 1212 2080 9b2d2052fa43b3c0473337da75c0f2b1.exe 14 PID 2080 wrote to memory of 1212 2080 9b2d2052fa43b3c0473337da75c0f2b1.exe 14 PID 2080 wrote to memory of 1212 2080 9b2d2052fa43b3c0473337da75c0f2b1.exe 14 PID 2080 wrote to memory of 1212 2080 9b2d2052fa43b3c0473337da75c0f2b1.exe 14
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\9b2d2052fa43b3c0473337da75c0f2b1.exe"C:\Users\Admin\AppData\Local\Temp\9b2d2052fa43b3c0473337da75c0f2b1.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\9b2d2052fa43b3c0473337da75c0f2b1.exeC:\Users\Admin\AppData\Local\Temp\9b2d2052fa43b3c0473337da75c0f2b1.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2080
-
-