Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2024, 15:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a2364c627233021a3c9d492abdfd6da1.exe
Resource
win7-20240220-en
5 signatures
150 seconds
General
-
Target
a2364c627233021a3c9d492abdfd6da1.exe
-
Size
64KB
-
MD5
a2364c627233021a3c9d492abdfd6da1
-
SHA1
7ec5fb7727a07e2e2f1af04f52a068895a6ce136
-
SHA256
65bd0e820d8c59aa8e2336d8d4d11877c65ccb261fe5b0cd81dfe845a37e4e20
-
SHA512
65ff36eab270434931a20aba5ac66dbb9b7644aed357d7a46fc14154638a74365322928649527c6d6a7b51b042dd68ead6a9d39b3d6299eac27aa1f19fea2467
-
SSDEEP
1536:O9xk6FeeINxwnJM1X+1epqLeL4wmrn0L3thzrxQwFeJ:e/FeJ1O0pGWmADffx1eJ
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List a2364c627233021a3c9d492abdfd6da1.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile a2364c627233021a3c9d492abdfd6da1.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications a2364c627233021a3c9d492abdfd6da1.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\a2364c627233021a3c9d492abdfd6da1.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\a2364c627233021a3c9d492abdfd6da1.exe:*:Enabled:ldrsoft" a2364c627233021a3c9d492abdfd6da1.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4344 1928 WerFault.exe 83 1972 1928 WerFault.exe 83 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1928 a2364c627233021a3c9d492abdfd6da1.exe 1928 a2364c627233021a3c9d492abdfd6da1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2364c627233021a3c9d492abdfd6da1.exe"C:\Users\Admin\AppData\Local\Temp\a2364c627233021a3c9d492abdfd6da1.exe"1⤵
- Modifies firewall policy service
- Suspicious behavior: EnumeratesProcesses
PID:1928 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1928 -s 11162⤵
- Program crash
PID:4344
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1928 -s 11562⤵
- Program crash
PID:1972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1928 -ip 19281⤵PID:228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1928 -ip 19281⤵PID:1812