Analysis
-
max time kernel
162s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 19:36
Static task
static1
Behavioral task
behavioral1
Sample
401c443e691b39e3e63d43b45f5a30b36033edd23282589946e2fc14598156a2.exe
Resource
win7-20240221-en
General
-
Target
401c443e691b39e3e63d43b45f5a30b36033edd23282589946e2fc14598156a2.exe
-
Size
3.8MB
-
MD5
3a30def6c4e65b6313916965985ee60f
-
SHA1
9d30881960758dd82ee1af383dd931cec5e5dfd7
-
SHA256
401c443e691b39e3e63d43b45f5a30b36033edd23282589946e2fc14598156a2
-
SHA512
6ad563ebccdcb6d9d1e3c9f585531d8346defdb7500e537e28a7db1c85907fc43638c6f33c89e7f969b2b618899746331602da996b945e9700a85e733a817155
-
SSDEEP
98304:JOwS+IkEaXDK9jRPqFlbh7GS1IAPpOEWbaMP2yoF:ghk891PqFF7rPp2syoF
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\Control Panel\International\Geo\Nation 401c443e691b39e3e63d43b45f5a30b36033edd23282589946e2fc14598156a2.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3316 401c443e691b39e3e63d43b45f5a30b36033edd23282589946e2fc14598156a2.exe 3316 401c443e691b39e3e63d43b45f5a30b36033edd23282589946e2fc14598156a2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3316 401c443e691b39e3e63d43b45f5a30b36033edd23282589946e2fc14598156a2.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 3316 401c443e691b39e3e63d43b45f5a30b36033edd23282589946e2fc14598156a2.exe 3316 401c443e691b39e3e63d43b45f5a30b36033edd23282589946e2fc14598156a2.exe 3316 401c443e691b39e3e63d43b45f5a30b36033edd23282589946e2fc14598156a2.exe 3316 401c443e691b39e3e63d43b45f5a30b36033edd23282589946e2fc14598156a2.exe 3316 401c443e691b39e3e63d43b45f5a30b36033edd23282589946e2fc14598156a2.exe 3316 401c443e691b39e3e63d43b45f5a30b36033edd23282589946e2fc14598156a2.exe 3316 401c443e691b39e3e63d43b45f5a30b36033edd23282589946e2fc14598156a2.exe 3316 401c443e691b39e3e63d43b45f5a30b36033edd23282589946e2fc14598156a2.exe 3316 401c443e691b39e3e63d43b45f5a30b36033edd23282589946e2fc14598156a2.exe 3316 401c443e691b39e3e63d43b45f5a30b36033edd23282589946e2fc14598156a2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\401c443e691b39e3e63d43b45f5a30b36033edd23282589946e2fc14598156a2.exe"C:\Users\Admin\AppData\Local\Temp\401c443e691b39e3e63d43b45f5a30b36033edd23282589946e2fc14598156a2.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3316