Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/03/2024, 02:52
Static task
static1
Behavioral task
behavioral1
Sample
ca4bafb468ddee82d6f556a07cff4c93.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ca4bafb468ddee82d6f556a07cff4c93.exe
Resource
win10v2004-20231215-en
General
-
Target
ca4bafb468ddee82d6f556a07cff4c93.exe
-
Size
815KB
-
MD5
ca4bafb468ddee82d6f556a07cff4c93
-
SHA1
0674c67431788b40335b753b4048b78607e10727
-
SHA256
71fbaf25bcee1f641ecf78b6870636cf8bc30211520660049b186e366becbba9
-
SHA512
207b790b333903128d48faa97803bcb68bdc31fdb7fc48d038c35393cfaf07c6cf8712bda171fa473ab831f1b9cabc160d8bc5900b4fecd70302f11b00916961
-
SSDEEP
12288:JKXaevz54EPGyNGJQfaWrd0N+CCb3YPXx9BBsXJAgl1k8odxwyYKytRUsCnTHALw:Jm9rNGK+NyI9RL8oRYftHCnTHAZa
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/3064-2-0x0000000000400000-0x000000000063D000-memory.dmp upx behavioral1/memory/3064-3-0x0000000000400000-0x000000000063D000-memory.dmp upx behavioral1/memory/3064-4-0x0000000000400000-0x000000000063D000-memory.dmp upx behavioral1/memory/3064-5-0x0000000000400000-0x000000000063D000-memory.dmp upx behavioral1/memory/3064-6-0x0000000000400000-0x000000000063D000-memory.dmp upx behavioral1/memory/3064-21-0x0000000000400000-0x000000000063D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AmdAgent = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ca4bafb468ddee82d6f556a07cff4c93.exe" ca4bafb468ddee82d6f556a07cff4c93.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ca4bafb468ddee82d6f556a07cff4c93.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ca4bafb468ddee82d6f556a07cff4c93.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ca4bafb468ddee82d6f556a07cff4c93.exe