Analysis
-
max time kernel
93s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-10-2024 20:24
Static task
static1
Behavioral task
behavioral1
Sample
38f14c76ddd768139f9f3b997642faa07e93d9da00d74a24f9c028348380f4f1N.exe
Resource
win7-20240903-en
General
-
Target
38f14c76ddd768139f9f3b997642faa07e93d9da00d74a24f9c028348380f4f1N.exe
-
Size
3.9MB
-
MD5
5abb7e5df71fc2e43d508cde6c00cb50
-
SHA1
5711c8c4de192e187820cca35e8b91094f5e1f51
-
SHA256
38f14c76ddd768139f9f3b997642faa07e93d9da00d74a24f9c028348380f4f1
-
SHA512
fef56f75384d7c80915d84a3df202df33a1b4aa7d5b36d398408bce6d1cc950ba2ba52c5a6d547af0d5158c8ff6a890e5e3b3e4eec43a091d5d964f54cd46484
-
SSDEEP
98304:q6666666666666666666666666666666x666666666666666fwwwwwwwwwwwwwwf:PXpqm+2l75t+mXNqMmDcI3CY
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 38f14c76ddd768139f9f3b997642faa07e93d9da00d74a24f9c028348380f4f1N.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 38f14c76ddd768139f9f3b997642faa07e93d9da00d74a24f9c028348380f4f1N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 38f14c76ddd768139f9f3b997642faa07e93d9da00d74a24f9c028348380f4f1N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 38f14c76ddd768139f9f3b997642faa07e93d9da00d74a24f9c028348380f4f1N.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3320 wrote to memory of 4324 3320 38f14c76ddd768139f9f3b997642faa07e93d9da00d74a24f9c028348380f4f1N.exe 86 PID 3320 wrote to memory of 4324 3320 38f14c76ddd768139f9f3b997642faa07e93d9da00d74a24f9c028348380f4f1N.exe 86 PID 3320 wrote to memory of 4324 3320 38f14c76ddd768139f9f3b997642faa07e93d9da00d74a24f9c028348380f4f1N.exe 86 PID 4324 wrote to memory of 1668 4324 38f14c76ddd768139f9f3b997642faa07e93d9da00d74a24f9c028348380f4f1N.exe 88 PID 4324 wrote to memory of 1668 4324 38f14c76ddd768139f9f3b997642faa07e93d9da00d74a24f9c028348380f4f1N.exe 88 PID 4324 wrote to memory of 1668 4324 38f14c76ddd768139f9f3b997642faa07e93d9da00d74a24f9c028348380f4f1N.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\38f14c76ddd768139f9f3b997642faa07e93d9da00d74a24f9c028348380f4f1N.exe"C:\Users\Admin\AppData\Local\Temp\38f14c76ddd768139f9f3b997642faa07e93d9da00d74a24f9c028348380f4f1N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Users\Admin\AppData\Local\Temp\38f14c76ddd768139f9f3b997642faa07e93d9da00d74a24f9c028348380f4f1N.exe"C:\Users\Admin\AppData\Local\Temp\38f14c76ddd768139f9f3b997642faa07e93d9da00d74a24f9c028348380f4f1N.exe" --verbose-logging --run-as-admin --target-path="C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application" --child-setup-process --restart-as-admin-time=4781648962⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\38f14c76ddd768139f9f3b997642faa07e93d9da00d74a24f9c028348380f4f1N.exeC:\Users\Admin\AppData\Local\Temp\38f14c76ddd768139f9f3b997642faa07e93d9da00d74a24f9c028348380f4f1N.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Crashpad" --url=https://crash-reports.browser.yandex.net/submit --annotation=machine_id=488dca4c15f9a1d330ad312b391a804e --annotation=main_process_pid=4324 --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=24.7.4.1317 --initial-client-data=0x2b0,0x2b4,0x2b8,0x28c,0x2bc,0xf6ad40,0xf6ad4c,0xf6ad583⤵
- System Location Discovery: System Language Discovery
PID:1668
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f4ef5d0f33e9032873d66d3c42be7b9c
SHA1341f92054eb703003d89577b0e64d09283f73690
SHA256585d4d23d760c60b4d98bc2edfd54369818868bea1844ffd98900ca8080fc5d4
SHA512c78c3262b405a2399d06277130e2e69487e374e93097088a4a853ffddbf5ab10ee48b4ddd7e83a6f998e9fc048233ebec4eeabbf983e5395b4084e0891f5b1c2