Analysis

  • max time kernel
    185s
  • max time network
    216s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-10-2022 14:36

General

  • Target

    af0e5864e82de8893baffed008b38631fb333165052295ec63b005c5d5bf0c77.exe

  • Size

    252KB

  • MD5

    71962a4197aa974e3f15702e182fe643

  • SHA1

    7c2ca77e5383ada71582db12ba3c361981120147

  • SHA256

    af0e5864e82de8893baffed008b38631fb333165052295ec63b005c5d5bf0c77

  • SHA512

    dc819f284849a43345e0d9d25dac1a03eebd75d09faf8cc70e7fa7f5dddccfb8f8f235812e9e2ef2d52088b0a34b5feb1bdc0c2b49b00af9f0a58419ac4416fd

  • SSDEEP

    6144:91OgDPdkBAFZWjadD4sEPCeb5TSQpNocNMhGiuMG:91OgLdaPKm5TxyhM/MG

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 4 IoCs
  • Modifies registry class 63 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\af0e5864e82de8893baffed008b38631fb333165052295ec63b005c5d5bf0c77.exe
    "C:\Users\Admin\AppData\Local\Temp\af0e5864e82de8893baffed008b38631fb333165052295ec63b005c5d5bf0c77.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3068
    • C:\Users\Admin\AppData\Local\Temp\7zS72CE.tmp\setup.exe
      .\setup.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      • System policy modification
      PID:216

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Codecv\bhoclass.dll

    Filesize

    139KB

    MD5

    4b35f6c1f932f52fa9901fbc47b432df

    SHA1

    8e842bf068b04f36475a3bf86c5ea6a9839bbb5e

    SHA256

    2b4d643a8a14f060bf3885f872b36e5e1fe1e777ad94783ba9593487c8e1f196

    SHA512

    8716b9a8e46933bf29348254a68d1a21392bdbbe3b4d5010e55fe638d02cc04eb685e424d440f7c5b58ffbca82e5772dd95bef73fa831595c2ae9599f3b05a99

  • C:\Users\Admin\AppData\Local\Temp\7zS72CE.tmp\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    3b6e06799baaa32d333a65da63ba594a

    SHA1

    fec0a9288aabed65592ab2ff02677488a8f9143a

    SHA256

    42549b70eea60da2534bda771c61c0dc0a5da9f29b95dcdb158a25d3bd2f78e9

    SHA512

    0998b11a2226411547e917f3076075aff1429514f0a5379c059ea791309daccf1bad4cba12ae8a99928c379cabcebe94013d00c13102b1f13e3dddadec43ab7e

  • C:\Users\Admin\AppData\Local\Temp\7zS72CE.tmp\[email protected]\chrome.manifest

    Filesize

    116B

    MD5

    be6887b3843d11bc81fd5e02e15b14ae

    SHA1

    6f2435c6aa65082b33d0586b7d3b4f7108e414fc

    SHA256

    f85582e4dfa986856db3fef0cb2088c57b925d4ba0dc5df367ef030ed795c8f6

    SHA512

    aa3c5fd658935b742bbbb133d7184934f06e148bfd4a92b0fb0310f3de212f2a663d2cda7b297ea16efa2f8c9b17e11dd389b865596181ef46083b838366528d

  • C:\Users\Admin\AppData\Local\Temp\7zS72CE.tmp\[email protected]\content\bg.js

    Filesize

    8KB

    MD5

    54e5f34560bd3eef07afed70b507f82c

    SHA1

    5080637d5dd2f6d52d14f4c2b83e0ed816048fdb

    SHA256

    c977cf7008c407b6509d4e9b29f86a3d3fbd83ed7f7184a724275802ef5978b2

    SHA512

    73a36dce9fd942f5527131ebc9017b385983853bd410b3eefc4b6b73f574162177dfce4e118b316145c0aafc29ecbfa23001fd2c001fdd67e72c68f39508acd9

  • C:\Users\Admin\AppData\Local\Temp\7zS72CE.tmp\[email protected]\content\zy.xul

    Filesize

    225B

    MD5

    adfeb0d530fffd476ce0a6cf9a24dd3f

    SHA1

    f6d4b523de49041bcde87b6c091f8d6515a0ad60

    SHA256

    a713ce1668d2433c2c78c39ea61aac10a6bfe21d7851caeb6b882e989e0a1a8c

    SHA512

    642825b7fac826c7cdbddeaf699401be614f040f3a825cf15ab1c7fb4cf92d114d1e35d5dcfea16ca79efc6954c878dc9e6bd5c65087fc7c887c48fd08cdbf3d

  • C:\Users\Admin\AppData\Local\Temp\7zS72CE.tmp\[email protected]\install.rdf

    Filesize

    713B

    MD5

    c59b3b8e58bf589cdd4f17b6e8766aef

    SHA1

    f2a18ebf4b697b70e10d0fde0acc022c8fa5cfe2

    SHA256

    8346fc50457b03afaa007c603c626ef734e784feeccea8c6d95547fee580ca98

    SHA512

    f1fe8e36cc63f8fc80de1ecb862976a2d2e29eff191887b5827243682037ff5ed790c692f5552270c5441958b504ac013e5081ebd4f44c10fe7f212267c44b4e

  • C:\Users\Admin\AppData\Local\Temp\7zS72CE.tmp\background.html

    Filesize

    5KB

    MD5

    7fab8749e895651c81775c6593c51ee3

    SHA1

    ffac76850df4bb93ff8a27856c3ffd8d1a73a834

    SHA256

    3bce05222a46fc375d5a6a5c0d63d0e7018c47ec3ddf443b37376a3cc9a26662

    SHA512

    8dbc9888c14a9cdbb8976b7dcab7c60be3c9c1c53f8846a198bc8f2c61ca8aec9126430abab24cca80e611b9a17f308d0371ae4213a76dd9a751fd90f33d9fa2

  • C:\Users\Admin\AppData\Local\Temp\7zS72CE.tmp\bhoclass.dll

    Filesize

    139KB

    MD5

    4b35f6c1f932f52fa9901fbc47b432df

    SHA1

    8e842bf068b04f36475a3bf86c5ea6a9839bbb5e

    SHA256

    2b4d643a8a14f060bf3885f872b36e5e1fe1e777ad94783ba9593487c8e1f196

    SHA512

    8716b9a8e46933bf29348254a68d1a21392bdbbe3b4d5010e55fe638d02cc04eb685e424d440f7c5b58ffbca82e5772dd95bef73fa831595c2ae9599f3b05a99

  • C:\Users\Admin\AppData\Local\Temp\7zS72CE.tmp\content.js

    Filesize

    735B

    MD5

    ee0f38dbca276f80295a08df04747111

    SHA1

    78d81084cb1d8fb12fa9378462a0f99d3cede419

    SHA256

    021833490cacc1a64e6f720708717fd1d21ba772d3256d12cda49409810924d9

    SHA512

    f43ef73fd63f01d0b542d8b3f06480f4236281c9fd898624c69b1279fb8ca0043a35e1fc82d575878b103f504c2e7ede781e791227a3361f7d89f164130242c7

  • C:\Users\Admin\AppData\Local\Temp\7zS72CE.tmp\gdigcemaonpppphldnjebjeappnjoelf.crx

    Filesize

    3KB

    MD5

    07e477369376691faf6187df36a14e4c

    SHA1

    0a190f7a3ee72a993aae6818bad7ab082fcebe23

    SHA256

    dc134a5c873ed58deeebe4240f709cf0ec95c20a5be48ce9df31d6396da41925

    SHA512

    4b5a5970a58bdcd69368dbed29c872bf84ec32719c71bb8906a28b5acca7412f32a2bbbd94a259378ea12e73cd5c8054e9d86540adcd667fdbbafeb5273105f6

  • C:\Users\Admin\AppData\Local\Temp\7zS72CE.tmp\settings.ini

    Filesize

    661B

    MD5

    853039f4e4c12415795bbfc419536bc1

    SHA1

    735adb18bbaf1636e1cebf7d4ae431ffc8cdcce1

    SHA256

    5a5c1dc785db89fb3c37a9e8fb54447012e77c7b040375485c8e4b3ede5715fc

    SHA512

    9725f643b24d152e3aace80deb4d17ecc0db9f0a3a2ad50c9aca807508f1ea98456a868d2ed94d0cb6d14477d9b6b9c4f2625d2096807be8c28775c374147fbe

  • C:\Users\Admin\AppData\Local\Temp\7zS72CE.tmp\setup.exe

    Filesize

    61KB

    MD5

    201d2311011ffdf6c762fd46cdeb52ab

    SHA1

    65c474ca42a337745e288be0e21f43ceaafd5efe

    SHA256

    15c0e4fd6091cda70fa308ea5ee956996f6eb23d24e44700bd5c74bf111cf2aa

    SHA512

    235d70114f391d9e7a319d94bdfc49665d147723379de7487ef76cfc968f7faa3191153b32ba1ab466caeeeeef4852381529a168c3acca9a8d5a26dfe0436f6b

  • C:\Users\Admin\AppData\Local\Temp\7zS72CE.tmp\setup.exe

    Filesize

    61KB

    MD5

    201d2311011ffdf6c762fd46cdeb52ab

    SHA1

    65c474ca42a337745e288be0e21f43ceaafd5efe

    SHA256

    15c0e4fd6091cda70fa308ea5ee956996f6eb23d24e44700bd5c74bf111cf2aa

    SHA512

    235d70114f391d9e7a319d94bdfc49665d147723379de7487ef76cfc968f7faa3191153b32ba1ab466caeeeeef4852381529a168c3acca9a8d5a26dfe0436f6b

  • memory/216-132-0x0000000000000000-mapping.dmp