Analysis

  • max time kernel
    152s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2022 23:12

General

  • Target

    cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe

  • Size

    502KB

  • MD5

    48bc4417944fb1d7d4c06e584522c351

  • SHA1

    3cc037607d1623521b4abca89a89766b98e37f47

  • SHA256

    cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855

  • SHA512

    be1cffaf5a205940255286cfdefde421e6113445a11fda62af84c30db2136473d1712bb67a8eee5cfb31cdc228f90a29669e87e474452c784a8bb510d0ded61f

  • SSDEEP

    12288:WtIZm20uiIK9Q2qjQxUqKeuBu9+CNwFdJzvfNf1R:WWZm2dDKK2KiUjeuM9+XhbfNf1

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 1 IoCs
  • Enumerates connected drives 3 TTPs 15 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 36 IoCs
  • Drops file in Program Files directory 16 IoCs
  • Drops file in Windows directory 29 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe
    "C:\Users\Admin\AppData\Local\Temp\cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe"
    1⤵
    • Drops Chrome extension
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:912
  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:1304
  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:2000
  • C:\Windows\system32\dllhost.exe
    C:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}
    1⤵
    • Drops file in Windows directory
    PID:784
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1636
  • C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
    1⤵
    • Executes dropped EXE
    • Windows security modification
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1488

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE

    Filesize

    316KB

    MD5

    3c304b808c5ddf138e61bf6a0b31cc97

    SHA1

    1d81dd80151633322fbbfde6cadba4a48034062e

    SHA256

    e247c4975d9634576631de69632d3b91da759e1535a85cf35b5aa911ad58e414

    SHA512

    8cc32f6e4492355786218f1cb9d78db04b2fd178b3550f9f787b9b6350d56293ca0cf2871bf4ac15c7fd94e4bada22cfdb4b3b25649741e593fa253f17de21a2

  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe

    Filesize

    235KB

    MD5

    99b2b1381568c4202666650922454a60

    SHA1

    276e3408a1134d0089dc570507d3209dba201cc5

    SHA256

    95defd7f1aea9e0d8101c9fd3b0d5ad734ad47543ca43584db8674e43cd1956e

    SHA512

    b37adad81d315a999e272eebf6a57d82f250a22192221da70f43d9b08c550b8cf34e9762375dd89302c602a5f66461ae9c7e6c931e4e1e2ce6f74fb5fc8c493e

  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe

    Filesize

    235KB

    MD5

    99b2b1381568c4202666650922454a60

    SHA1

    276e3408a1134d0089dc570507d3209dba201cc5

    SHA256

    95defd7f1aea9e0d8101c9fd3b0d5ad734ad47543ca43584db8674e43cd1956e

    SHA512

    b37adad81d315a999e272eebf6a57d82f250a22192221da70f43d9b08c550b8cf34e9762375dd89302c602a5f66461ae9c7e6c931e4e1e2ce6f74fb5fc8c493e

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    266KB

    MD5

    3298fc2f2209b74663a24c5cf778a64c

    SHA1

    af8d95bb4fcff262df7a293f24da6d2964821c74

    SHA256

    84aa37329df36b1cd55332a3545d961f5c489c7bacbe806161e3d94fd3ee11ce

    SHA512

    17e891d832003f833a0af6d7e1d2dada8242c00bffefcd93aa58bf0a9e7437170ddcdf74a3a51aad70bfdb78a84de76c62ff220862ce2033bd3d5da6f99a571c

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    266KB

    MD5

    3298fc2f2209b74663a24c5cf778a64c

    SHA1

    af8d95bb4fcff262df7a293f24da6d2964821c74

    SHA256

    84aa37329df36b1cd55332a3545d961f5c489c7bacbe806161e3d94fd3ee11ce

    SHA512

    17e891d832003f833a0af6d7e1d2dada8242c00bffefcd93aa58bf0a9e7437170ddcdf74a3a51aad70bfdb78a84de76c62ff220862ce2033bd3d5da6f99a571c

  • \??\c:\program files (x86)\microsoft office\office14\groove.exe

    Filesize

    29.7MB

    MD5

    19e0cdafa5a27fcd196128afaab6e2fe

    SHA1

    5e6537822f6016f709364e4a461e8ad8e59abf58

    SHA256

    6a74ecf390af877069cb9d0ebc06b3438324837840e61baff179d4605217e381

    SHA512

    d190bbd6a18ca901506a3f9d0ab24ab1a8227056f71402ac557acc10c1b10fa0ce90cbfa511d89e0f78bea979dde48e6df6a860fddf252d8024bcc8787fcf566

  • \??\c:\windows\SysWOW64\searchindexer.exe

    Filesize

    594KB

    MD5

    efb602b35adc72a29fde7ab631934ca2

    SHA1

    63bdb9db1f3a0416ad07e3e9faa660fafa0ec01a

    SHA256

    2b849e3cc024896bb892e3a1161781bb14689740d29548034cb2093e1b97a405

    SHA512

    95635e9ef632e9d9eb38e148385e604dcb1688a03293e3cdba56de75b701dc7022886f437efb33e00890305d249dfe3073521bc9619d841c57d688d951f2611b

  • \??\c:\windows\SysWOW64\svchost.exe

    Filesize

    196KB

    MD5

    3607d2868822d63dcfa33bc1e53ce66b

    SHA1

    b7a077f9b65973f7873a5371466bf2d3a0e0e9b1

    SHA256

    56fcc5535412afac570e772c39cc19fc7feb8b15d3b0690fc7a1f35ab379045d

    SHA512

    6a6e21a93f55d39adb7cfac6a1ac8a12c02c57f1ccd78698c0660533d97b4ae246ead64094c62a1b66b0da5a74e2b5b89952913b3ff2f1aca92426780001b1fe

  • memory/912-56-0x0000000076091000-0x0000000076093000-memory.dmp

    Filesize

    8KB

  • memory/912-54-0x0000000001000000-0x00000000010CB000-memory.dmp

    Filesize

    812KB

  • memory/912-55-0x0000000001000000-0x00000000010CB000-memory.dmp

    Filesize

    812KB

  • memory/1304-58-0x0000000010000000-0x0000000010087000-memory.dmp

    Filesize

    540KB

  • memory/1304-60-0x0000000010000000-0x0000000010087000-memory.dmp

    Filesize

    540KB

  • memory/1488-68-0x000000002E000000-0x000000002E09D000-memory.dmp

    Filesize

    628KB

  • memory/1488-67-0x000000002E000000-0x000000002E09D000-memory.dmp

    Filesize

    628KB

  • memory/1488-71-0x000000002E000000-0x000000002E09D000-memory.dmp

    Filesize

    628KB

  • memory/1636-65-0x000007FEFBCA1000-0x000007FEFBCA3000-memory.dmp

    Filesize

    8KB

  • memory/2000-64-0x0000000000400000-0x0000000000490000-memory.dmp

    Filesize

    576KB

  • memory/2000-63-0x0000000000400000-0x0000000000490000-memory.dmp

    Filesize

    576KB