Analysis
-
max time kernel
152s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11-10-2022 23:12
Static task
static1
Behavioral task
behavioral1
Sample
cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe
Resource
win7-20220812-en
General
-
Target
cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe
-
Size
502KB
-
MD5
48bc4417944fb1d7d4c06e584522c351
-
SHA1
3cc037607d1623521b4abca89a89766b98e37f47
-
SHA256
cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855
-
SHA512
be1cffaf5a205940255286cfdefde421e6113445a11fda62af84c30db2136473d1712bb67a8eee5cfb31cdc228f90a29669e87e474452c784a8bb510d0ded61f
-
SSDEEP
12288:WtIZm20uiIK9Q2qjQxUqKeuBu9+CNwFdJzvfNf1R:WWZm2dDKK2KiUjeuM9+XhbfNf1
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1304 mscorsvw.exe 2000 mscorsvw.exe 1488 OSE.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\S-1-5-21-2292972927-2705560509-2768824231-1000 OSE.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\S-1-5-21-2292972927-2705560509-2768824231-1000\EnableNotifications = "0" OSE.EXE -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\dlddmedljhmbgdhapibnagaanenmajcm\1.0_0\manifest.json cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe -
Enumerates connected drives 3 TTPs 15 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: OSE.EXE File opened (read-only) \??\F: OSE.EXE File opened (read-only) \??\H: OSE.EXE File opened (read-only) \??\I: OSE.EXE File opened (read-only) \??\K: OSE.EXE File opened (read-only) \??\G: cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe File opened (read-only) \??\L: OSE.EXE File opened (read-only) \??\G: OSE.EXE File opened (read-only) \??\J: OSE.EXE File opened (read-only) \??\M: OSE.EXE File opened (read-only) \??\E: cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe File opened (read-only) \??\F: cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe File opened (read-only) \??\H: cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe File opened (read-only) \??\I: cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe File opened (read-only) \??\J: cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe -
Drops file in System32 directory 36 IoCs
description ioc Process File opened for modification \??\c:\windows\SysWOW64\lsass.exe cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe File opened for modification \??\c:\windows\SysWOW64\wbem\wmiApsrv.exe cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe File opened for modification \??\c:\windows\SysWOW64\locator.exe OSE.EXE File opened for modification \??\c:\windows\SysWOW64\vds.exe OSE.EXE File opened for modification \??\c:\windows\SysWOW64\ieetwcollector.exe cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe File opened for modification \??\c:\windows\SysWOW64\locator.exe cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe File opened for modification \??\c:\windows\SysWOW64\svchost.exe OSE.EXE File opened for modification \??\c:\windows\SysWOW64\lsass.exe OSE.EXE File opened for modification \??\c:\windows\SysWOW64\snmptrap.exe OSE.EXE File opened for modification \??\c:\windows\SysWOW64\searchindexer.exe OSE.EXE File opened for modification \??\c:\windows\SysWOW64\alg.exe cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe File opened for modification \??\c:\windows\SysWOW64\searchindexer.exe cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe File opened for modification \??\c:\windows\SysWOW64\wbem\wmiApsrv.exe OSE.EXE File created \??\c:\windows\SysWOW64\dllhost.vir cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe File opened for modification \??\c:\windows\SysWOW64\ieetwcollector.exe OSE.EXE File opened for modification \??\c:\windows\syswow64\perfhost.exe OSE.EXE File opened for modification \??\c:\windows\SysWOW64\ui0detect.exe OSE.EXE File opened for modification \??\c:\windows\SysWOW64\vssvc.exe OSE.EXE File opened for modification \??\c:\windows\SysWOW64\svchost.exe cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe File opened for modification \??\c:\windows\SysWOW64\fxssvc.exe cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe File opened for modification \??\c:\windows\SysWOW64\snmptrap.exe cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe File opened for modification \??\c:\windows\SysWOW64\vssvc.exe cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe File created \??\c:\windows\SysWOW64\searchindexer.vir cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe File opened for modification \??\c:\windows\SysWOW64\fxssvc.exe OSE.EXE File opened for modification \??\c:\windows\SysWOW64\msdtc.exe OSE.EXE File opened for modification \??\c:\windows\SysWOW64\msdtc.exe cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe File opened for modification \??\c:\windows\SysWOW64\alg.exe OSE.EXE File created \??\c:\windows\SysWOW64\svchost.vir cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe File opened for modification \??\c:\windows\SysWOW64\dllhost.exe cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe File created \??\c:\windows\SysWOW64\msiexec.vir cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe File opened for modification \??\c:\windows\syswow64\perfhost.exe cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe File opened for modification \??\c:\windows\SysWOW64\vds.exe cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe File opened for modification \??\c:\windows\SysWOW64\wbengine.exe OSE.EXE File opened for modification \??\c:\windows\SysWOW64\msiexec.exe cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe File opened for modification \??\c:\windows\SysWOW64\ui0detect.exe cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe File opened for modification \??\c:\windows\SysWOW64\wbengine.exe cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe -
Drops file in Program Files directory 16 IoCs
description ioc Process File opened for modification \??\c:\program files\windows media player\wmpnetwk.exe cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe File opened for modification C:\Program Files\Internet Explorer\iexplore.exe cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe File opened for modification \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe File created \??\c:\program files (x86)\common files\microsoft shared\source engine\ose.vir cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe File opened for modification \??\c:\program files (x86)\common files\microsoft shared\source engine\ose.exe cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe File opened for modification \??\c:\program files (x86)\microsoft office\office14\groove.exe OSE.EXE File created \??\c:\program files (x86)\microsoft office\office14\groove.vir cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe File opened for modification \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe OSE.EXE File opened for modification \??\c:\program files\common files\microsoft shared\officesoftwareprotectionplatform\osppsvc.exe OSE.EXE File opened for modification \??\c:\program files\google\chrome\Application\89.0.4389.114\elevation_service.exe cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe File opened for modification \??\c:\program files (x86)\microsoft office\office14\groove.exe cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe File opened for modification \??\c:\program files\google\chrome\Application\89.0.4389.114\elevation_service.exe OSE.EXE File opened for modification \??\c:\program files (x86)\google\update\googleupdate.exe OSE.EXE File opened for modification \??\c:\program files\windows media player\wmpnetwk.exe OSE.EXE File opened for modification \??\c:\program files (x86)\google\update\googleupdate.exe cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe File opened for modification \??\c:\program files\common files\microsoft shared\officesoftwareprotectionplatform\osppsvc.exe cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe -
Drops file in Windows directory 29 IoCs
description ioc Process File opened for modification \??\c:\windows\microsoft.net\framework64\v4.0.30319\aspnet_state.exe cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe File opened for modification C:\Windows\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{C5C57050-B739-4098-9F38-311CE4A3F3E5}.crmlog dllhost.exe File opened for modification \??\c:\windows\ehome\ehsched.exe cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenservicelock.dat mscorsvw.exe File opened for modification \??\c:\windows\microsoft.net\framework\v2.0.50727\mscorsvw.exe OSE.EXE File opened for modification \??\c:\windows\ehome\ehsched.exe OSE.EXE File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenrootstorelock.dat mscorsvw.exe File opened for modification \??\c:\windows\ehome\ehrecvr.exe OSE.EXE File opened for modification \??\c:\windows\microsoft.net\framework\v2.0.50727\mscorsvw.exe cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe File created \??\c:\windows\microsoft.net\framework\v2.0.50727\mscorsvw.vir cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngenservicelock.dat mscorsvw.exe File opened for modification \??\c:\windows\microsoft.net\framework\v4.0.30319\mscorsvw.exe cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe File opened for modification \??\c:\windows\ehome\ehrecvr.exe cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe File opened for modification \??\c:\windows\servicing\trustedinstaller.exe cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe File opened for modification \??\c:\windows\servicing\trustedinstaller.exe OSE.EXE File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\windows communication foundation\infocard.exe OSE.EXE File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.lock mscorsvw.exe File created \??\c:\windows\microsoft.net\framework\v4.0.30319\mscorsvw.vir cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen_service.log mscorsvw.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v4.0.30319\mscorsvw.exe cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe File created C:\Windows\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{C5C57050-B739-4098-9F38-311CE4A3F3E5}.crmlog dllhost.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\windows communication foundation\infocard.exe cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe OSE.EXE File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v4.0.30319\aspnet_state.exe OSE.EXE File opened for modification \??\c:\windows\microsoft.net\framework64\v2.0.50727\mscorsvw.exe cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v2.0.50727\mscorsvw.exe OSE.EXE File opened for modification \??\c:\windows\microsoft.net\framework64\v4.0.30319\mscorsvw.exe OSE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1488 OSE.EXE 1488 OSE.EXE -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 912 cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe Token: SeRestorePrivilege 1636 msiexec.exe Token: SeTakeOwnershipPrivilege 1636 msiexec.exe Token: SeSecurityPrivilege 1636 msiexec.exe Token: SeTakeOwnershipPrivilege 1488 OSE.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 912 cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe"C:\Users\Admin\AppData\Local\Temp\cb41812f53ee8bee9c34163f3f0afb1f1582851a791ea76ffcaf1dbce0e70855.exe"1⤵
- Drops Chrome extension
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:912
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1304
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2000
-
C:\Windows\system32\dllhost.exeC:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}1⤵
- Drops file in Windows directory
PID:784
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1636
-
C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1488
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
316KB
MD53c304b808c5ddf138e61bf6a0b31cc97
SHA11d81dd80151633322fbbfde6cadba4a48034062e
SHA256e247c4975d9634576631de69632d3b91da759e1535a85cf35b5aa911ad58e414
SHA5128cc32f6e4492355786218f1cb9d78db04b2fd178b3550f9f787b9b6350d56293ca0cf2871bf4ac15c7fd94e4bada22cfdb4b3b25649741e593fa253f17de21a2
-
Filesize
235KB
MD599b2b1381568c4202666650922454a60
SHA1276e3408a1134d0089dc570507d3209dba201cc5
SHA25695defd7f1aea9e0d8101c9fd3b0d5ad734ad47543ca43584db8674e43cd1956e
SHA512b37adad81d315a999e272eebf6a57d82f250a22192221da70f43d9b08c550b8cf34e9762375dd89302c602a5f66461ae9c7e6c931e4e1e2ce6f74fb5fc8c493e
-
Filesize
235KB
MD599b2b1381568c4202666650922454a60
SHA1276e3408a1134d0089dc570507d3209dba201cc5
SHA25695defd7f1aea9e0d8101c9fd3b0d5ad734ad47543ca43584db8674e43cd1956e
SHA512b37adad81d315a999e272eebf6a57d82f250a22192221da70f43d9b08c550b8cf34e9762375dd89302c602a5f66461ae9c7e6c931e4e1e2ce6f74fb5fc8c493e
-
Filesize
266KB
MD53298fc2f2209b74663a24c5cf778a64c
SHA1af8d95bb4fcff262df7a293f24da6d2964821c74
SHA25684aa37329df36b1cd55332a3545d961f5c489c7bacbe806161e3d94fd3ee11ce
SHA51217e891d832003f833a0af6d7e1d2dada8242c00bffefcd93aa58bf0a9e7437170ddcdf74a3a51aad70bfdb78a84de76c62ff220862ce2033bd3d5da6f99a571c
-
Filesize
266KB
MD53298fc2f2209b74663a24c5cf778a64c
SHA1af8d95bb4fcff262df7a293f24da6d2964821c74
SHA25684aa37329df36b1cd55332a3545d961f5c489c7bacbe806161e3d94fd3ee11ce
SHA51217e891d832003f833a0af6d7e1d2dada8242c00bffefcd93aa58bf0a9e7437170ddcdf74a3a51aad70bfdb78a84de76c62ff220862ce2033bd3d5da6f99a571c
-
Filesize
29.7MB
MD519e0cdafa5a27fcd196128afaab6e2fe
SHA15e6537822f6016f709364e4a461e8ad8e59abf58
SHA2566a74ecf390af877069cb9d0ebc06b3438324837840e61baff179d4605217e381
SHA512d190bbd6a18ca901506a3f9d0ab24ab1a8227056f71402ac557acc10c1b10fa0ce90cbfa511d89e0f78bea979dde48e6df6a860fddf252d8024bcc8787fcf566
-
Filesize
594KB
MD5efb602b35adc72a29fde7ab631934ca2
SHA163bdb9db1f3a0416ad07e3e9faa660fafa0ec01a
SHA2562b849e3cc024896bb892e3a1161781bb14689740d29548034cb2093e1b97a405
SHA51295635e9ef632e9d9eb38e148385e604dcb1688a03293e3cdba56de75b701dc7022886f437efb33e00890305d249dfe3073521bc9619d841c57d688d951f2611b
-
Filesize
196KB
MD53607d2868822d63dcfa33bc1e53ce66b
SHA1b7a077f9b65973f7873a5371466bf2d3a0e0e9b1
SHA25656fcc5535412afac570e772c39cc19fc7feb8b15d3b0690fc7a1f35ab379045d
SHA5126a6e21a93f55d39adb7cfac6a1ac8a12c02c57f1ccd78698c0660533d97b4ae246ead64094c62a1b66b0da5a74e2b5b89952913b3ff2f1aca92426780001b1fe