Analysis

  • max time kernel
    152s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/10/2022, 00:01

General

  • Target

    30a4523b228f8caa2525e8fd0998abc4e16c987f4d9423ca58200095d9211149.exe

  • Size

    281KB

  • MD5

    918d392752a26d8fc259c4dc94229676

  • SHA1

    ab6186ff72ee482fdc38fad0f80b4a16aa4cd57e

  • SHA256

    30a4523b228f8caa2525e8fd0998abc4e16c987f4d9423ca58200095d9211149

  • SHA512

    bff61f6eecf161a812cb7d644c87b1c0d16d7719a47174c577f9e75d6f2cd721bc004d779464383435909166370dd81d3a15b0adbcaf16e825543752c4ec6698

  • SSDEEP

    6144:91OgDPdkBAFZWjadD4sooxTiEniYbc5x9Bf8XHVHHX3OrcAi:91OgLdaLoHiYbQ9Bf8X1H33Ki

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 4 IoCs
  • Modifies registry class 63 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\30a4523b228f8caa2525e8fd0998abc4e16c987f4d9423ca58200095d9211149.exe
    "C:\Users\Admin\AppData\Local\Temp\30a4523b228f8caa2525e8fd0998abc4e16c987f4d9423ca58200095d9211149.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:836
    • C:\Users\Admin\AppData\Local\Temp\7zS9A7F.tmp\setup.exe
      .\setup.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      • System policy modification
      PID:4872

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Bcool\bhoclass.dll

    Filesize

    139KB

    MD5

    4b35f6c1f932f52fa9901fbc47b432df

    SHA1

    8e842bf068b04f36475a3bf86c5ea6a9839bbb5e

    SHA256

    2b4d643a8a14f060bf3885f872b36e5e1fe1e777ad94783ba9593487c8e1f196

    SHA512

    8716b9a8e46933bf29348254a68d1a21392bdbbe3b4d5010e55fe638d02cc04eb685e424d440f7c5b58ffbca82e5772dd95bef73fa831595c2ae9599f3b05a99

  • C:\Users\Admin\AppData\Local\Temp\7zS9A7F.tmp\[email protected]\chrome.manifest

    Filesize

    114B

    MD5

    78d1d7b126879c97b8d1a9a300634cac

    SHA1

    05b4e30c41e9d8779cd39666277dae8916b5539f

    SHA256

    9d04d122ac9ce1b750651e3128b372cf3ea66042d2f00b96bf796c9a2f64336b

    SHA512

    2fb4eef627781d529751da6577cc30c3f99f61a1a2969139be80fa7ab8e67225053492e09ed0d3b5890749605bcc8eb3a41663650720071095c21f76d754be35

  • C:\Users\Admin\AppData\Local\Temp\7zS9A7F.tmp\[email protected]\content\indexeddb.js

    Filesize

    1KB

    MD5

    141b54a2c1fa099706eb2aa5a12904da

    SHA1

    9bc6b469a639a33c5c7ccb0fa2391dd0c1b9cea9

    SHA256

    5f1c1f2198f470927a0c6ddf777fcb7aed191a7e624cf12f74c3c7153a1554f9

    SHA512

    bcb09e9528c1ca8a0aec9a2fac018f066c3958a4894e27044b20d5e2825cfb4a35de66ed3b32257e46c39d6dd464e4138aaac322ac5c2d6beae590fb5fff832a

  • C:\Users\Admin\AppData\Local\Temp\7zS9A7F.tmp\[email protected]\content\jquery.js

    Filesize

    91KB

    MD5

    4bab8348a52d17428f684ad1ec3a427e

    SHA1

    56c912a8c8561070aee7b9808c5f3b2abec40063

    SHA256

    3739b485ac39b157caa066b883e4d9d3f74c50beff0b86cd8a24ce407b179a23

    SHA512

    a693069c66d8316d73a3c01ed9e6a4553c9b92d98b294f0e170cc9f9f5502c814255f5f92b93aeb07e0d6fe4613f9a1d511e1bfd965634f04e6cf18f191a7480

  • C:\Users\Admin\AppData\Local\Temp\7zS9A7F.tmp\[email protected]\content\jsext.js

    Filesize

    6KB

    MD5

    c238a28d7ed675064f23408573afed1f

    SHA1

    cfbe58aa8e5d492bc1ec738d95eb4d08d77ff87a

    SHA256

    e980f3423abfa6d33807f0dad0498a232d685019edb92d5defb34d7e13109156

    SHA512

    22cb5ebcfaf6f0566cb26c18573cb280e57c6c13e212b281c26d5aae3e50624d4d7e711173149c2cc9597139ecf9412a573e943b4d6e8ebd75e8bd2bfe154d46

  • C:\Users\Admin\AppData\Local\Temp\7zS9A7F.tmp\[email protected]\content\lsdb.js

    Filesize

    1KB

    MD5

    e65d43e9c6409ae18b2e44eb62ccdf2e

    SHA1

    4071a7fb79d91f08696908bcb296833f85ffd82f

    SHA256

    ed76f7d7040e51eb5ad2591eb5195d130a0ad96979ac45f361e3f50c4237f740

    SHA512

    b6d088cbe40b4801e0ef4654d4bdedc1bc6fec2a3e7379315811c6207a0f012e2f1d71b84628e0a20d9d9d33ec69149e3eacc56200e56a9cb25f2a33a7027264

  • C:\Users\Admin\AppData\Local\Temp\7zS9A7F.tmp\[email protected]\content\prfdb.js

    Filesize

    1KB

    MD5

    2b177163dd426a4d5be41b709e21f353

    SHA1

    e4c6700acf0fb813e7bd0ba319a2bc6c39a6e4d8

    SHA256

    3d83366795b95eeda84600d31bbc82773e19e83e7ce30086185abf80fb6db033

    SHA512

    ef92a4a8ce42d45bec9a337ff7778f2b7c319dd7861a5359454587bda5d8db440b39462d8917f62bdd8fa33f4e2e86b9d92c7a55dbd7ad65c5da33588e8afecc

  • C:\Users\Admin\AppData\Local\Temp\7zS9A7F.tmp\[email protected]\content\sqlite.js

    Filesize

    1KB

    MD5

    8e0e11bdc4bcfd87be69f3f389910ee6

    SHA1

    19b0ba73f7b94536f5315122e23da371bf57e000

    SHA256

    4fb8aa715ac2682010280fd51d051e8211ee6c43013076ff96b798e5bc096212

    SHA512

    22e7021f2c0a70e4585344597d2f0db8f882345ecfb86d0db2b099fc58a2394bf4e1f42d16d96b9d8934bf36877591e515ecadd2c310f8fb9f315bfa0c9c1173

  • C:\Users\Admin\AppData\Local\Temp\7zS9A7F.tmp\[email protected]\content\wx.xul

    Filesize

    228B

    MD5

    5a279710d24b8ef72f337902abf7a807

    SHA1

    b4ae71c7264c76cdeeac49c092d07985ef4c94c3

    SHA256

    bf45ec120192ffb09fdfb68603df4db3dd5b447d2deb9127921a7b1fa615ef4e

    SHA512

    1b201166de1ddee405cd76b97d4cfd7afbb1658a8eb9ab392dbca36d1b5b0d7ce3d2fc19c16633344642d7610aa3a4454a61f2382f96c835345a57308ba806db

  • C:\Users\Admin\AppData\Local\Temp\7zS9A7F.tmp\[email protected]\install.rdf

    Filesize

    668B

    MD5

    81268770fbd1b55bd9e13fd8d3ba8bed

    SHA1

    81979d846d6cbd4bdccba6186f82666b158978c6

    SHA256

    746b800ccab023ad842ee9d09d5edc6e81db94809ddfa2905686e4924926b18a

    SHA512

    a0e6be1993d934fbeb2f1b5c38198a9d95e72820478f0919eef70062b2a9734721b86dfab1fef2ea32bccb7596457ef7bbd4b262869b03295e21bb4109bcdd6b

  • C:\Users\Admin\AppData\Local\Temp\7zS9A7F.tmp\background.html

    Filesize

    5KB

    MD5

    a77745470983aa4c287781535ac60b25

    SHA1

    83cfed21e33f1c40d4060e0540399a92d237c9d6

    SHA256

    8e1b829c06935a806217f4bc905908a08be051dc17ccc1cbd1fa4001d176b1ef

    SHA512

    d37664d0e602274ba4c9eed0319f26e72f38a16104114bfd41bcc26710775476338b948f880693a7f8bb2d6f43e6b65830a348b76a9d11d697742a7f0e3a6c3b

  • C:\Users\Admin\AppData\Local\Temp\7zS9A7F.tmp\bhlgealccllmpmeadianmhbfjkhfokge.crx

    Filesize

    3KB

    MD5

    9855e6b7d80c5968fd33ff149ba66538

    SHA1

    a80b5974ee1ee641568dad6eb4f923b24ec17fb1

    SHA256

    c9f369eb1d3639ccfab7981216067858dd87d7a1e5f5fc3cf567eeeae0cab44d

    SHA512

    f5c3a25926aebfe98e8ce716e1f001fb7355b429f250cd04c439e7c3b50ee1300776ef4982391cfff63b65a1ae8cd697c5b2e744f1cf46969f3abe306a6dee27

  • C:\Users\Admin\AppData\Local\Temp\7zS9A7F.tmp\bhoclass.dll

    Filesize

    139KB

    MD5

    4b35f6c1f932f52fa9901fbc47b432df

    SHA1

    8e842bf068b04f36475a3bf86c5ea6a9839bbb5e

    SHA256

    2b4d643a8a14f060bf3885f872b36e5e1fe1e777ad94783ba9593487c8e1f196

    SHA512

    8716b9a8e46933bf29348254a68d1a21392bdbbe3b4d5010e55fe638d02cc04eb685e424d440f7c5b58ffbca82e5772dd95bef73fa831595c2ae9599f3b05a99

  • C:\Users\Admin\AppData\Local\Temp\7zS9A7F.tmp\content.js

    Filesize

    387B

    MD5

    d83fe1061a78783820943827551051cb

    SHA1

    c79e083734344ea05a4cfc3cc4ce2056571db2f0

    SHA256

    9f43c6d9448c6a228a58511f14d391cde8d87d31457081018b7a0efa70ada6bf

    SHA512

    7fd0a38970b779840f277eb4660b0ac2f243ac4ce4ae9d0b699e2ff42510193171ea7a84a2404d1d6f3a8cb6a4568653f234aad7f2077dbbfefb147743ecd2ba

  • C:\Users\Admin\AppData\Local\Temp\7zS9A7F.tmp\settings.ini

    Filesize

    650B

    MD5

    39a1b0033331a4503320cb97480e0822

    SHA1

    6266b55a7babf7549720c60cd009d42f446e05dc

    SHA256

    a8dd76ccc387c7592b6dfc0f9fe5311add27a15820e0df1388cf94badf03ebc4

    SHA512

    7a44fd293c4409bd0a004ee2e4c00983537a8d1e7dd1ef05147c4bd6d1fbe2e39d76a5cad6225510a7ea91f3b6353cdc2854a47c04a0a5ac9e07d484348b0585

  • C:\Users\Admin\AppData\Local\Temp\7zS9A7F.tmp\setup.exe

    Filesize

    61KB

    MD5

    201d2311011ffdf6c762fd46cdeb52ab

    SHA1

    65c474ca42a337745e288be0e21f43ceaafd5efe

    SHA256

    15c0e4fd6091cda70fa308ea5ee956996f6eb23d24e44700bd5c74bf111cf2aa

    SHA512

    235d70114f391d9e7a319d94bdfc49665d147723379de7487ef76cfc968f7faa3191153b32ba1ab466caeeeeef4852381529a168c3acca9a8d5a26dfe0436f6b

  • C:\Users\Admin\AppData\Local\Temp\7zS9A7F.tmp\setup.exe

    Filesize

    61KB

    MD5

    201d2311011ffdf6c762fd46cdeb52ab

    SHA1

    65c474ca42a337745e288be0e21f43ceaafd5efe

    SHA256

    15c0e4fd6091cda70fa308ea5ee956996f6eb23d24e44700bd5c74bf111cf2aa

    SHA512

    235d70114f391d9e7a319d94bdfc49665d147723379de7487ef76cfc968f7faa3191153b32ba1ab466caeeeeef4852381529a168c3acca9a8d5a26dfe0436f6b