Analysis

  • max time kernel
    145s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/10/2022, 09:25

General

  • Target

    ecafdc6351b80499d845d4a69dd0c6e1ef5a7a00c105e885c9c53d38f33a6aef.exe

  • Size

    245KB

  • MD5

    5da0f73c8b1d5d564154c9aaa2eec2a0

  • SHA1

    7b61ff6aa020d864278853a94809c9cada74b320

  • SHA256

    ecafdc6351b80499d845d4a69dd0c6e1ef5a7a00c105e885c9c53d38f33a6aef

  • SHA512

    ad18a867c47d6ffc9df2e42d43ffa752c65a17036a34b282e5636d90c8cb41a38287ed2ca90c45ba6e0cd6becf6c205e7b3243bc1b9ee7ef83b18c37b797dd9f

  • SSDEEP

    6144:h1OgDPdkBAFZWjadD4s5Htzv5L2DSnpQ2oUx:h1OgLdaONzXnVx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 4 IoCs
  • Modifies registry class 63 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ecafdc6351b80499d845d4a69dd0c6e1ef5a7a00c105e885c9c53d38f33a6aef.exe
    "C:\Users\Admin\AppData\Local\Temp\ecafdc6351b80499d845d4a69dd0c6e1ef5a7a00c105e885c9c53d38f33a6aef.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3460
    • C:\Users\Admin\AppData\Local\Temp\7zS8DAE.tmp\5082f0ae71162.exe
      .\5082f0ae71162.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      • System policy modification
      PID:1608

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\Bcool\5082f0ae7119b.ocx

          Filesize

          126KB

          MD5

          d637295a8426c7c4a8e9ef3e584839a2

          SHA1

          55b64f53328498d22d269de2e65be2feeba7da00

          SHA256

          5cbd7f4b8f991ccab51cfc1fd0a5437013c5196f3c636632d691103aa3708adb

          SHA512

          f60f908b9f0efd4762255c9c71559bbd554714170262dd556353ddda55789d21cc3a8ade239cdf51da38dfa4e92714749c217095bccac19590ef8347ca501c8c

        • C:\Users\Admin\AppData\Local\Temp\7zS8DAE.tmp\[email protected]\bootstrap.js

          Filesize

          2KB

          MD5

          53222c789f23c8b9c90083dfaef9f927

          SHA1

          e1bd5da0c4423d99f5c5698fc330fb0a39961bb9

          SHA256

          1bc62caf76f560c2480526333ea16a35c8d95da653b30663ef9548803b9bee1e

          SHA512

          94efd5c862a804d144aa8135a60e7c997ac239f8d33d585e2003cec7c8d7a6923d37d28b7b3501f01e97edaa7d29af4797287da5c501929999aa39b74c87c3b9

        • C:\Users\Admin\AppData\Local\Temp\7zS8DAE.tmp\[email protected]\chrome.manifest

          Filesize

          116B

          MD5

          4a06dbb8919e7f3320267b4d91d287cd

          SHA1

          d574a9acb09e4537b6d4c71305dc22822442d396

          SHA256

          85395e2ec0e79c0f3f9d84bba5ad17a441b06d40896521ee79e815f1bd16244a

          SHA512

          768ff68c6b20fb7ab69ba1db52faf185d28d38073fec634ba8bdfd9ddf46d618d319dff41ce26e6340b3d44a53c623c52f5d84f7995bf9ebf90bb8b735baaef1

        • C:\Users\Admin\AppData\Local\Temp\7zS8DAE.tmp\[email protected]\content\bg.js

          Filesize

          8KB

          MD5

          4b930d93941bce738d7bbc396f11a7fe

          SHA1

          844147bfad74f71c75dd9d376cf04234cf911948

          SHA256

          d3bf4a40667f5b52e0d28ec81310cef80be58e5d3df855eab56333801f5d1844

          SHA512

          ef0870e18adc6558a658c7682d64e6b4a23f92b9d41dd8776bbc8c2d541a4f4f1da23c4e64d320b4d2495e330ff3dd27561900877fcb1b244e023c7c44a70206

        • C:\Users\Admin\AppData\Local\Temp\7zS8DAE.tmp\[email protected]\content\zy.xul

          Filesize

          225B

          MD5

          713f1200f588fd172481c05647147044

          SHA1

          f1cc7eb3fe01b2461b4abbac1448733cc76def93

          SHA256

          1a597a222e2de7268c6de9bd8e1945a938b0e12f84cc8dca8d9ff9b78776129a

          SHA512

          198d7d2f0e96040dd20406b08de6ec649e18b4c36aef7750ec66427ffd81733e4e1a913b0105f9a32131d379e1b130bcb0d91ef6aa605ac7d1a9518d9f1b4470

        • C:\Users\Admin\AppData\Local\Temp\7zS8DAE.tmp\[email protected]\install.rdf

          Filesize

          700B

          MD5

          0949c52918e53fb4750bee822c770f8e

          SHA1

          7fde82ed754cc33b545af06b21a100267c7b3872

          SHA256

          608ccab195745eeebc1208dfe2c29c1dfc4901fa231add3fa6482eed4b3171b1

          SHA512

          fc88adc61d927673cdbfcc95bfe63413dbb586452bf5b6cf2b18981ccb50de49ef3f6c555befc95769c6652eb4e56c2c06badd69b24303f3cf6984b2058aea4b

        • C:\Users\Admin\AppData\Local\Temp\7zS8DAE.tmp\5082f0ae71162.exe

          Filesize

          65KB

          MD5

          6fce522ef2543f1cd8812f45c8718ba6

          SHA1

          270c89c05963c0f24f976f6b75aa4d12ade4c837

          SHA256

          d75c34545066eb787ed671c6d4ce4f4c6267637518ca683dfefb79f95f14226b

          SHA512

          a0a486b95aeb9c059f23e639e16abdbfe94b041f33309b44e95743bf5a82f92d3c444c025b6c36a0dc296add3c2bc4f6affcf130014f16968be0afa8e0007880

        • C:\Users\Admin\AppData\Local\Temp\7zS8DAE.tmp\5082f0ae71162.exe

          Filesize

          65KB

          MD5

          6fce522ef2543f1cd8812f45c8718ba6

          SHA1

          270c89c05963c0f24f976f6b75aa4d12ade4c837

          SHA256

          d75c34545066eb787ed671c6d4ce4f4c6267637518ca683dfefb79f95f14226b

          SHA512

          a0a486b95aeb9c059f23e639e16abdbfe94b041f33309b44e95743bf5a82f92d3c444c025b6c36a0dc296add3c2bc4f6affcf130014f16968be0afa8e0007880

        • C:\Users\Admin\AppData\Local\Temp\7zS8DAE.tmp\5082f0ae7119b.ocx

          Filesize

          126KB

          MD5

          d637295a8426c7c4a8e9ef3e584839a2

          SHA1

          55b64f53328498d22d269de2e65be2feeba7da00

          SHA256

          5cbd7f4b8f991ccab51cfc1fd0a5437013c5196f3c636632d691103aa3708adb

          SHA512

          f60f908b9f0efd4762255c9c71559bbd554714170262dd556353ddda55789d21cc3a8ade239cdf51da38dfa4e92714749c217095bccac19590ef8347ca501c8c

        • C:\Users\Admin\AppData\Local\Temp\7zS8DAE.tmp\5082f0ae711d3.html

          Filesize

          4KB

          MD5

          0048bad8358cc6ee7e344409651e0179

          SHA1

          97fb24c2c3c205ff818d735c208f74a5a8e06ba6

          SHA256

          aaf8feb12ee7b3187c5cbf2e22616e3a5d76332541677c54aa19aa688c5cec9a

          SHA512

          8e0b20989ea7dc088c1201d39898616dce741e1b0916921a850eecdb1f15f1998ca5c52b4ca979baa279cfa6db349f19a007b2f17b61e266d8f8e1e92450d8eb

        • C:\Users\Admin\AppData\Local\Temp\7zS8DAE.tmp\5082f0ae7120c.js

          Filesize

          9B

          MD5

          99fa5d714d971a49b67de27e0d8871be

          SHA1

          d0621e846ea60fa8d0b2c8e622e495af49cd7359

          SHA256

          f560d76474380da948a0c5ab8682dc026822d9685268c592f315224b1b968bf6

          SHA512

          2fec19e4f2a974227922a7e057890141523ae73fbfa127f9e8cd00dff71b29abb93cb865c6d74ecf3df8bca440c558d4fbf2f80e82cc9636320ab5edb95ebad5

        • C:\Users\Admin\AppData\Local\Temp\7zS8DAE.tmp\eamolilodjmhkjdfelkbhmofhedemlkl.crx

          Filesize

          7KB

          MD5

          fe6cf911b526872ab2ca14debb09e865

          SHA1

          38988ee9961843368c8f0ef319e4322dc3840710

          SHA256

          978e016eb12730eb78bb2df8e88775e71182f2ec3b672f9a234a7ffb689a12aa

          SHA512

          9c6ab5692fd92e254f16d79308197b08b3e3310a24915b87d2fbecd0d58a368b8d5e20adbedb8b7f6ca45edc59a3bd4511cd099e989cc27af459fbc9eba5d441

        • C:\Users\Admin\AppData\Local\Temp\7zS8DAE.tmp\settings.ini

          Filesize

          882B

          MD5

          81bf0eb7f5a1b9c12ceef6421d27d62e

          SHA1

          ea343a01472666835e6278c439c0898903de7df8

          SHA256

          2905e6e68bbf1167d37e30c3ff334979bb8264728d24f318bcd832a854ef5e13

          SHA512

          dac68d7b3117e661618d231a9594cf5159750bdde341b57d1a931e81459701a59a29f798a727ef6c80fd86185797a2678950a92d8eadcec4fbdf74cf0c875010

        • C:\Users\Admin\AppData\Local\Temp\nsu934D.tmp\UserInfo.dll

          Filesize

          4KB

          MD5

          7579ade7ae1747a31960a228ce02e666

          SHA1

          8ec8571a296737e819dcf86353a43fcf8ec63351

          SHA256

          564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5

          SHA512

          a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b