Analysis

  • max time kernel
    91s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-10-2022 23:16

General

  • Target

    6befd2e8e86fdf9d8e8b96250413e73b68e137e69c5a96ec9a043f9abd7b1bc1.exe

  • Size

    315KB

  • MD5

    8502567854e0edab55f4bfdfe945b2b9

  • SHA1

    a8383aedbddbe136b6ee4a9bc897d28427ed53c8

  • SHA256

    6befd2e8e86fdf9d8e8b96250413e73b68e137e69c5a96ec9a043f9abd7b1bc1

  • SHA512

    d0d29e404435f0109e93d850f72dd96ea6978c3cb49a8cf83d870bc7cdcd5e2560b2a240680a4fe1d942152423c7d2ea26f2580d98fbfeff0f20539444ebd9e9

  • SSDEEP

    6144:91OgDPdkBAFZWjadD4sSU3kM7FEztL+rjCtlLxf4R0pd/K42EDo:91OgLda+0GFE5v5KDEE

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 4 IoCs
  • Modifies registry class 63 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6befd2e8e86fdf9d8e8b96250413e73b68e137e69c5a96ec9a043f9abd7b1bc1.exe
    "C:\Users\Admin\AppData\Local\Temp\6befd2e8e86fdf9d8e8b96250413e73b68e137e69c5a96ec9a043f9abd7b1bc1.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3568
    • C:\Users\Admin\AppData\Local\Temp\7zSE4C7.tmp\setup.exe
      .\setup.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      • System policy modification
      PID:4848

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\wxDfast\bhoclass.dll

    Filesize

    139KB

    MD5

    4b35f6c1f932f52fa9901fbc47b432df

    SHA1

    8e842bf068b04f36475a3bf86c5ea6a9839bbb5e

    SHA256

    2b4d643a8a14f060bf3885f872b36e5e1fe1e777ad94783ba9593487c8e1f196

    SHA512

    8716b9a8e46933bf29348254a68d1a21392bdbbe3b4d5010e55fe638d02cc04eb685e424d440f7c5b58ffbca82e5772dd95bef73fa831595c2ae9599f3b05a99

  • C:\Users\Admin\AppData\Local\Temp\7zSE4C7.tmp\[email protected]\chrome.manifest

    Filesize

    114B

    MD5

    8f7921db823427b4fcd4b3b3e254dbee

    SHA1

    61f7a985301cc661e2a2820ad939399715199df3

    SHA256

    0d68d6b6d52425cb7e16cd14c2b06d3a6aa0498b06e21c1e7b023ecd9ee8fad0

    SHA512

    79bbb035f4709b3015d2673d160954e9881f480ee79b21aad24285d3d1951a5ee0e11b47025b22ae256bee2491d58ff4726b1026f971e9d5d2f8c994afe87b7f

  • C:\Users\Admin\AppData\Local\Temp\7zSE4C7.tmp\[email protected]\content\indexeddb.js

    Filesize

    1KB

    MD5

    f35e832e5d91bcc7a7085a9a8061ee10

    SHA1

    60ebaf36e8dc8ae05c657fd9b0800ad37427aba6

    SHA256

    991a86225d2804f073426f8fd0b80a6c06bbb0afaaa2a0596dbddf7ccad45614

    SHA512

    6c3a829f3083aa5c1c9675879ce38701dcd7f2fe005d93390ab8a60b1eb36192218067baa2b811089dc18fe109f1861192160453f10f45c7c21bc2a100be0c3d

  • C:\Users\Admin\AppData\Local\Temp\7zSE4C7.tmp\[email protected]\content\jquery.js

    Filesize

    91KB

    MD5

    4bab8348a52d17428f684ad1ec3a427e

    SHA1

    56c912a8c8561070aee7b9808c5f3b2abec40063

    SHA256

    3739b485ac39b157caa066b883e4d9d3f74c50beff0b86cd8a24ce407b179a23

    SHA512

    a693069c66d8316d73a3c01ed9e6a4553c9b92d98b294f0e170cc9f9f5502c814255f5f92b93aeb07e0d6fe4613f9a1d511e1bfd965634f04e6cf18f191a7480

  • C:\Users\Admin\AppData\Local\Temp\7zSE4C7.tmp\[email protected]\content\jsext.js

    Filesize

    6KB

    MD5

    6d8cef44e7fbe33e1e86aebaf39b07a2

    SHA1

    14b53c4305236327f84ff8bc3d7d227493997f9b

    SHA256

    8ba42b6d0218d9bc24fb11bf545073388065b8d4adb7f7996e93ccf80eb595f4

    SHA512

    afb85727211dd4a67da23e7e51ddeef108be087a26f0343257d1ea1a08dd82bc797c28295ab37b256cfde6a576b5992f136caae33d531dc7cb49b7ff97808750

  • C:\Users\Admin\AppData\Local\Temp\7zSE4C7.tmp\[email protected]\content\lsdb.js

    Filesize

    1KB

    MD5

    be751de56ca09b89d79837b3b9529552

    SHA1

    0a5607665e92f2c42ca313983818ed64061c6d33

    SHA256

    9f3094204190ee8c09cdfb9a53b4203c27468e08503a40b5043be6dddeb071aa

    SHA512

    698c739d94b624e691b5afb7b21afd43b066fb13c116e6f424cfefa411cb4cd5765d37ceb21b81c76f61e75dc8d0c5acbbe2007a8c6b9e58f0e5ce422ecc1b2c

  • C:\Users\Admin\AppData\Local\Temp\7zSE4C7.tmp\[email protected]\content\prfdb.js

    Filesize

    1KB

    MD5

    5979cba7131ba490efe5748cf0f681f0

    SHA1

    d9d11ed4276b5e48ada7867139d62d904f10e7a0

    SHA256

    d586a19e7908bdd312129ef7d34a85162ee0b7f2f188d3b650fbce2036c461a2

    SHA512

    0fa8389917ce8108e2d39b36e345c17b71d435fd2b791789647a2b224b27d45d15e0a3a38394ed3eceeabfda21d821f860d658b9d9199f5aa324a8d86f02f2a3

  • C:\Users\Admin\AppData\Local\Temp\7zSE4C7.tmp\[email protected]\content\sqlite.js

    Filesize

    1KB

    MD5

    42ac6c6b3d739b731e4a5a3524d589d3

    SHA1

    d10088235d8e1ada08b0156d9055b1c918f6e20b

    SHA256

    2a2740e91b37b85e614147cc8fc778dc9178e23da80885f324fb4b3fb303bb1a

    SHA512

    4d4b416af1d277a6509425bc6ae72b6c8d29e0dc8dd308a2b9ef0cca2d783d24a97b65c98d61de960ef336d13fbbfcf506ee185cb3fba2816850dfe00a294a2d

  • C:\Users\Admin\AppData\Local\Temp\7zSE4C7.tmp\[email protected]\content\wx.xul

    Filesize

    228B

    MD5

    554017fef1998619f6185f316534643e

    SHA1

    53b45a51bc01fdb165f13f9a85d525fe68649f00

    SHA256

    ef5f44d9aee3fa763997a55ce990a9fa95630a08f158eae71acf34e67577b389

    SHA512

    ddf215b439b6be5c5aeba391672a20cef5112a732701e9fef938c2db1e76a72b75f98a651c3a30d07793252fc93422f643fb6605af107016a0de068bf57b0af9

  • C:\Users\Admin\AppData\Local\Temp\7zSE4C7.tmp\[email protected]\install.rdf

    Filesize

    677B

    MD5

    0fc58fb476d5ec8801885ada861def90

    SHA1

    6ce3061dcae8d173c5d79b6b63d5c8fe8d73b6b8

    SHA256

    47f53554c1dc549884c64ace959b85322497a0117fcefffd799e39c967ae83d6

    SHA512

    0eb621d854b677798812b2255a013dde07d4b6fc589c80f664bbdf075f1d24dc5b4be99ddda5edcee0969183f098d27278bbfb156d7374206ef9eda81285aca2

  • C:\Users\Admin\AppData\Local\Temp\7zSE4C7.tmp\background.html

    Filesize

    5KB

    MD5

    6bea7249e7b2982f99039e2dd6785f0e

    SHA1

    5adbc7cba9a3be61689140075372507fe8cfc773

    SHA256

    050a30fa7281de226a5f8785a35cd85c61cd5a0f668308ee7af4d9fd5d82d1d4

    SHA512

    7f41b11a9aed8007c9e56e1062aa9c41c2594e85ca3ab276f6b68e03ebf31a10ba4f99fa4f69f4f9a4efc71589693f7b52952225689924ac33947f1d8d8eaafa

  • C:\Users\Admin\AppData\Local\Temp\7zSE4C7.tmp\bhoclass.dll

    Filesize

    139KB

    MD5

    4b35f6c1f932f52fa9901fbc47b432df

    SHA1

    8e842bf068b04f36475a3bf86c5ea6a9839bbb5e

    SHA256

    2b4d643a8a14f060bf3885f872b36e5e1fe1e777ad94783ba9593487c8e1f196

    SHA512

    8716b9a8e46933bf29348254a68d1a21392bdbbe3b4d5010e55fe638d02cc04eb685e424d440f7c5b58ffbca82e5772dd95bef73fa831595c2ae9599f3b05a99

  • C:\Users\Admin\AppData\Local\Temp\7zSE4C7.tmp\content.js

    Filesize

    387B

    MD5

    7505f74163dcb94e9e944d6533307589

    SHA1

    24461bb6d6f1e62339882b03531c230dbfbce218

    SHA256

    51d4ac2fc9592beffadf63c9a9d62b6c2fd479d41c3866c85ff12b84323b7bde

    SHA512

    e5faaea20a58b48c926fa6f3dc65ec07b8f726fa2352f5245b6d684c6f3ea3d880ceb699e46ee5cf8c667c5930da31e41731697cf79d8d14c59d3f495a878e94

  • C:\Users\Admin\AppData\Local\Temp\7zSE4C7.tmp\dcanaccnlnlghahbjdnenbfehfmbibme.crx

    Filesize

    37KB

    MD5

    eaed23f295d77fc24bf9aa057716f824

    SHA1

    fa0f7dc507f534a43bb80bd7f3c1d80c94b51321

    SHA256

    f4e078de27c84e3a365ed9c733af8a187bbe9338f6efb4b4238db8eddd482538

    SHA512

    a10dca2d97328fe2e3e6c642e229c31aa2b7ec677bed8687242839f9fe204b90c4dc5248a39554320605d246ec3a6dc8bb70cd1bf343d07947a66677c3a45058

  • C:\Users\Admin\AppData\Local\Temp\7zSE4C7.tmp\settings.ini

    Filesize

    599B

    MD5

    f70b7c4cde46542860bb1b63d2bfa028

    SHA1

    8805ec4ce38babb346032f77a7fe20c7790d7ee6

    SHA256

    29308e44e9d38ff3cc5ee19de31717cc1c6fcc1c85eb8c1b72617358dea298d3

    SHA512

    5882bc7e5f3c14edb48449b0791ae1a238b133e423133fb8685890826bd44befced7a29f9002ee0b6ba23860a0a11661bfb397c07caddcee30ac170d2a264eb4

  • C:\Users\Admin\AppData\Local\Temp\7zSE4C7.tmp\setup.exe

    Filesize

    61KB

    MD5

    201d2311011ffdf6c762fd46cdeb52ab

    SHA1

    65c474ca42a337745e288be0e21f43ceaafd5efe

    SHA256

    15c0e4fd6091cda70fa308ea5ee956996f6eb23d24e44700bd5c74bf111cf2aa

    SHA512

    235d70114f391d9e7a319d94bdfc49665d147723379de7487ef76cfc968f7faa3191153b32ba1ab466caeeeeef4852381529a168c3acca9a8d5a26dfe0436f6b

  • C:\Users\Admin\AppData\Local\Temp\7zSE4C7.tmp\setup.exe

    Filesize

    61KB

    MD5

    201d2311011ffdf6c762fd46cdeb52ab

    SHA1

    65c474ca42a337745e288be0e21f43ceaafd5efe

    SHA256

    15c0e4fd6091cda70fa308ea5ee956996f6eb23d24e44700bd5c74bf111cf2aa

    SHA512

    235d70114f391d9e7a319d94bdfc49665d147723379de7487ef76cfc968f7faa3191153b32ba1ab466caeeeeef4852381529a168c3acca9a8d5a26dfe0436f6b

  • memory/4848-132-0x0000000000000000-mapping.dmp