Analysis

  • max time kernel
    91s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-10-2022 13:48

General

  • Target

    f46ff6ac83585dd736d0283de0bc0ddf4069f3587f7fef80bdcc5c554e6cb6d6.exe

  • Size

    244KB

  • MD5

    931e61cbe41ed716eefc3ab3a103c919

  • SHA1

    2ea0389b4032b73a8ac8c75430ad2958cdc0dfdb

  • SHA256

    f46ff6ac83585dd736d0283de0bc0ddf4069f3587f7fef80bdcc5c554e6cb6d6

  • SHA512

    dca18e7a736a441541742c3e03db931e476768db1d9799f1ecaf6e25da7f0cd514f5391b680cd6b4d596d8003fe66c66db1f356b8dccd53c6804145315541b94

  • SSDEEP

    3072:hn1/uEAgDPdkBlyFZ+ScjaiKWbETBquAEXlqsUUbL5mTyUU2LpaB4t/s+2+/WpGE:h1OgDPdkBAFZWjadD4s5YBrLDt/srvpR

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 4 IoCs
  • Modifies registry class 63 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f46ff6ac83585dd736d0283de0bc0ddf4069f3587f7fef80bdcc5c554e6cb6d6.exe
    "C:\Users\Admin\AppData\Local\Temp\f46ff6ac83585dd736d0283de0bc0ddf4069f3587f7fef80bdcc5c554e6cb6d6.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5096
    • C:\Users\Admin\AppData\Local\Temp\7zSF65B.tmp\50c41e36136f5.exe
      .\50c41e36136f5.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      • System policy modification
      PID:5044

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Download and Sa\50c41e361372d.ocx

    Filesize

    125KB

    MD5

    582dca19bc19ee74e58625692d055b11

    SHA1

    68c08dedfaf509f0c31e24f0f817fedf60136502

    SHA256

    4f2c543edd9f54151ae962e25b743ac11b649e68ab9bcb8a66c0c5202edc2f7f

    SHA512

    335042ff0a671be31bd19b94cb22019612f9f640ac414c4f0fae308c13ea859c9f84ebaa36e35312ef3a45edd20326878beed633184510f3fd6254777f68fbc1

  • C:\Users\Admin\AppData\Local\Temp\7zSF65B.tmp\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    11db180207d845f536ddb3de1b408e11

    SHA1

    bd7dcf69aae3ce1fd284cbc5a59c66da1a29881a

    SHA256

    4882777e4249b30ad09169308de2b39697537c5ba4c0488ac14de8e12ee8f2b9

    SHA512

    9c4104f2c608110298354ad78b23fb93008a2e9eede7e2fda9bfe031bdd59fada228c3892890f6f60751306d1711d1a29e1a4af805444ea217ae42ed4b464bfa

  • C:\Users\Admin\AppData\Local\Temp\7zSF65B.tmp\[email protected]\chrome.manifest

    Filesize

    116B

    MD5

    607f1bb513d1ef5dd2f06a41a95724a2

    SHA1

    85a7c11c417b419c10fa573b3397f42b7c10f896

    SHA256

    efd8c3d2faffc47f754418751607debd332f3b4e392aa67d59ddae6db83f6e31

    SHA512

    cd14f1c38c52fc3a3cbd4ed02ff0a473427fe691b201f9610c4138c94a9dadf8d6477757fefe1da2e2d98dfefae219bce98ed03f37d4fdb83385d194975c2777

  • C:\Users\Admin\AppData\Local\Temp\7zSF65B.tmp\[email protected]\content\bg.js

    Filesize

    8KB

    MD5

    5c244f6e8f1103abe4e8cfd55e6a4f06

    SHA1

    b686aa6803d35b6160c76324e9079f6d80ea44d8

    SHA256

    8f81c81ae02d486864218d55c5fe933fa8331e06bebfd0e2732e27607fccc036

    SHA512

    10e0eddcfebbfc2b2c7e0fc87a7b1e30f8772548615f3d7b267040337be531dd45f2b72524679271d517bf6680805459aa0dd1ed58cff919368f5aabc721911d

  • C:\Users\Admin\AppData\Local\Temp\7zSF65B.tmp\[email protected]\content\zy.xul

    Filesize

    225B

    MD5

    48b6e8aa796def985be3b6b83d2e5b82

    SHA1

    aa3509fad68abeac81c320d3d35e1c3918e91240

    SHA256

    8ea35857890199ef99f050e67c3ca7f8ce532e4bee0764b96744cc1b38595733

    SHA512

    6cfa8badc78935fc4a9b25368f990905695cd3b3b896814439a547bbe8e32a50d1839b7442984a9120b9569c020aeab1857af54414e6d72c4288c132e20afbaf

  • C:\Users\Admin\AppData\Local\Temp\7zSF65B.tmp\[email protected]\install.rdf

    Filesize

    718B

    MD5

    3091b3dac4dfa95ca7c766f834e5c77d

    SHA1

    29add648c09776a3c339ff46ffe02ebf378fbd6c

    SHA256

    2c86cbd2f39cef2a3f4ab24bb35411371c6de1beb4d4aa4941186860c4c45388

    SHA512

    5bb04d7b97140d7ed48c4a19572eebf7d77ec46ac149fa5a2c85dc03082c8e91ed885f81fcadad9b6d213f4aa5538fd76159b8ebb0ad7c57d0e13d742019c045

  • C:\Users\Admin\AppData\Local\Temp\7zSF65B.tmp\50c41e36136f5.exe

    Filesize

    65KB

    MD5

    6fce522ef2543f1cd8812f45c8718ba6

    SHA1

    270c89c05963c0f24f976f6b75aa4d12ade4c837

    SHA256

    d75c34545066eb787ed671c6d4ce4f4c6267637518ca683dfefb79f95f14226b

    SHA512

    a0a486b95aeb9c059f23e639e16abdbfe94b041f33309b44e95743bf5a82f92d3c444c025b6c36a0dc296add3c2bc4f6affcf130014f16968be0afa8e0007880

  • C:\Users\Admin\AppData\Local\Temp\7zSF65B.tmp\50c41e36136f5.exe

    Filesize

    65KB

    MD5

    6fce522ef2543f1cd8812f45c8718ba6

    SHA1

    270c89c05963c0f24f976f6b75aa4d12ade4c837

    SHA256

    d75c34545066eb787ed671c6d4ce4f4c6267637518ca683dfefb79f95f14226b

    SHA512

    a0a486b95aeb9c059f23e639e16abdbfe94b041f33309b44e95743bf5a82f92d3c444c025b6c36a0dc296add3c2bc4f6affcf130014f16968be0afa8e0007880

  • C:\Users\Admin\AppData\Local\Temp\7zSF65B.tmp\50c41e361372d.ocx

    Filesize

    125KB

    MD5

    582dca19bc19ee74e58625692d055b11

    SHA1

    68c08dedfaf509f0c31e24f0f817fedf60136502

    SHA256

    4f2c543edd9f54151ae962e25b743ac11b649e68ab9bcb8a66c0c5202edc2f7f

    SHA512

    335042ff0a671be31bd19b94cb22019612f9f640ac414c4f0fae308c13ea859c9f84ebaa36e35312ef3a45edd20326878beed633184510f3fd6254777f68fbc1

  • C:\Users\Admin\AppData\Local\Temp\7zSF65B.tmp\50c41e3613766.html

    Filesize

    4KB

    MD5

    b4bf2b9091e4e1cdad5235ba12550a3e

    SHA1

    ac8a377654f3c0ef17552b9418f25a3bc8ca7e6e

    SHA256

    ac488512f22ce3c3fb6afb357e32fd2118407640790f0fb12571082c77926ed2

    SHA512

    5d77eed37bb86b51d497e5f29021b81e4b0474d89003855b766791096ba60fa97203435f42b47d467db685f78fbdcecfc82c56baba27add05ae303f930132263

  • C:\Users\Admin\AppData\Local\Temp\7zSF65B.tmp\50c41e361379e.js

    Filesize

    9B

    MD5

    99fa5d714d971a49b67de27e0d8871be

    SHA1

    d0621e846ea60fa8d0b2c8e622e495af49cd7359

    SHA256

    f560d76474380da948a0c5ab8682dc026822d9685268c592f315224b1b968bf6

    SHA512

    2fec19e4f2a974227922a7e057890141523ae73fbfa127f9e8cd00dff71b29abb93cb865c6d74ecf3df8bca440c558d4fbf2f80e82cc9636320ab5edb95ebad5

  • C:\Users\Admin\AppData\Local\Temp\7zSF65B.tmp\aomheneahaofkgiehilknkdillcbdpgf.crx

    Filesize

    8KB

    MD5

    806598f46b36fe249553e79265d5dc08

    SHA1

    28a12689b0bcd500547a6030979dd1d4d679a0fb

    SHA256

    3e21b43fb73500c0d1fd8f09c978e43943c105fa0a220647ce8d5c02211888db

    SHA512

    22ce547188047f3cfa10990c987cdd8395e4289692cf568e303567d5a3d61d61c5d4f878ee735a5caa18270da02402e29aa806e805c2c9daf85b64714f86d5fa

  • C:\Users\Admin\AppData\Local\Temp\7zSF65B.tmp\settings.ini

    Filesize

    952B

    MD5

    f45d6a1f0bedacf5213f0813776621d0

    SHA1

    d56b010861fca40b054e4bd989312a2a9f36196a

    SHA256

    189127cebd1e90a785968a40251de23ee6d372d48d3deefb59e86e66dbfaedd7

    SHA512

    17410af81a1c226080f3f9af89a5c9ae0189d12b3e105d3008d77a05cc2b931210c8a63d2e27e102e15a32a14f195b045e1ae51259cecad969d98dfdde9706aa

  • C:\Users\Admin\AppData\Local\Temp\nsaFAD1.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    7579ade7ae1747a31960a228ce02e666

    SHA1

    8ec8571a296737e819dcf86353a43fcf8ec63351

    SHA256

    564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5

    SHA512

    a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b

  • memory/5044-132-0x0000000000000000-mapping.dmp