Analysis

  • max time kernel
    151s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06-11-2022 22:08

General

  • Target

    3f7b2ee83bf23996feb13de66959927ec6fc7fabc2ae2fa82abeef0ed26b48fb.exe

  • Size

    73KB

  • MD5

    0e2c2ecc04afe981d200dd76d79111a1

  • SHA1

    ca43d361c7b0d406e4f9e6806f0969ffd5d7e3c1

  • SHA256

    3f7b2ee83bf23996feb13de66959927ec6fc7fabc2ae2fa82abeef0ed26b48fb

  • SHA512

    a9f2ad0a511609a09e303165c2ea8e009ecfacc3c175647201887ff0c8bec545a46288c379eb2465fdeed36bc503fe6cc3dffff9390b9b7b0fcbbfcdf564994f

  • SSDEEP

    1536:Lwql7JmQ9g7fM63UQwjMMlt/sNCmxd8lPKzYIC1mfXcp:uBjM633wjM2t/8CmCKxC14sp

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Modifies WinLogon 2 TTPs 6 IoCs
  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f7b2ee83bf23996feb13de66959927ec6fc7fabc2ae2fa82abeef0ed26b48fb.exe
    "C:\Users\Admin\AppData\Local\Temp\3f7b2ee83bf23996feb13de66959927ec6fc7fabc2ae2fa82abeef0ed26b48fb.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Modifies WinLogon
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1020
    • C:\Users\Admin\AppData\Local\Temp\_3f7b2ee83bf23996feb13de66959927ec6fc7fabc2ae2fa82abeef0ed26b48fb.exe
      C:\Users\Admin\AppData\Local\Temp\_3f7b2ee83bf23996feb13de66959927ec6fc7fabc2ae2fa82abeef0ed26b48fb.exe "C:\Users\Admin\AppData\Local\Temp\3f7b2ee83bf23996feb13de66959927ec6fc7fabc2ae2fa82abeef0ed26b48fb.exe"
      2⤵
      • Executes dropped EXE
      PID:884

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_3f7b2ee83bf23996feb13de66959927ec6fc7fabc2ae2fa82abeef0ed26b48fb.exe

    Filesize

    54KB

    MD5

    802e4bb4945d8e923481e90b8cf8d62c

    SHA1

    83f961c6d9ae382c656ed363578e45b2810529b0

    SHA256

    1477f10b90196acfe3bf6f64616e89b294d9869c0a44cb6c4c54f6f12d38c26e

    SHA512

    4a7966d01f2e90beafe09e00cd12999ab2ef15be5f41fd7b504b7379cf14bedf87262515ac3129c13a4b34656f156cb5d65329daa736b998d589bc3b99607aa0

  • \ProgramData\Package Cache\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}\vcredist_x86.exe

    Filesize

    464KB

    MD5

    0878fe32461ac5652a0e08b7e5ae90b4

    SHA1

    c2c45429028d76610aa188220650f1e19a712cd8

    SHA256

    e6566ca602e772f002d0c97b3243042a11b45b54f115d43e31fdc7ba0f7fea93

    SHA512

    ee0f4eacc59bcf4c3c1a4516baf0404fc76de075f0cb828931b6b5ecbb8ae93793ec09938186f112f3371c11b15f0f402d6239d0d5447cc5d81c3fa1204f60dc

  • \ProgramData\Package Cache\{4d8dcf8c-a72a-43e1-9833-c12724db736e}\VC_redist.x86.exe

    Filesize

    653KB

    MD5

    ccbcb724db0a95a9126b63382dc5c745

    SHA1

    e517f87f61c05474c3d2820b1b83f03cb5299509

    SHA256

    e7e0472a223f6470df96dba5ca836e14e3d292c7b793bd18e1e5113be2f65e4f

    SHA512

    7d92b6812b92b18a177eac29d49eb1c63354d187a4f04c70e7d69a5b220d908554bcbb44eff045d4d694da44fffee69150a1e7a6f315128d27fe70b9013ef7e4

  • \ProgramData\Package Cache\{57a73df6-4ba9-4c1d-bbbb-517289ff6c13}\VC_redist.x64.exe

    Filesize

    653KB

    MD5

    bb66f7c8e3149e305d0a281f5070afaf

    SHA1

    77920a94cf83dc4e722e853cea1346b331173e21

    SHA256

    ffb40cdcbb4bb0c9cf53fbc021cd2cac5120e80cddece0b9aa5cd111c893b58a

    SHA512

    5213f9e78acfe4a8ccfb8f5e0ba59e038dbaea58a46afa43239d1743a14754f2b68a866288d6c9bfcc6d079e78021a6326ce63287c467b45bc3a5956b221160f

  • \ProgramData\Package Cache\{61087a79-ac85-455c-934d-1fa22cc64f36}\vcredist_x86.exe

    Filesize

    474KB

    MD5

    5f5692c92e7431670671d287673904df

    SHA1

    7452306ab15fffe3ba333d160da944c9a0bf6288

    SHA256

    c7ed0ccd46fcb93421bfad03f7f4ee9ec87a97cdaecd868627549fdd60bdd9ef

    SHA512

    51e7e16df744defd0794281dc695723ed4753791b24f379e90c165cb8d5b2c298d5d9f394611238a214e2cf7422411b6bb283b4d7fd8141d9ad3251cfd9276a2

  • \ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

    Filesize

    464KB

    MD5

    3e120b2e21bf5d21e2b5c0c3f02650b3

    SHA1

    3f977bef15b1b7e1e95fa642dcd35e0b0a7505cd

    SHA256

    4547cfcd15a09479e0625e43d6a2a48ee29b98d7dffba15d72f54658dd5ef7b0

    SHA512

    a7a1571e206eef15b7e3de68436250a6adf7cd2bc022ae8c06272e02e05745399f9a4bfb8973349110fbfb0878683de82c4ecf73487ac0d91501e5d599de844d

  • \ProgramData\Package Cache\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\vcredist_x64.exe

    Filesize

    474KB

    MD5

    350dcc1176f69aa4659f59a7f50db401

    SHA1

    adb11b9c530e6638dd107627beb894b57abee448

    SHA256

    70c62060a180bc92ff4fd82b82154b594593efdee7b13722fb5d3a09917c3336

    SHA512

    b2489e105352f96f20a0282364118a62250548f4048074bd3ef5a9b3789350afe3afeba08c4b6a0190f082f51731e06508f2e55471d81ab43bf54615b2cd86bf

  • \Users\Admin\AppData\Local\Temp\ACLControl.exe

    Filesize

    73KB

    MD5

    0e2c2ecc04afe981d200dd76d79111a1

    SHA1

    ca43d361c7b0d406e4f9e6806f0969ffd5d7e3c1

    SHA256

    3f7b2ee83bf23996feb13de66959927ec6fc7fabc2ae2fa82abeef0ed26b48fb

    SHA512

    a9f2ad0a511609a09e303165c2ea8e009ecfacc3c175647201887ff0c8bec545a46288c379eb2465fdeed36bc503fe6cc3dffff9390b9b7b0fcbbfcdf564994f

  • \Users\Admin\AppData\Local\Temp\_3f7b2ee83bf23996feb13de66959927ec6fc7fabc2ae2fa82abeef0ed26b48fb.exe

    Filesize

    54KB

    MD5

    802e4bb4945d8e923481e90b8cf8d62c

    SHA1

    83f961c6d9ae382c656ed363578e45b2810529b0

    SHA256

    1477f10b90196acfe3bf6f64616e89b294d9869c0a44cb6c4c54f6f12d38c26e

    SHA512

    4a7966d01f2e90beafe09e00cd12999ab2ef15be5f41fd7b504b7379cf14bedf87262515ac3129c13a4b34656f156cb5d65329daa736b998d589bc3b99607aa0

  • \Users\Admin\AppData\Local\Temp\_3f7b2ee83bf23996feb13de66959927ec6fc7fabc2ae2fa82abeef0ed26b48fb.exe

    Filesize

    54KB

    MD5

    802e4bb4945d8e923481e90b8cf8d62c

    SHA1

    83f961c6d9ae382c656ed363578e45b2810529b0

    SHA256

    1477f10b90196acfe3bf6f64616e89b294d9869c0a44cb6c4c54f6f12d38c26e

    SHA512

    4a7966d01f2e90beafe09e00cd12999ab2ef15be5f41fd7b504b7379cf14bedf87262515ac3129c13a4b34656f156cb5d65329daa736b998d589bc3b99607aa0

  • \Users\Admin\AppData\Local\Temp\_3f7b2ee83bf23996feb13de66959927ec6fc7fabc2ae2fa82abeef0ed26b48fb.exe

    Filesize

    54KB

    MD5

    802e4bb4945d8e923481e90b8cf8d62c

    SHA1

    83f961c6d9ae382c656ed363578e45b2810529b0

    SHA256

    1477f10b90196acfe3bf6f64616e89b294d9869c0a44cb6c4c54f6f12d38c26e

    SHA512

    4a7966d01f2e90beafe09e00cd12999ab2ef15be5f41fd7b504b7379cf14bedf87262515ac3129c13a4b34656f156cb5d65329daa736b998d589bc3b99607aa0

  • memory/884-57-0x0000000000000000-mapping.dmp

  • memory/1020-54-0x00000000762D1000-0x00000000762D3000-memory.dmp

    Filesize

    8KB