Analysis

  • max time kernel
    37s
  • max time network
    44s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06-11-2022 10:04

General

  • Target

    2c566e8678a1cbbedb6681eb848f784450f25b044c8e6c91c6cb92561c2e26a9.exe

  • Size

    245KB

  • MD5

    3b074f67994462a2298badc91455e920

  • SHA1

    4303defb6b2775bae7005a90f822c26289a6c19c

  • SHA256

    2c566e8678a1cbbedb6681eb848f784450f25b044c8e6c91c6cb92561c2e26a9

  • SHA512

    476e739fc0969b7f8516301ce33b5be842d5d341856b96d778d0782ed69acce9391796e1f7857ad3fe21aca1e6f8b39ec32cc5f2aa7f8dc721955e0091456551

  • SSDEEP

    6144:h1OgDPdkBAFZWjadD4s5ysga6bg6GTsu9hw:h1OgLdaOy3ahZw

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 8 IoCs
  • Modifies registry class 63 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c566e8678a1cbbedb6681eb848f784450f25b044c8e6c91c6cb92561c2e26a9.exe
    "C:\Users\Admin\AppData\Local\Temp\2c566e8678a1cbbedb6681eb848f784450f25b044c8e6c91c6cb92561c2e26a9.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1976
    • C:\Users\Admin\AppData\Local\Temp\7zS6A19.tmp\50af2a69b309e.exe
      .\50af2a69b309e.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      • System policy modification
      PID:2008

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7zS6A19.tmp\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    e3c4f8f464ff52c7067f82fd87390331

    SHA1

    9ebd064c13120a729115a05c9c711c0aa6d66bd8

    SHA256

    1ce5b0daf3e2b9314fb00d0109f3374449286a92311c492c88b314a2247bf8ac

    SHA512

    98b6286b3fc1c96ab4176d6a215b915fa0e80cdcc46a41455faa86c851597f725a7860045fb5ad68964f445027e66bf6a21cd542711f6a6828edfe50f3abfa99

  • C:\Users\Admin\AppData\Local\Temp\7zS6A19.tmp\[email protected]\chrome.manifest

    Filesize

    116B

    MD5

    d4ecade21ffd545d1bc7ff965703ec10

    SHA1

    31aae679a8b5dc53ad65a62d8c9c4c69a575e6cb

    SHA256

    03e5b373c43411f9ff2088a5bf6941b38e5bd1a9aecedf504f943252c578e772

    SHA512

    b1dc7ef79a0734813d64957971c96686d091d74cda458bb6f7ec6d2dabe54bbcacf6f0fb63b3b282400754f03ccb2a22f36c8c775491f3860462d1681cc4972d

  • C:\Users\Admin\AppData\Local\Temp\7zS6A19.tmp\[email protected]\content\bg.js

    Filesize

    8KB

    MD5

    7e6c7085de47917f7a5663543dec632a

    SHA1

    d2734747f1406a5fc9f11ca0fa4032f985b8d96d

    SHA256

    48f0542ab3d5211ea0f30cc2979072b0049c72cfacb137939fea4e65051bb4e9

    SHA512

    95a0fe04e77193c7173ad1b0b680e8ef87c50d861252d4e83c706387b11117e98303bd676e04c14be4c56cbce977aac164bcfa8cd7a07cc972c737477222f8da

  • C:\Users\Admin\AppData\Local\Temp\7zS6A19.tmp\[email protected]\content\zy.xul

    Filesize

    225B

    MD5

    4f580e2f4f24654c5c89190183627d7a

    SHA1

    a57c4d5d762e1a1d7e3baea145f0d2a1b50345f9

    SHA256

    d28e74ad516a658f69f97134842d05b6f3c979eb9ed5dde47386ae0f62dc4650

    SHA512

    b8f8019d13cb9d84120890565f1d338c8c9cd04a7b3317871651d7359b4079f3a90dd76c8232a623707b01b64f36bdecd4d5e84c2f2abc88e467a352efcc10ae

  • C:\Users\Admin\AppData\Local\Temp\7zS6A19.tmp\[email protected]\install.rdf

    Filesize

    701B

    MD5

    a74e0ea7218657caef972051f20c4f40

    SHA1

    972caa1933401a96eb5e7380fce42edb5a13ea39

    SHA256

    cb6ad198f3c83537dde133e73afff73ce0a9a25617e7eaa4074f508cd885c8da

    SHA512

    c6cdfa622061eff837b4a7bd6778fc0aacaf20ceb71c874de76d9f356c04bfb99924e932a22da9e766a96eaeecc6972d302c7f3e646c6261e93beaa29928fc57

  • C:\Users\Admin\AppData\Local\Temp\7zS6A19.tmp\50af2a69b309e.exe

    Filesize

    65KB

    MD5

    6fce522ef2543f1cd8812f45c8718ba6

    SHA1

    270c89c05963c0f24f976f6b75aa4d12ade4c837

    SHA256

    d75c34545066eb787ed671c6d4ce4f4c6267637518ca683dfefb79f95f14226b

    SHA512

    a0a486b95aeb9c059f23e639e16abdbfe94b041f33309b44e95743bf5a82f92d3c444c025b6c36a0dc296add3c2bc4f6affcf130014f16968be0afa8e0007880

  • C:\Users\Admin\AppData\Local\Temp\7zS6A19.tmp\50af2a69b309e.exe

    Filesize

    65KB

    MD5

    6fce522ef2543f1cd8812f45c8718ba6

    SHA1

    270c89c05963c0f24f976f6b75aa4d12ade4c837

    SHA256

    d75c34545066eb787ed671c6d4ce4f4c6267637518ca683dfefb79f95f14226b

    SHA512

    a0a486b95aeb9c059f23e639e16abdbfe94b041f33309b44e95743bf5a82f92d3c444c025b6c36a0dc296add3c2bc4f6affcf130014f16968be0afa8e0007880

  • C:\Users\Admin\AppData\Local\Temp\7zS6A19.tmp\50af2a69b30d8.ocx

    Filesize

    126KB

    MD5

    d637295a8426c7c4a8e9ef3e584839a2

    SHA1

    55b64f53328498d22d269de2e65be2feeba7da00

    SHA256

    5cbd7f4b8f991ccab51cfc1fd0a5437013c5196f3c636632d691103aa3708adb

    SHA512

    f60f908b9f0efd4762255c9c71559bbd554714170262dd556353ddda55789d21cc3a8ade239cdf51da38dfa4e92714749c217095bccac19590ef8347ca501c8c

  • C:\Users\Admin\AppData\Local\Temp\7zS6A19.tmp\50af2a69b3110.html

    Filesize

    4KB

    MD5

    6894ea5417796acddc078e6d40795730

    SHA1

    6633f961f51d5059e9f3210d9b201a04e6ab61c5

    SHA256

    6ef013f30a06651a269ee634d0d8e0b8f11ce1e9bd48c12661b04671a8877a01

    SHA512

    346a61a85796a5f7f10516d7a02f83074cdc11e99011025daffb094fbda586ec8ba5e7bf543cde8a88a16c34a6ab1b14cd09fdb5c7a665d478b060c690ed3ac2

  • C:\Users\Admin\AppData\Local\Temp\7zS6A19.tmp\50af2a69b3149.js

    Filesize

    9B

    MD5

    99fa5d714d971a49b67de27e0d8871be

    SHA1

    d0621e846ea60fa8d0b2c8e622e495af49cd7359

    SHA256

    f560d76474380da948a0c5ab8682dc026822d9685268c592f315224b1b968bf6

    SHA512

    2fec19e4f2a974227922a7e057890141523ae73fbfa127f9e8cd00dff71b29abb93cb865c6d74ecf3df8bca440c558d4fbf2f80e82cc9636320ab5edb95ebad5

  • C:\Users\Admin\AppData\Local\Temp\7zS6A19.tmp\ebjagkhkaehninjfnnmgppaghjfjokeo.crx

    Filesize

    8KB

    MD5

    0682f618cead56dec2ae8a494aed2c1c

    SHA1

    02719aa09aa7e428a45d5009e383e4a2bfce9928

    SHA256

    3130dc069bd0f13ab591fbf080e6a7516da816cf6e54bebf6656061dd9a5c53b

    SHA512

    f641a4768524d2d6539bcf80eb3a549f0e7ab62cc9b7f7570dd719224358c6d6aab9e5bee2f20825bdba72d55887e8fa14778bef43a1239d2ce798fdaed9231e

  • C:\Users\Admin\AppData\Local\Temp\7zS6A19.tmp\settings.ini

    Filesize

    998B

    MD5

    812add04535fa0aa384f8f194a4c3e6c

    SHA1

    e16d9bb9d78a879e4045c4fa2a5f7c33b4e9a4ac

    SHA256

    dc16a5116b584171ec6b4fe8fb62dbcc6b498882d2e4c20475ed7e6df4ce7fcd

    SHA512

    7d8d3a70b2209d86dee1ac15e04702477a791845fedea0e1f01e6fb12634c6653da9a8aaedf5067c1b293edbdff4d0d582ec0bbb7602d3b9beeebdf230fd4ab6

  • \ProgramData\Vaudix\50af2a69b30d8.ocx

    Filesize

    126KB

    MD5

    d637295a8426c7c4a8e9ef3e584839a2

    SHA1

    55b64f53328498d22d269de2e65be2feeba7da00

    SHA256

    5cbd7f4b8f991ccab51cfc1fd0a5437013c5196f3c636632d691103aa3708adb

    SHA512

    f60f908b9f0efd4762255c9c71559bbd554714170262dd556353ddda55789d21cc3a8ade239cdf51da38dfa4e92714749c217095bccac19590ef8347ca501c8c

  • \ProgramData\Vaudix\uninstall.exe

    Filesize

    48KB

    MD5

    602aa39f9ab3b6685bee71c67dc485c5

    SHA1

    69cd0d6f9ce55a5e5d3d3559d31422303dc6def1

    SHA256

    d8fb9c21b350a06449c7e6934a3c2d971d20851ce73938bbc5f79349f970721c

    SHA512

    3bb5a0bf89da8993ae2801b41f7644ec39fc418ac0553bc67ed4f36ad413f3c2237ff9bcdd4a1ca64ad546b30e6445d3f6f1fa3af0f34faf1841da306e81ea94

  • \Users\Admin\AppData\Local\Temp\7zS6A19.tmp\50af2a69b309e.exe

    Filesize

    65KB

    MD5

    6fce522ef2543f1cd8812f45c8718ba6

    SHA1

    270c89c05963c0f24f976f6b75aa4d12ade4c837

    SHA256

    d75c34545066eb787ed671c6d4ce4f4c6267637518ca683dfefb79f95f14226b

    SHA512

    a0a486b95aeb9c059f23e639e16abdbfe94b041f33309b44e95743bf5a82f92d3c444c025b6c36a0dc296add3c2bc4f6affcf130014f16968be0afa8e0007880

  • \Users\Admin\AppData\Local\Temp\nsj6FB6.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    7579ade7ae1747a31960a228ce02e666

    SHA1

    8ec8571a296737e819dcf86353a43fcf8ec63351

    SHA256

    564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5

    SHA512

    a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b

  • memory/1976-54-0x0000000074D81000-0x0000000074D83000-memory.dmp

    Filesize

    8KB