Analysis
-
max time kernel
324s -
max time network
371s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 22:02
Static task
static1
Behavioral task
behavioral1
Sample
cce4b983be599432a2be9bb800e8f16be82023cd9144fb89991bc3349e6ccc22.exe
Resource
win7-20221111-en
General
-
Target
cce4b983be599432a2be9bb800e8f16be82023cd9144fb89991bc3349e6ccc22.exe
-
Size
2.1MB
-
MD5
2cf56f02efd4cda7557ecd53bc037b63
-
SHA1
acbc01788b05b1d18f2d84e982b45fc2394eb459
-
SHA256
cce4b983be599432a2be9bb800e8f16be82023cd9144fb89991bc3349e6ccc22
-
SHA512
368bcf1df373d4ad474a29a97fbe8857ef839bb166cda39c46cf5459d496585604bcd05780a3fac115c7fbd0140f2613248620afdbca627ad0a06f967596d3c3
-
SSDEEP
49152:h1OswkMyJo5w3LMa3PYN7i8Y0qKTsab07:h1Ojk/vnYdiR
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2012 NXjTn2PQGDkAhg2.exe -
Loads dropped DLL 1 IoCs
pid Process 2012 NXjTn2PQGDkAhg2.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops Chrome extension 5 IoCs
description ioc Process File created C:\Users\DefaultAccount\AppData\Local\Google\Chrome\User Data\Default\Extensions\hlghnmdagdfjmokjljmgkhkcaecjjjng\2.0\manifest.json NXjTn2PQGDkAhg2.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\hlghnmdagdfjmokjljmgkhkcaecjjjng\2.0\manifest.json NXjTn2PQGDkAhg2.exe File created C:\Users\WDAGUtilityAccount\AppData\Local\Google\Chrome\User Data\Default\Extensions\hlghnmdagdfjmokjljmgkhkcaecjjjng\2.0\manifest.json NXjTn2PQGDkAhg2.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\hlghnmdagdfjmokjljmgkhkcaecjjjng\2.0\manifest.json NXjTn2PQGDkAhg2.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\hlghnmdagdfjmokjljmgkhkcaecjjjng\2.0\manifest.json NXjTn2PQGDkAhg2.exe -
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files (x86)\GaoSavee\WGfiwYEqDf1JCU.dll NXjTn2PQGDkAhg2.exe File opened for modification C:\Program Files (x86)\GaoSavee\WGfiwYEqDf1JCU.dll NXjTn2PQGDkAhg2.exe File created C:\Program Files (x86)\GaoSavee\WGfiwYEqDf1JCU.tlb NXjTn2PQGDkAhg2.exe File opened for modification C:\Program Files (x86)\GaoSavee\WGfiwYEqDf1JCU.tlb NXjTn2PQGDkAhg2.exe File created C:\Program Files (x86)\GaoSavee\WGfiwYEqDf1JCU.dat NXjTn2PQGDkAhg2.exe File opened for modification C:\Program Files (x86)\GaoSavee\WGfiwYEqDf1JCU.dat NXjTn2PQGDkAhg2.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4676 wrote to memory of 2012 4676 cce4b983be599432a2be9bb800e8f16be82023cd9144fb89991bc3349e6ccc22.exe 81 PID 4676 wrote to memory of 2012 4676 cce4b983be599432a2be9bb800e8f16be82023cd9144fb89991bc3349e6ccc22.exe 81 PID 4676 wrote to memory of 2012 4676 cce4b983be599432a2be9bb800e8f16be82023cd9144fb89991bc3349e6ccc22.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\cce4b983be599432a2be9bb800e8f16be82023cd9144fb89991bc3349e6ccc22.exe"C:\Users\Admin\AppData\Local\Temp\cce4b983be599432a2be9bb800e8f16be82023cd9144fb89991bc3349e6ccc22.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\7zS1742.tmp\NXjTn2PQGDkAhg2.exe.\NXjTn2PQGDkAhg2.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops Chrome extension
- Drops file in Program Files directory
PID:2012
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
618KB
MD5fa22e2b9ff3086baceedeafbadec9f28
SHA10bb8d621faff9fcfcd8377079b9a47110e8c5c5e
SHA25657e84f2e0c131c0579c6895ff74cc028885addf1ff80631de2a06b870b808bc3
SHA512f80f7e0cc59a592c2cc8502a267dbd7811be6d4769ae0a422b4b63bae77e7a817594da98a9c27a75bf70117e6c8f1ed84fe99adc20b0d9c281e8ee9ecf2839a5
-
Filesize
6KB
MD5006492388666f52e8ad358ba8b730f96
SHA10d1eae36d15058922606ff2aae3ce62ad1261642
SHA25626f20b2ca51edaf71d4fe15411ae6ac99a2597a31d2dc6e361904d11ac44c0d5
SHA5124ee8ea88bba241b985213e71a00973c97dace40c5c0c246d1f56c8d1c4c98e0ee64453997bea55db4ba7a6f639c2211a8f250b0d87b2aacb6078ff02e029ffe3
-
Filesize
628KB
MD5b59c3001e4489fc70fda8e5d5b31b0fa
SHA11a1658f6c3dd993bd3ec08ca7d599327b9be6a58
SHA2564dee536bea4b65ffa91046262fe8ae0a48088ae21c055063c608f23e670ba0b0
SHA51240bb40dbea96ab17f1b7d34ff635af97fdf10409a6d85a943f9aa2395a461a134a8ce52d70b76878f6c36d8b3fbf592b627c1b77ed7692c165819541e36fa230
-
Filesize
628KB
MD5b59c3001e4489fc70fda8e5d5b31b0fa
SHA11a1658f6c3dd993bd3ec08ca7d599327b9be6a58
SHA2564dee536bea4b65ffa91046262fe8ae0a48088ae21c055063c608f23e670ba0b0
SHA51240bb40dbea96ab17f1b7d34ff635af97fdf10409a6d85a943f9aa2395a461a134a8ce52d70b76878f6c36d8b3fbf592b627c1b77ed7692c165819541e36fa230
-
Filesize
618KB
MD5fa22e2b9ff3086baceedeafbadec9f28
SHA10bb8d621faff9fcfcd8377079b9a47110e8c5c5e
SHA25657e84f2e0c131c0579c6895ff74cc028885addf1ff80631de2a06b870b808bc3
SHA512f80f7e0cc59a592c2cc8502a267dbd7811be6d4769ae0a422b4b63bae77e7a817594da98a9c27a75bf70117e6c8f1ed84fe99adc20b0d9c281e8ee9ecf2839a5
-
Filesize
3KB
MD5446bf1779f1f4c99e90d34218088897a
SHA18fbbfe0f6260a33e5e242746f45bab89bc71b1cb
SHA256fbb113fcbf66becc1465cd0b5238f395a164298d57cb8ae6e860c385fb8c1cd7
SHA5124977809238dc5c3e4786b777e60c58d2651b3dd46ef4c0ce2ab7bdc206eb9cd836dd803c57c2a3ed4e2e9f0e070eb508b9eb647fe3e8b3b1ecc674f57538717e
-
Filesize
5KB
MD52251a99017d81588ba4cc0af38deb03b
SHA10dface4c33f3739aed293685abeb12eca6e4b8e1
SHA2569703a0f61747cbdae01f39a416c5a9a796715ebc5e1c26d908014354477a342b
SHA5122c92c8dfcb39e0d68e083b7ce7e65bdba0a64cb05751ed75a405412f2c56f76da02f8d13a67129a5c5fa947178ee71fd16791ec83596801135312d8d23534a77
-
Filesize
146B
MD514e82d0bd964702dc8a92e0b05a68fec
SHA1a025ef8ba8e3293e473fd11cc722561537afb91c
SHA2560b3ccfe886e6e333fb5757ee01bac43241adc1ed69c23f6e276619ee1b60bed7
SHA512c3d960dfc3b1e5cd64b72fa7ff11074d83f61d6c18e7fcef55dd6e7251479531fa0aca6f51e9082efe40952050f62a4a0e373825bd4ee8ba31ae4b1331572ec2
-
Filesize
144B
MD5fca19198fd8af21016a8b1dec7980002
SHA1fd01a47d14004e17a625efe66cc46a06c786cf40
SHA256332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a
SHA51260f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47
-
Filesize
531B
MD536d98318ab2b3b2585a30984db328afb
SHA1f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5
SHA256ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7
SHA5126f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a
-
Filesize
500B
MD5eb888a20d2eb2efe74abe18df58d0172
SHA19be6abd96c60161c9e5b85e431e162acc4a2fc06
SHA256f5a19172f4809cef7d3df5e0e8923e4ae88bafebce4088b11cce27467638b821
SHA512ff338112cd7c1f827816dfe91c1c977f16697d83a4843be318fd54b4c14f2db060977ed0363acd40c8fb9186796eebff3e48c6d5586049d46ce086f6c605c842
-
C:\Users\Admin\AppData\Local\Temp\7zS1742.tmp\[email protected]\bootstrap.js
Filesize2KB
MD5df13f711e20e9c80171846d4f2f7ae06
SHA156d29cda58427efe0e21d3880d39eb1b0ef60bee
SHA2566c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4
SHA5126c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e
-
C:\Users\Admin\AppData\Local\Temp\7zS1742.tmp\[email protected]\chrome.manifest
Filesize35B
MD54fa93e182ee3d67892dc1bcc55a35ad9
SHA16c3258f38962678e465ec4f9bcebd28c99943f48
SHA2561ea569052d65d39351fc36dc9f246eb5039f8a350643cd648e9542d7c0344976
SHA5121cfe16487e533ba4d186aa4813b55b71d5ef5a6f3a30a01ec01183eb2e42320d8129d6ef504cd0febf8600ed0119a0e9542172963b914444c63b8281868e65c7
-
C:\Users\Admin\AppData\Local\Temp\7zS1742.tmp\[email protected]\content\bg.js
Filesize7KB
MD5f43fc17e789bb9a181229441ac3bd402
SHA100e29277cf4d87f4aeaf5a3af473dd5327bbc13e
SHA256b4a5176fa17ce2e52f961442754312254d14c9fffbb43ccd3a6a929ae0c079e1
SHA512c45e7a6e0d79773bea76ccf775a17104fa08ab2b06b8a8dc60a023b3711d986ffdb78b5188789f636f84be01f83079932f6a5c308b8f09f9452a09807bdfc7dc
-
C:\Users\Admin\AppData\Local\Temp\7zS1742.tmp\[email protected]\install.rdf
Filesize592B
MD58bfe1ae62b7227c94c852f3747995fe2
SHA116f0b860bafccb2a385f043182f2e29041fcc5e9
SHA2567726a5386ea7c0ed30381c7194aad3ecfe7f00a016792c0060e45bf7246febd4
SHA51226c139a0c33822bec7fb243f8dbb31910f96b4e213235fe782ad3f6368802238623474a93bf9c448b8c65a6939c864461cbed37d7e34139833f67d93c9d1b7bd