Analysis
-
max time kernel
59s -
max time network
67s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 23:45
Static task
static1
Behavioral task
behavioral1
Sample
0fed56146bb46fbc29e1ac756b5deeb4e8e7ef7b2f688109ad4a6343502b824c.exe
Resource
win7-20221111-en
General
-
Target
0fed56146bb46fbc29e1ac756b5deeb4e8e7ef7b2f688109ad4a6343502b824c.exe
-
Size
788KB
-
MD5
916c31203d4f2da5df77d5295036ff4e
-
SHA1
ca80e8d8b8a61046f696ea88b119899114c8b1d0
-
SHA256
0fed56146bb46fbc29e1ac756b5deeb4e8e7ef7b2f688109ad4a6343502b824c
-
SHA512
c6dff4baa2321dfef52bae5dbb70a84541a5b3d45896379e3cb871e406d4054097f4801632a454f3a926db079759dccab09f45711590842ecde5a754d269c89b
-
SSDEEP
24576:h1OYdaOPM9WKfwIBWe9IWK7f6jd9YMhKTOoRW:h1OsgYIGWkf6jd9YMhKKP
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1472 CHPFm90yUYb3C6f.exe -
Loads dropped DLL 1 IoCs
pid Process 956 0fed56146bb46fbc29e1ac756b5deeb4e8e7ef7b2f688109ad4a6343502b824c.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\onklbeonfhmjghhfcclleegpgjkhajbd\2.0\manifest.json CHPFm90yUYb3C6f.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\onklbeonfhmjghhfcclleegpgjkhajbd\2.0\manifest.json CHPFm90yUYb3C6f.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\onklbeonfhmjghhfcclleegpgjkhajbd\2.0\manifest.json CHPFm90yUYb3C6f.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini CHPFm90yUYb3C6f.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol CHPFm90yUYb3C6f.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI CHPFm90yUYb3C6f.exe File opened for modification C:\Windows\System32\GroupPolicy CHPFm90yUYb3C6f.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1472 CHPFm90yUYb3C6f.exe 1472 CHPFm90yUYb3C6f.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 956 wrote to memory of 1472 956 0fed56146bb46fbc29e1ac756b5deeb4e8e7ef7b2f688109ad4a6343502b824c.exe 28 PID 956 wrote to memory of 1472 956 0fed56146bb46fbc29e1ac756b5deeb4e8e7ef7b2f688109ad4a6343502b824c.exe 28 PID 956 wrote to memory of 1472 956 0fed56146bb46fbc29e1ac756b5deeb4e8e7ef7b2f688109ad4a6343502b824c.exe 28 PID 956 wrote to memory of 1472 956 0fed56146bb46fbc29e1ac756b5deeb4e8e7ef7b2f688109ad4a6343502b824c.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0fed56146bb46fbc29e1ac756b5deeb4e8e7ef7b2f688109ad4a6343502b824c.exe"C:\Users\Admin\AppData\Local\Temp\0fed56146bb46fbc29e1ac756b5deeb4e8e7ef7b2f688109ad4a6343502b824c.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Users\Admin\AppData\Local\Temp\7zSE11C.tmp\CHPFm90yUYb3C6f.exe.\CHPFm90yUYb3C6f.exe2⤵
- Executes dropped EXE
- Drops Chrome extension
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1472
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5484583c8bb8843361f1ca200861a6cfd
SHA19f007af262aede774b99ac8dcac4eabdaa9c011d
SHA256fe815822d61a070cdd139da7bd0fee2c9a61487c4f4eadb915edd01ed9d6ff8c
SHA512eca9922495e6e46fce069560768916d63b28f0aab49e8735d6d565c0e9f602324f21039a14e10b59f198ae167f582cc39695a2954e36fde44b14338aafdca647
-
Filesize
629KB
MD5150107c0a55484355ce5881240cca669
SHA135d2f6723091fc4af5c4a00645b6b0f43efd4a06
SHA256c422b33bee8c0b6664a7462093734aea98026ebf7cc9dc65589572213f576f0e
SHA512eb189951a9a89c54c8d7b3a9fcfb97777bd55088186814597ba13e9f985f846e313b5fcd1566de56060ef8cdfb815ed2a77f5c41c02d1c666c47691b1c0aba04
-
C:\Users\Admin\AppData\Local\Temp\7zSE11C.tmp\[email protected]\bootstrap.js
Filesize2KB
MD5df13f711e20e9c80171846d4f2f7ae06
SHA156d29cda58427efe0e21d3880d39eb1b0ef60bee
SHA2566c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4
SHA5126c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e
-
C:\Users\Admin\AppData\Local\Temp\7zSE11C.tmp\[email protected]\chrome.manifest
Filesize35B
MD5906f1b680b1c89a313793bea1d043ffd
SHA1f303241597a74f4f1881b75c5f6fc69529973cc3
SHA2567fe8d5744fb97e2892c148618efca86b387f8aa07d05b6871e120c1acb4c245b
SHA512adf74e6ba4a801a6a39a3530742fc247ac7d62b08acb6effa68ba42e694ed8d2e3656d2bf9ae1dd454511fa254ca4b3e84253b3caa95fd099e7cef4ecffff22c
-
C:\Users\Admin\AppData\Local\Temp\7zSE11C.tmp\[email protected]\content\bg.js
Filesize8KB
MD53b92a7b18d0431ad08b920dbf0d72895
SHA1b022ce4c2c401554466b58294a9d1f1fe2e3105a
SHA25659bb5284d3120f4c4adca84866ec068a52012deafbe1bb0d4f6f928ce3d5b32e
SHA512f734c0858368356b96714e470dbd1bc829e4421e2577a8050029fde6a309ceff14bed3a3d4af7bf4b24cd7eec9d02180a920efe55fe06eed538e5349d174b4e8
-
C:\Users\Admin\AppData\Local\Temp\7zSE11C.tmp\[email protected]\install.rdf
Filesize599B
MD5a053cf9e18dd46479449240174951071
SHA15f7764f214189132b39bb06b55a91edfb125e1c1
SHA256f2a9cc13cfef6f5ba3216ccc2455e72c7104667762682b36ee5570296819bbc0
SHA512e9356e69648f93454c55d3e32542ceced165a644005264b2013ab3b01d28edfcb59c2ba0e0020c224d54387232ce8442b4e00a84214252deb0455a9d6455667b
-
Filesize
6KB
MD5a38ffabb0a8541825a643a1174c6df46
SHA1c8b64e5add411c64f4a9337db21eb9ce66d0aef9
SHA25677b3fccbccd75eaf6efbab30d31f452ef41fd0b353de348fede7121669a336a9
SHA51278e23dfacdedfddbe2fdac372c98ededbc4b533f5afb17adc4ea8987622b41b7e4009ffc1d5ebc8a9f24c282786e637918da716eb779ce93a5955f7362517b58
-
Filesize
141B
MD5ca894502956a370bcdd5f244a9907f99
SHA16f761a943aa193875e716d0093bc88c65c4a3ec3
SHA25616c1c4da1c939e785259134c067cb892b940cf345002449ad1f0fc4c7f09db4c
SHA512a84045c2e25e7754ac2becac759d16243fd8758ad984fe1caf74d3caa5f921a0985c99855ffa749487e82883382b9f35c8d555b7859b4951e569960a90f17bb4
-
Filesize
144B
MD5fca19198fd8af21016a8b1dec7980002
SHA1fd01a47d14004e17a625efe66cc46a06c786cf40
SHA256332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a
SHA51260f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47
-
Filesize
531B
MD536d98318ab2b3b2585a30984db328afb
SHA1f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5
SHA256ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7
SHA5126f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a
-
Filesize
499B
MD54abaf4c10bb987d2b74659ca80be72d2
SHA1891808ba9b934277d531123d76eff8e7eaa1f1a2
SHA2561325d0e358dfc73213f08f73b9c56f2fb064d085942bc2eabef6b652d1a52f84
SHA512a445356dc1d4bd4be918898fdf576f65b90492479ed569422ed71190f2172c4ab4540d057ba4cc5a0976363f23d34739f19e3913b38c8f8e2d409c5e8753688e
-
Filesize
629KB
MD5150107c0a55484355ce5881240cca669
SHA135d2f6723091fc4af5c4a00645b6b0f43efd4a06
SHA256c422b33bee8c0b6664a7462093734aea98026ebf7cc9dc65589572213f576f0e
SHA512eb189951a9a89c54c8d7b3a9fcfb97777bd55088186814597ba13e9f985f846e313b5fcd1566de56060ef8cdfb815ed2a77f5c41c02d1c666c47691b1c0aba04