Analysis

  • max time kernel
    43s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 12:49

General

  • Target

    e73b47c344e0e0e20559aec7181764e1efd793d62ea5934235f436c999146b1e.exe

  • Size

    1.6MB

  • MD5

    6bcb0c0c6f32309054fc3d4ce0bae3c7

  • SHA1

    261c33072f9e2f8d87591b09f606f467656d49e5

  • SHA256

    e73b47c344e0e0e20559aec7181764e1efd793d62ea5934235f436c999146b1e

  • SHA512

    07fe28a183a2bf9faf09a0f550a4d7aa7f689ac3905fa94ef961849362feb6c65fac298fdcf3f59d3e7f585fa98d823230f07a15ff7a2d7a821556dc7e53c867

  • SSDEEP

    24576:J3Kxpq7FXyYZ3j4MO6l0eKYtiLXftzcNbOKX5+QInQphrvgpl2vRR7rC7T96ZoG+:p7Np8MO6wLG4Sgb2vRRUT9uo5

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 3 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e73b47c344e0e0e20559aec7181764e1efd793d62ea5934235f436c999146b1e.exe
    "C:\Users\Admin\AppData\Local\Temp\e73b47c344e0e0e20559aec7181764e1efd793d62ea5934235f436c999146b1e.exe"
    1⤵
    • Drops Chrome extension
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    PID:1184

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1184-54-0x0000000074BB1000-0x0000000074BB3000-memory.dmp
    Filesize

    8KB

  • memory/1184-55-0x0000000002230000-0x00000000022D7000-memory.dmp
    Filesize

    668KB

  • memory/1184-60-0x00000000006F2000-0x00000000006F6000-memory.dmp
    Filesize

    16KB

  • memory/1184-61-0x00000000006F2000-0x00000000006F6000-memory.dmp
    Filesize

    16KB

  • memory/1184-62-0x00000000006F2000-0x00000000006F6000-memory.dmp
    Filesize

    16KB

  • memory/1184-63-0x00000000006F2000-0x00000000006F6000-memory.dmp
    Filesize

    16KB

  • memory/1184-64-0x00000000006F2000-0x00000000006F6000-memory.dmp
    Filesize

    16KB

  • memory/1184-65-0x00000000006F2000-0x00000000006F6000-memory.dmp
    Filesize

    16KB

  • memory/1184-66-0x00000000006F2000-0x00000000006F6000-memory.dmp
    Filesize

    16KB

  • memory/1184-67-0x00000000006F2000-0x00000000006F6000-memory.dmp
    Filesize

    16KB

  • memory/1184-68-0x00000000006F2000-0x00000000006F6000-memory.dmp
    Filesize

    16KB

  • memory/1184-69-0x00000000006F2000-0x00000000006F6000-memory.dmp
    Filesize

    16KB

  • memory/1184-70-0x00000000006F2000-0x00000000006F6000-memory.dmp
    Filesize

    16KB

  • memory/1184-71-0x00000000006F2000-0x00000000006F6000-memory.dmp
    Filesize

    16KB

  • memory/1184-72-0x00000000006F2000-0x00000000006F6000-memory.dmp
    Filesize

    16KB

  • memory/1184-73-0x00000000006F2000-0x00000000006F6000-memory.dmp
    Filesize

    16KB

  • memory/1184-74-0x00000000006F2000-0x00000000006F6000-memory.dmp
    Filesize

    16KB

  • memory/1184-75-0x00000000006F2000-0x00000000006F6000-memory.dmp
    Filesize

    16KB

  • memory/1184-76-0x00000000006F2000-0x00000000006F6000-memory.dmp
    Filesize

    16KB

  • memory/1184-77-0x00000000006F2000-0x00000000006F6000-memory.dmp
    Filesize

    16KB

  • memory/1184-78-0x00000000006F2000-0x00000000006F6000-memory.dmp
    Filesize

    16KB