Analysis

  • max time kernel
    44s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 12:50

General

  • Target

    e54b81b3b492b2d0fea0b3ec5a23bfd3070f014fde5c90a8fd1a476f6cee9839.exe

  • Size

    3.0MB

  • MD5

    298d9f4141bbf96a65181018e438c0d2

  • SHA1

    3589a1c0fe75043adddc6f6b914fa5dc5d118957

  • SHA256

    e54b81b3b492b2d0fea0b3ec5a23bfd3070f014fde5c90a8fd1a476f6cee9839

  • SHA512

    141317d11fade4685435dc6beabcf3675fc583bea082d5b01283b965e0e39d132da6c6c235b7a0652d2c09a4a0df684040a9491eb72db9a02f62b4c930fcf203

  • SSDEEP

    49152:KakLXT1thrZAm2ypwiGJoZebkxlbFHuGlXcbKtNnHrN91F8ujWsBWKJmi:KaIXTUCKimkvbzxxLNFDjWtI

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs 4 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 3 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 8 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Program Files directory 8 IoCs
  • Modifies Internet Explorer settings 1 TTPs 8 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e54b81b3b492b2d0fea0b3ec5a23bfd3070f014fde5c90a8fd1a476f6cee9839.exe
    "C:\Users\Admin\AppData\Local\Temp\e54b81b3b492b2d0fea0b3ec5a23bfd3070f014fde5c90a8fd1a476f6cee9839.exe"
    1⤵
    • Loads dropped DLL
    • Drops Chrome extension
    • Installs/modifies Browser Helper Object
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1996
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32.exe /s "C:\Program Files (x86)\cosstminn\FjQMtN.x64.dll"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1680
      • C:\Windows\system32\regsvr32.exe
        /s "C:\Program Files (x86)\cosstminn\FjQMtN.x64.dll"
        3⤵
        • Registers COM server for autorun
        • Loads dropped DLL
        • Installs/modifies Browser Helper Object
        • Modifies Internet Explorer settings
        • Modifies registry class
        PID:984

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\cosstminn\FjQMtN.dat
    Filesize

    4KB

    MD5

    caa33632bdb2b03a2381f19a87ce8439

    SHA1

    c286b78f9926c7d217eb0c9b9ab67ddb080e1e4a

    SHA256

    aa782c770454073cfccbc54a206a523b22543b05a5316f12e3d3957d1229575e

    SHA512

    f5baa7f1575ddedf15936094f7e0fe7d7f9cab560f5c9defa8e9f75021f4fb71acf4977f08d4234d83a84a3fa9d6f518a25cf42f2d207542e2011e263b55a495

  • C:\Program Files (x86)\cosstminn\FjQMtN.tlb
    Filesize

    3KB

    MD5

    3fdfaa71c68f31e83daf46b214ff8c89

    SHA1

    fe4a9d2172e9a94570f46fc151b94f90db08da77

    SHA256

    2d4e42ee22cf2171777f6f2aa232df7a2ad3445b6988ee2f2666ec2a863aca93

    SHA512

    392faf168a97d35fc4fa414844cae3662d231f18d5db55891e6cf281f34cef590cb94f6a650565b5b2bdf2c0899dc872c432106449604079f3283da241f2a100

  • C:\Program Files (x86)\cosstminn\FjQMtN.x64.dll
    Filesize

    687KB

    MD5

    cd1a0489adc1f05fc31a65eb26e08c92

    SHA1

    95af9d7095d36dee3e4d2e2952ca1a199c2bb596

    SHA256

    b63804fa2e99e3bd6b8dac3e203cba731ae2317e1fdae32014a88ff40a7a4755

    SHA512

    52bc43818912822eb746196aea22b11287a914f156c2838e8c2bc01469758ac18f0575df3d05f7b37042e8c3fd88d5c905d69f359963d5d57c42d0bd7b073c19

  • \Program Files (x86)\cosstminn\FjQMtN.dll
    Filesize

    610KB

    MD5

    8c17652e3d7951221e9afeb07a4c71e6

    SHA1

    68aeb97e567f4e705d4126a60bd94ef567760b61

    SHA256

    4085d30c67ed3d336266d7dd5c2a1bfac8e6ba45f9240b31283e43ac9555ea24

    SHA512

    6f21a4058579e7babe1ee44199fc41bf282d6e0c92352c636f39160c7c9e61191f9eb4186dcba8f0a25cf51f97c181e3027f2bbcee9f723a85de159121655065

  • \Program Files (x86)\cosstminn\FjQMtN.x64.dll
    Filesize

    687KB

    MD5

    cd1a0489adc1f05fc31a65eb26e08c92

    SHA1

    95af9d7095d36dee3e4d2e2952ca1a199c2bb596

    SHA256

    b63804fa2e99e3bd6b8dac3e203cba731ae2317e1fdae32014a88ff40a7a4755

    SHA512

    52bc43818912822eb746196aea22b11287a914f156c2838e8c2bc01469758ac18f0575df3d05f7b37042e8c3fd88d5c905d69f359963d5d57c42d0bd7b073c19

  • \Program Files (x86)\cosstminn\FjQMtN.x64.dll
    Filesize

    687KB

    MD5

    cd1a0489adc1f05fc31a65eb26e08c92

    SHA1

    95af9d7095d36dee3e4d2e2952ca1a199c2bb596

    SHA256

    b63804fa2e99e3bd6b8dac3e203cba731ae2317e1fdae32014a88ff40a7a4755

    SHA512

    52bc43818912822eb746196aea22b11287a914f156c2838e8c2bc01469758ac18f0575df3d05f7b37042e8c3fd88d5c905d69f359963d5d57c42d0bd7b073c19

  • memory/984-85-0x000007FEFBBF1000-0x000007FEFBBF3000-memory.dmp
    Filesize

    8KB

  • memory/984-84-0x0000000000000000-mapping.dmp
  • memory/1680-80-0x0000000000000000-mapping.dmp
  • memory/1996-65-0x00000000005D2000-0x00000000005D6000-memory.dmp
    Filesize

    16KB

  • memory/1996-78-0x00000000005D2000-0x00000000005D6000-memory.dmp
    Filesize

    16KB

  • memory/1996-69-0x00000000005D2000-0x00000000005D6000-memory.dmp
    Filesize

    16KB

  • memory/1996-71-0x00000000005D2000-0x00000000005D6000-memory.dmp
    Filesize

    16KB

  • memory/1996-70-0x00000000005D2000-0x00000000005D6000-memory.dmp
    Filesize

    16KB

  • memory/1996-72-0x00000000005D2000-0x00000000005D6000-memory.dmp
    Filesize

    16KB

  • memory/1996-73-0x00000000005D2000-0x00000000005D6000-memory.dmp
    Filesize

    16KB

  • memory/1996-74-0x00000000005D2000-0x00000000005D6000-memory.dmp
    Filesize

    16KB

  • memory/1996-75-0x00000000005D2000-0x00000000005D6000-memory.dmp
    Filesize

    16KB

  • memory/1996-76-0x00000000005D2000-0x00000000005D6000-memory.dmp
    Filesize

    16KB

  • memory/1996-77-0x00000000005D2000-0x00000000005D6000-memory.dmp
    Filesize

    16KB

  • memory/1996-67-0x00000000005D2000-0x00000000005D6000-memory.dmp
    Filesize

    16KB

  • memory/1996-68-0x00000000005D2000-0x00000000005D6000-memory.dmp
    Filesize

    16KB

  • memory/1996-66-0x00000000005D2000-0x00000000005D6000-memory.dmp
    Filesize

    16KB

  • memory/1996-54-0x00000000760E1000-0x00000000760E3000-memory.dmp
    Filesize

    8KB

  • memory/1996-64-0x00000000005D2000-0x00000000005D6000-memory.dmp
    Filesize

    16KB

  • memory/1996-63-0x00000000005D2000-0x00000000005D6000-memory.dmp
    Filesize

    16KB

  • memory/1996-62-0x00000000005D2000-0x00000000005D6000-memory.dmp
    Filesize

    16KB

  • memory/1996-61-0x00000000005D2000-0x00000000005D6000-memory.dmp
    Filesize

    16KB

  • memory/1996-60-0x00000000005D2000-0x00000000005D6000-memory.dmp
    Filesize

    16KB

  • memory/1996-55-0x0000000000480000-0x0000000000520000-memory.dmp
    Filesize

    640KB