Analysis

  • max time kernel
    3s
  • max time network
    51s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 13:00

General

  • Target

    d48e9bec9842e7ab2ad0fe5b9d47e85fb9c9349f40813c16bf59a16ac4267f39.exe

  • Size

    1.6MB

  • MD5

    34391bc02afb14842325b2c6f65ce7a9

  • SHA1

    bce4c65f2dce6b8a20d9622a268e655ce582e83e

  • SHA256

    d48e9bec9842e7ab2ad0fe5b9d47e85fb9c9349f40813c16bf59a16ac4267f39

  • SHA512

    dad94fe0264f23a406fbd1c2d23f492ad04b0660f5cb7321b326e44a84b950c83ac1baa7900c3776d259595494043425c23f7edde8ceb1cd820362632dbb149a

  • SSDEEP

    24576:d8KxJKb+XyQZ3jrEc0+q4Kim2kvzcmIFK3LX7LaBrQ2R9sjeQgrKYk1eTF1dOJRH:Qb0xE4tmLXniQW97QPYk19vFR

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 3 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d48e9bec9842e7ab2ad0fe5b9d47e85fb9c9349f40813c16bf59a16ac4267f39.exe
    "C:\Users\Admin\AppData\Local\Temp\d48e9bec9842e7ab2ad0fe5b9d47e85fb9c9349f40813c16bf59a16ac4267f39.exe"
    1⤵
    • Drops Chrome extension
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    PID:1736

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1736-54-0x0000000076531000-0x0000000076533000-memory.dmp
    Filesize

    8KB

  • memory/1736-55-0x0000000000590000-0x0000000000637000-memory.dmp
    Filesize

    668KB

  • memory/1736-60-0x0000000000792000-0x0000000000796000-memory.dmp
    Filesize

    16KB

  • memory/1736-61-0x0000000000792000-0x0000000000796000-memory.dmp
    Filesize

    16KB

  • memory/1736-62-0x0000000000792000-0x0000000000796000-memory.dmp
    Filesize

    16KB

  • memory/1736-63-0x0000000000792000-0x0000000000796000-memory.dmp
    Filesize

    16KB

  • memory/1736-64-0x0000000000792000-0x0000000000796000-memory.dmp
    Filesize

    16KB

  • memory/1736-65-0x0000000000792000-0x0000000000796000-memory.dmp
    Filesize

    16KB

  • memory/1736-66-0x0000000000792000-0x0000000000796000-memory.dmp
    Filesize

    16KB

  • memory/1736-67-0x0000000000792000-0x0000000000796000-memory.dmp
    Filesize

    16KB

  • memory/1736-68-0x0000000000792000-0x0000000000796000-memory.dmp
    Filesize

    16KB

  • memory/1736-69-0x0000000000792000-0x0000000000796000-memory.dmp
    Filesize

    16KB

  • memory/1736-70-0x0000000000792000-0x0000000000796000-memory.dmp
    Filesize

    16KB

  • memory/1736-71-0x0000000000792000-0x0000000000796000-memory.dmp
    Filesize

    16KB

  • memory/1736-72-0x0000000000792000-0x0000000000796000-memory.dmp
    Filesize

    16KB

  • memory/1736-73-0x0000000000792000-0x0000000000796000-memory.dmp
    Filesize

    16KB

  • memory/1736-74-0x0000000000792000-0x0000000000796000-memory.dmp
    Filesize

    16KB

  • memory/1736-75-0x0000000000792000-0x0000000000796000-memory.dmp
    Filesize

    16KB

  • memory/1736-76-0x0000000000792000-0x0000000000796000-memory.dmp
    Filesize

    16KB

  • memory/1736-77-0x0000000000792000-0x0000000000796000-memory.dmp
    Filesize

    16KB

  • memory/1736-78-0x0000000000792000-0x0000000000796000-memory.dmp
    Filesize

    16KB