Analysis
-
max time kernel
45s -
max time network
69s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 13:33
Static task
static1
Behavioral task
behavioral1
Sample
9c2b7a04a3f6c17e60305704cc932a47a3c293dc78e844bfe8be9809e8f9cfe3.exe
Resource
win7-20220901-en
General
-
Target
9c2b7a04a3f6c17e60305704cc932a47a3c293dc78e844bfe8be9809e8f9cfe3.exe
-
Size
1.6MB
-
MD5
1feaafd93d5a9922a59924e799884550
-
SHA1
da19dd53c1bde0ab3781995a706e65d080939850
-
SHA256
9c2b7a04a3f6c17e60305704cc932a47a3c293dc78e844bfe8be9809e8f9cfe3
-
SHA512
060a5dd649af46465658d150889c8b227c6924526ddd49b052843350729e0f01dd9aee792acf36dbf0becac7c660d64615c7f05cebba3ac978bb26f2a9ab3038
-
SSDEEP
24576:j3Kxpq7FXyYZ3j4MO6l0eKYtiLXftzcNbOKXAUKCY07u8Sb4P7VxwzgvwW3VsPJt:77Np8MO6wLGAUR7jwRW3Su2N
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 3 IoCs
Processes:
9c2b7a04a3f6c17e60305704cc932a47a3c293dc78e844bfe8be9809e8f9cfe3.exedescription ioc process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\mpglhpajdkiohfhfcnmldlehehgccbeb\2.0\manifest.json 9c2b7a04a3f6c17e60305704cc932a47a3c293dc78e844bfe8be9809e8f9cfe3.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\mpglhpajdkiohfhfcnmldlehehgccbeb\2.0\manifest.json 9c2b7a04a3f6c17e60305704cc932a47a3c293dc78e844bfe8be9809e8f9cfe3.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\mpglhpajdkiohfhfcnmldlehehgccbeb\2.0\manifest.json 9c2b7a04a3f6c17e60305704cc932a47a3c293dc78e844bfe8be9809e8f9cfe3.exe -
Drops file in System32 directory 4 IoCs
Processes:
9c2b7a04a3f6c17e60305704cc932a47a3c293dc78e844bfe8be9809e8f9cfe3.exedescription ioc process File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini 9c2b7a04a3f6c17e60305704cc932a47a3c293dc78e844bfe8be9809e8f9cfe3.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol 9c2b7a04a3f6c17e60305704cc932a47a3c293dc78e844bfe8be9809e8f9cfe3.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI 9c2b7a04a3f6c17e60305704cc932a47a3c293dc78e844bfe8be9809e8f9cfe3.exe File opened for modification C:\Windows\System32\GroupPolicy 9c2b7a04a3f6c17e60305704cc932a47a3c293dc78e844bfe8be9809e8f9cfe3.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
9c2b7a04a3f6c17e60305704cc932a47a3c293dc78e844bfe8be9809e8f9cfe3.exepid process 1600 9c2b7a04a3f6c17e60305704cc932a47a3c293dc78e844bfe8be9809e8f9cfe3.exe 1600 9c2b7a04a3f6c17e60305704cc932a47a3c293dc78e844bfe8be9809e8f9cfe3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c2b7a04a3f6c17e60305704cc932a47a3c293dc78e844bfe8be9809e8f9cfe3.exe"C:\Users\Admin\AppData\Local\Temp\9c2b7a04a3f6c17e60305704cc932a47a3c293dc78e844bfe8be9809e8f9cfe3.exe"1⤵
- Drops Chrome extension
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1600