Analysis

  • max time kernel
    29s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 14:28

General

  • Target

    44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe

  • Size

    2.9MB

  • MD5

    619f94a96f83368d205f44d34fb24061

  • SHA1

    2b996a2cf1e57cbd377b301cb1bbbde876b0ba7e

  • SHA256

    44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f

  • SHA512

    e2a626e74da57433fe4f531a23fb9909404ab639dbef650cb501fbb0bcf2959f41bf0ca67de2bc5ae0ad57712358f1b70309b2ccfce62f81de6ca440851dad68

  • SSDEEP

    49152:wNlIwOj323Z/CYbkOoZyNuWL5mq+9Ou4SzROsp6XmICGFbsbg1VL9enR:WWoFCYbMCLYcPxYmRQg1U

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs 4 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 3 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 8 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Program Files directory 8 IoCs
  • Modifies Internet Explorer settings 1 TTPs 8 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe
    "C:\Users\Admin\AppData\Local\Temp\44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe"
    1⤵
    • Loads dropped DLL
    • Drops Chrome extension
    • Installs/modifies Browser Helper Object
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1756
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32.exe /s "C:\Program Files (x86)\cosstminn\LVl_.x64.dll"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1008
      • C:\Windows\system32\regsvr32.exe
        /s "C:\Program Files (x86)\cosstminn\LVl_.x64.dll"
        3⤵
        • Registers COM server for autorun
        • Loads dropped DLL
        • Installs/modifies Browser Helper Object
        • Modifies Internet Explorer settings
        • Modifies registry class
        PID:1860

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\cosstminn\LVl_.dat

    Filesize

    4KB

    MD5

    613911524406c85d6254e9c3246ad5a9

    SHA1

    b0d5f8deaf1d3dd3876f013b62acd5fc1e61d922

    SHA256

    4862b819d2d1904015d6bc73989c799c73c31ad19e162fbfe76cfe48b9b914c1

    SHA512

    7e3785bd8cfe238db746b68316b0aaff7ae7a2d60287a7b31141d8a8a54f2003bdc0943d53002e3eaf65c0246ba9c451b8992b1fe177c0b1e8bf17afdc4585c3

  • C:\Program Files (x86)\cosstminn\LVl_.tlb

    Filesize

    3KB

    MD5

    531346571ee2e23320503dd0cf8dde04

    SHA1

    ed110980a7d9e2b1fe6e870291cfbcaf1d2c1219

    SHA256

    5a60546a281eb5a6961b925a60995cb8f888cc1a66e327e6263c21ea3d3b0e7c

    SHA512

    7e04a177e6375f382a88d01a43763e0f4be945426b6635b262597408a320b0e2f0aabea394a923be60c79a009c1737104b69cb5e47bc884215966a8cd679d691

  • C:\Program Files (x86)\cosstminn\LVl_.x64.dll

    Filesize

    687KB

    MD5

    81d4889568a6f6e358ca9a3d307765e1

    SHA1

    60990e17843d1de4b2ed29acd97e988c33b5e55e

    SHA256

    b1b3213c365c3bb4047a30446181aab8cd835eda9a4ebfb02d29f8629d205bfc

    SHA512

    689289e254060a9f5e6e3c2ad69871c28cb9bd7cf5af16257a95a65205ae2c52c928737dac348084a8870f69de9f530c60f2895d4cfccc2275d0f8f25420f138

  • \Program Files (x86)\cosstminn\LVl_.dll

    Filesize

    605KB

    MD5

    72ae14ac560cd862a9dc671547286d1b

    SHA1

    929cc12b75cbcbbb18ca5d1a8d463fd0bf607d19

    SHA256

    0e3cd6bddd4109628f9193cbd68da68a06d92bdc6afd2544b6d2cf7a25813f9a

    SHA512

    ebc2da889fb26a2137783e1fadbd7d6f9eed47449df6583efd9df66f89c6c05fd34d01c8da15cbf64d493f07bcbcc0d84800e7bbe34fb7d7e018c1a5de265c26

  • \Program Files (x86)\cosstminn\LVl_.x64.dll

    Filesize

    687KB

    MD5

    81d4889568a6f6e358ca9a3d307765e1

    SHA1

    60990e17843d1de4b2ed29acd97e988c33b5e55e

    SHA256

    b1b3213c365c3bb4047a30446181aab8cd835eda9a4ebfb02d29f8629d205bfc

    SHA512

    689289e254060a9f5e6e3c2ad69871c28cb9bd7cf5af16257a95a65205ae2c52c928737dac348084a8870f69de9f530c60f2895d4cfccc2275d0f8f25420f138

  • \Program Files (x86)\cosstminn\LVl_.x64.dll

    Filesize

    687KB

    MD5

    81d4889568a6f6e358ca9a3d307765e1

    SHA1

    60990e17843d1de4b2ed29acd97e988c33b5e55e

    SHA256

    b1b3213c365c3bb4047a30446181aab8cd835eda9a4ebfb02d29f8629d205bfc

    SHA512

    689289e254060a9f5e6e3c2ad69871c28cb9bd7cf5af16257a95a65205ae2c52c928737dac348084a8870f69de9f530c60f2895d4cfccc2275d0f8f25420f138

  • memory/1008-82-0x0000000000000000-mapping.dmp

  • memory/1756-54-0x0000000076221000-0x0000000076223000-memory.dmp

    Filesize

    8KB

  • memory/1756-55-0x00000000026B0000-0x0000000002752000-memory.dmp

    Filesize

    648KB

  • memory/1860-86-0x0000000000000000-mapping.dmp

  • memory/1860-87-0x000007FEFC261000-0x000007FEFC263000-memory.dmp

    Filesize

    8KB