Analysis
-
max time kernel
39s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 15:51
Static task
static1
Behavioral task
behavioral1
Sample
d19066fdba5933ad5e57e8fae45074bab4b5e9de1bce36160797037ee6fe3253.exe
Resource
win7-20220901-en
General
-
Target
d19066fdba5933ad5e57e8fae45074bab4b5e9de1bce36160797037ee6fe3253.exe
-
Size
2.3MB
-
MD5
63861e80bdd0fff111929b7744c83ddb
-
SHA1
c19fee3985cf06abfc382c4d3ea54fd316d81a30
-
SHA256
d19066fdba5933ad5e57e8fae45074bab4b5e9de1bce36160797037ee6fe3253
-
SHA512
1994517c3ab863271d57691144a62601f0829b5dc3b7205722cc41e820f72910a1568a4d43264564be5ff026be573cf5ce8aef157feb714b43bf3f5df016ee9e
-
SSDEEP
49152:a0F4YdPULY7HS4BbRT7DYeJ1gz/vMCApZT:z+scLD4xdDJzC
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 3 IoCs
Processes:
d19066fdba5933ad5e57e8fae45074bab4b5e9de1bce36160797037ee6fe3253.exedescription ioc process File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\gelelppmljgikldclmajoknoianojnec\2.0\manifest.json d19066fdba5933ad5e57e8fae45074bab4b5e9de1bce36160797037ee6fe3253.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gelelppmljgikldclmajoknoianojnec\2.0\manifest.json d19066fdba5933ad5e57e8fae45074bab4b5e9de1bce36160797037ee6fe3253.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\gelelppmljgikldclmajoknoianojnec\2.0\manifest.json d19066fdba5933ad5e57e8fae45074bab4b5e9de1bce36160797037ee6fe3253.exe -
Drops file in System32 directory 4 IoCs
Processes:
d19066fdba5933ad5e57e8fae45074bab4b5e9de1bce36160797037ee6fe3253.exedescription ioc process File opened for modification C:\Windows\System32\GroupPolicy d19066fdba5933ad5e57e8fae45074bab4b5e9de1bce36160797037ee6fe3253.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini d19066fdba5933ad5e57e8fae45074bab4b5e9de1bce36160797037ee6fe3253.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol d19066fdba5933ad5e57e8fae45074bab4b5e9de1bce36160797037ee6fe3253.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI d19066fdba5933ad5e57e8fae45074bab4b5e9de1bce36160797037ee6fe3253.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
d19066fdba5933ad5e57e8fae45074bab4b5e9de1bce36160797037ee6fe3253.exepid process 620 d19066fdba5933ad5e57e8fae45074bab4b5e9de1bce36160797037ee6fe3253.exe 620 d19066fdba5933ad5e57e8fae45074bab4b5e9de1bce36160797037ee6fe3253.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d19066fdba5933ad5e57e8fae45074bab4b5e9de1bce36160797037ee6fe3253.exe"C:\Users\Admin\AppData\Local\Temp\d19066fdba5933ad5e57e8fae45074bab4b5e9de1bce36160797037ee6fe3253.exe"1⤵
- Drops Chrome extension
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:620