Analysis

  • max time kernel
    141s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 16:48

General

  • Target

    7905619309cfee42fde210ebd8f8c37080bc7611a9ddc2a2085f0a55809fce86.exe

  • Size

    3.6MB

  • MD5

    5291e8bfa24cf819bedaf007143b273c

  • SHA1

    6890e461372268f404f74b848f65fa299eb843b1

  • SHA256

    7905619309cfee42fde210ebd8f8c37080bc7611a9ddc2a2085f0a55809fce86

  • SHA512

    34000c58fc38712090be814e3b9aebb6ab5da5f16acf6e4ded339b43dfd6780b0a43c4aa6b5156d4690b89ca20d29ab670bbb3de6fc08600bccc75fc43adefe3

  • SSDEEP

    49152:zlG1jOfFTPFPODINpAa3eVqkV4HJKhY7DEcLhJKI054uXTbhKgqk8oq5I1+Kl7kr:ZG16fFZmUAa3u0K0qVX5P8s7kT

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs 4 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 5 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 8 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Program Files directory 8 IoCs
  • Modifies Internet Explorer settings 1 TTPs 8 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7905619309cfee42fde210ebd8f8c37080bc7611a9ddc2a2085f0a55809fce86.exe
    "C:\Users\Admin\AppData\Local\Temp\7905619309cfee42fde210ebd8f8c37080bc7611a9ddc2a2085f0a55809fce86.exe"
    1⤵
    • Loads dropped DLL
    • Drops Chrome extension
    • Installs/modifies Browser Helper Object
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:4964
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32.exe /s "C:\Program Files (x86)\PriceLess\wN4Sf61Gnh0bgt.x64.dll"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:4464
      • C:\Windows\system32\regsvr32.exe
        /s "C:\Program Files (x86)\PriceLess\wN4Sf61Gnh0bgt.x64.dll"
        3⤵
        • Registers COM server for autorun
        • Loads dropped DLL
        • Installs/modifies Browser Helper Object
        • Modifies Internet Explorer settings
        • Modifies registry class
        PID:3676
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
    1⤵
      PID:4480
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
      1⤵
        PID:1580

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\PriceLess\wN4Sf61Gnh0bgt.dat

        Filesize

        3KB

        MD5

        a0f81f8151861df16c89d577ddbdf8dd

        SHA1

        6abce57943281462ecedb83eda10a54f684ac8a9

        SHA256

        69e154f1abfde3349f0f91fecc43a2d237701c1e3bfd0f5cfa142399eccb4dfb

        SHA512

        c18412d99f9e1b28dc05eccfaa52fc5bf98cd5227175f080d049ace379e38dd32a96d9e185370dc50e55e6ff850d701789e4a86abc570676eca70dad60757cf4

      • C:\Program Files (x86)\PriceLess\wN4Sf61Gnh0bgt.dll

        Filesize

        621KB

        MD5

        f83e1d285fd555033363c873a035eaa8

        SHA1

        8d9807732d3afc5b859f80a3d5d1ed9441fee8f5

        SHA256

        19eb0207cff8f32182b16f8bb2ac81d05ee68a8754e31146376fb39b2f7cb23d

        SHA512

        cf415d65d43ae65a3b3a5f17f5be51339784ca67cf387ab235a80474d8d02a21f5e32e80b93561140b9890bb718ce17e3c3471687a71bcc0aa7551560c400d80

      • C:\Program Files (x86)\PriceLess\wN4Sf61Gnh0bgt.tlb

        Filesize

        3KB

        MD5

        8eaf79892b19435884ff045bce1315e4

        SHA1

        38c843500d6f1f40392038257d04352bb0e5974a

        SHA256

        c268494c35ce0a6d0f12480b319e01e4454f37f7f5e2a4dba3663d130ef0b392

        SHA512

        d98bb8ee1b4abe9ba2a3e924cafecd1a8f9880c9519ea7c5aaed645cb7a65d50dcc84c309a6e16f5a3c9b489271458fe3e211ae6efd9ee8f44509fbe7c9e221e

      • C:\Program Files (x86)\PriceLess\wN4Sf61Gnh0bgt.x64.dll

        Filesize

        700KB

        MD5

        8f24dd048bd99349732315da3740ab6f

        SHA1

        9d3eed72ebbd7c80877da59f5112878f1a1e4be2

        SHA256

        eabbf9c6c7a760307bdb6413614d7240032b72ebc60e16b2a8bd54e2d8b70d6c

        SHA512

        627e307cec8e2b2c2b733d3c4f7a34b8daf34c6a26950e17eb9a9304da7f8bf0ace36d79508cd6955322b3afed4048dded631b6f55e534c594dc52d448a80f3a

      • C:\Program Files (x86)\PriceLess\wN4Sf61Gnh0bgt.x64.dll

        Filesize

        700KB

        MD5

        8f24dd048bd99349732315da3740ab6f

        SHA1

        9d3eed72ebbd7c80877da59f5112878f1a1e4be2

        SHA256

        eabbf9c6c7a760307bdb6413614d7240032b72ebc60e16b2a8bd54e2d8b70d6c

        SHA512

        627e307cec8e2b2c2b733d3c4f7a34b8daf34c6a26950e17eb9a9304da7f8bf0ace36d79508cd6955322b3afed4048dded631b6f55e534c594dc52d448a80f3a

      • C:\Program Files (x86)\PriceLess\wN4Sf61Gnh0bgt.x64.dll

        Filesize

        700KB

        MD5

        8f24dd048bd99349732315da3740ab6f

        SHA1

        9d3eed72ebbd7c80877da59f5112878f1a1e4be2

        SHA256

        eabbf9c6c7a760307bdb6413614d7240032b72ebc60e16b2a8bd54e2d8b70d6c

        SHA512

        627e307cec8e2b2c2b733d3c4f7a34b8daf34c6a26950e17eb9a9304da7f8bf0ace36d79508cd6955322b3afed4048dded631b6f55e534c594dc52d448a80f3a

      • memory/3676-141-0x0000000000000000-mapping.dmp

      • memory/4464-138-0x0000000000000000-mapping.dmp

      • memory/4964-132-0x0000000003130000-0x00000000031D2000-memory.dmp

        Filesize

        648KB