Analysis
-
max time kernel
145s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 17:09
Static task
static1
Behavioral task
behavioral1
Sample
5821f2110486cb73960961b8e403e5dfd2541566c32c3ef8b4bf12bbaabcd902.exe
Resource
win7-20221111-en
General
-
Target
5821f2110486cb73960961b8e403e5dfd2541566c32c3ef8b4bf12bbaabcd902.exe
-
Size
956KB
-
MD5
2b7aaa2df66ccec1f3cb192e362d5aad
-
SHA1
3eab777d27cea4f2489fcafcb5b0eb087cc10de4
-
SHA256
5821f2110486cb73960961b8e403e5dfd2541566c32c3ef8b4bf12bbaabcd902
-
SHA512
ed3c48be86cd593d57007d8e53a41cd29eb06091badd291356bb722ed08a7a55e5319d961c5f90e6754726b0a28b5623a1e48aff5736b0c91709c225b9657a73
-
SSDEEP
24576:tbDrkJXOH6iiRsUiSf7jturZ/THLJ7zcMNwh:EXOzSsCfN6Z/TrJ7zmh
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
iLB0wHJ0y2MmxrV.exepid process 2728 iLB0wHJ0y2MmxrV.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 5 IoCs
Processes:
iLB0wHJ0y2MmxrV.exedescription ioc process File created C:\Users\DefaultAccount\AppData\Local\Google\Chrome\User Data\Default\Extensions\hjinnciiaifjiapddjhcobmoafjaefmh\2.0\manifest.json iLB0wHJ0y2MmxrV.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\hjinnciiaifjiapddjhcobmoafjaefmh\2.0\manifest.json iLB0wHJ0y2MmxrV.exe File created C:\Users\WDAGUtilityAccount\AppData\Local\Google\Chrome\User Data\Default\Extensions\hjinnciiaifjiapddjhcobmoafjaefmh\2.0\manifest.json iLB0wHJ0y2MmxrV.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\hjinnciiaifjiapddjhcobmoafjaefmh\2.0\manifest.json iLB0wHJ0y2MmxrV.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\hjinnciiaifjiapddjhcobmoafjaefmh\2.0\manifest.json iLB0wHJ0y2MmxrV.exe -
Drops file in System32 directory 4 IoCs
Processes:
iLB0wHJ0y2MmxrV.exedescription ioc process File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI iLB0wHJ0y2MmxrV.exe File opened for modification C:\Windows\System32\GroupPolicy iLB0wHJ0y2MmxrV.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini iLB0wHJ0y2MmxrV.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol iLB0wHJ0y2MmxrV.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
iLB0wHJ0y2MmxrV.exepid process 2728 iLB0wHJ0y2MmxrV.exe 2728 iLB0wHJ0y2MmxrV.exe 2728 iLB0wHJ0y2MmxrV.exe 2728 iLB0wHJ0y2MmxrV.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
5821f2110486cb73960961b8e403e5dfd2541566c32c3ef8b4bf12bbaabcd902.exedescription pid process target process PID 2248 wrote to memory of 2728 2248 5821f2110486cb73960961b8e403e5dfd2541566c32c3ef8b4bf12bbaabcd902.exe iLB0wHJ0y2MmxrV.exe PID 2248 wrote to memory of 2728 2248 5821f2110486cb73960961b8e403e5dfd2541566c32c3ef8b4bf12bbaabcd902.exe iLB0wHJ0y2MmxrV.exe PID 2248 wrote to memory of 2728 2248 5821f2110486cb73960961b8e403e5dfd2541566c32c3ef8b4bf12bbaabcd902.exe iLB0wHJ0y2MmxrV.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5821f2110486cb73960961b8e403e5dfd2541566c32c3ef8b4bf12bbaabcd902.exe"C:\Users\Admin\AppData\Local\Temp\5821f2110486cb73960961b8e403e5dfd2541566c32c3ef8b4bf12bbaabcd902.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\573a447f\iLB0wHJ0y2MmxrV.exe"C:\Users\Admin\AppData\Local\Temp/573a447f/iLB0wHJ0y2MmxrV.exe"2⤵
- Executes dropped EXE
- Drops Chrome extension
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2728
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:4744
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:808
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\573a447f\[email protected]\bootstrap.js
Filesize2KB
MD5df13f711e20e9c80171846d4f2f7ae06
SHA156d29cda58427efe0e21d3880d39eb1b0ef60bee
SHA2566c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4
SHA5126c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e
-
C:\Users\Admin\AppData\Local\Temp\573a447f\[email protected]\chrome.manifest
Filesize35B
MD5ca33d8b941564e4df39118b7b8c5d14a
SHA1263066299a1dd9a4644026fb9963355905da093f
SHA256185298615cc199968ee93fd3a82f26a1c8665ae1d1860a277487a92348f7c905
SHA5120ca0b21878fc19381c75201f688c05f74b15498c9c83b723a48a7e184e679d1b88987a46768c7b5da1477d875c80614857f999857c3113a8f5523a8611cc5fcd
-
C:\Users\Admin\AppData\Local\Temp\573a447f\[email protected]\content\bg.js
Filesize8KB
MD5f2a1137a369e98c4b29f93faddaa6d3d
SHA1daa9a41bcaced59763b1a53d2347510b19dbe0b3
SHA256fd0d59c6e3788cb25c5af66cdcd047f955b0e1754fe78bd01f2b276f36ab5351
SHA5121d9cdc2468c76454ba8a20a296427939d9d97c4a687f6f4996bb2e2d06aed9b0a2d6471350629993c0d54f8468a04ec07a258518e90fbfb3b42dd4a145637c4a
-
C:\Users\Admin\AppData\Local\Temp\573a447f\[email protected]\install.rdf
Filesize599B
MD524c88c4d63b81da3a172f5690a9d18c7
SHA157560a1be891d894113f31ab48b97bf1c10e77f6
SHA256a8bc98bb81015fdcc14eb3b7d03786a9df81f81b3229a81be0230aecb0828d3b
SHA51279ad62ffd7dbbb435cd6d7ff07ffd603eb51b2e77f04755b60769c628706b7d85b9d934fa949986f3dc278ece707d382fe44da686d6c2e43158f0a0f62ed00c4
-
Filesize
147B
MD57ba59199c49548fe62b6a8d11a6467db
SHA118491b7b3c33e488faffd8907ec5fd3ded00f1b5
SHA2567c0f101ce17a4952c061cccd8298c2eccb9c7ae17de2c88ffa74ebd37b0052fc
SHA5122efb30850108c2361e88aa6659fa80d77a216269fd5a2f453661402d9c91a518b333de6ebf1e9ed8978a2811f3510cf0e72379577a44f9e7acc99505701e56a7
-
Filesize
144B
MD5fca19198fd8af21016a8b1dec7980002
SHA1fd01a47d14004e17a625efe66cc46a06c786cf40
SHA256332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a
SHA51260f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47
-
Filesize
531B
MD536d98318ab2b3b2585a30984db328afb
SHA1f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5
SHA256ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7
SHA5126f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a
-
Filesize
499B
MD54bc128fd57cdeb210670ce2e4e1d3e8d
SHA15b3c0df10db3dd0aa59659d1fc4f9bcba86188b5
SHA256d23eb5ab231858616151cd0396a9e3be7cb5ff1124564ed9f9fcd20010e81136
SHA51241fe2601e98f2bd1b9d8cb635d5cfcec8a3845de79e63b7686c35e3ed6c953f7abf23475c71ef64579164ae82dd95af9ba09b585c5333f995f7de25a56e76759
-
Filesize
6KB
MD57e2cab2bbbb91477fc12d588feb327a8
SHA1055a30445bb3c31403f8be416445c1d0c49939e7
SHA2567cfacfd67a73288ebf2b58a73dc9c423a0079f4b0298a583b91f45f76c1891e3
SHA512b51aa340dd2c62e2944aae1c21097945e7b718c424e5dec84884ebade224f2fbc6a4caddeca4cf07bc79d3a335d8e2b5a2873bb84e450f4363c798b991f81c88
-
Filesize
1KB
MD511eeeb4b1e94904f19a9bf8afe07d406
SHA1729f3e077241b39b2551b94967570a3bdae345aa
SHA2565f8146c9a5857a858ae1026b4a73942bf10907c4fdc4bb7e3127289f7bf8e73f
SHA51265519670bc2c22cd1cb5fb3ebaca08432c90a3773bbc6f48524bdc8821a8d8c8da62b2db1a0e7f7ed9d8fa71a2a744318f6c5f9da78ba5467a5f5835b327a318
-
Filesize
625KB
MD504cf637cf931223b102ecfbd3683a084
SHA16fdd13e9a652418123b81edfd721e92495c3ee33
SHA256a4e7bac2d8ef25b8185a5e6a436126a805f55c3d4299e847eb5a8ad20877ed88
SHA51244a7306ffaac172c73575aca5ed4edd5e09887123eb25725722227f86c432a76cabfb350506c4e495c5df93c928d81883519889f46c3e9ac098fb4024b306007
-
Filesize
625KB
MD504cf637cf931223b102ecfbd3683a084
SHA16fdd13e9a652418123b81edfd721e92495c3ee33
SHA256a4e7bac2d8ef25b8185a5e6a436126a805f55c3d4299e847eb5a8ad20877ed88
SHA51244a7306ffaac172c73575aca5ed4edd5e09887123eb25725722227f86c432a76cabfb350506c4e495c5df93c928d81883519889f46c3e9ac098fb4024b306007