Analysis

  • max time kernel
    147s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 17:09

General

  • Target

    57ae8abc921e9b769119a3c88ae8b7f73a8b6baa5fa62c4e29d9e698755da974.exe

  • Size

    3.4MB

  • MD5

    8c64221d6b89e68b8d5d48375563433b

  • SHA1

    b2cc46dc149759878ba186be9a2ed70283537888

  • SHA256

    57ae8abc921e9b769119a3c88ae8b7f73a8b6baa5fa62c4e29d9e698755da974

  • SHA512

    c9e254eb287971812c87474435f3b42d791ef2974c7bbde70eb66ed6706961e9532ae8aa8715b2447126b23adb977998b882c0bfae14960f33fc7b1710026c64

  • SSDEEP

    49152:uefQ1vDuSjEaizTGVmhZ0t1zpLFnXGIBy436BgQhcGUYnUltOsJHUWfnS:ueCvaQiPTgX3336BhcGZGtOsJ

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs 4 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 5 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 8 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Program Files directory 8 IoCs
  • Modifies Internet Explorer settings 1 TTPs 8 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\57ae8abc921e9b769119a3c88ae8b7f73a8b6baa5fa62c4e29d9e698755da974.exe
    "C:\Users\Admin\AppData\Local\Temp\57ae8abc921e9b769119a3c88ae8b7f73a8b6baa5fa62c4e29d9e698755da974.exe"
    1⤵
    • Loads dropped DLL
    • Drops Chrome extension
    • Installs/modifies Browser Helper Object
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:896
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32.exe /s "C:\Program Files (x86)\SmArTOnes\stT7WhWjRsbWOv.x64.dll"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:3180
      • C:\Windows\system32\regsvr32.exe
        /s "C:\Program Files (x86)\SmArTOnes\stT7WhWjRsbWOv.x64.dll"
        3⤵
        • Registers COM server for autorun
        • Loads dropped DLL
        • Installs/modifies Browser Helper Object
        • Modifies Internet Explorer settings
        • Modifies registry class
        PID:4536
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
    1⤵
      PID:796
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
      1⤵
        PID:792

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\SmArTOnes\stT7WhWjRsbWOv.dat

        Filesize

        4KB

        MD5

        89d2472f1563db5deffb7a34fe48d3ba

        SHA1

        60ca8476b016813d8c53b1f4b372609b966bd91a

        SHA256

        6f15b1aa4933dd3be54245767dd4cd4b9c642422fedd27697bbe0e83435a3642

        SHA512

        8c70d8471ddc01dc53179cd332090ca0b710e55e668cc8bfdc1b0f171858c8b29b6e65946dcda5b842a336d8a53b1aee117afb7752ce8c43e1466409d3454f05

      • C:\Program Files (x86)\SmArTOnes\stT7WhWjRsbWOv.dll

        Filesize

        625KB

        MD5

        a2fdf8d26d1dac389e01c2c3f627abaa

        SHA1

        f101a3679dea4112a3330befc7c0be2b3cb49aee

        SHA256

        0b2b0af0016603c275bcf89662bb42c522fa9bce57c1cde008137c4db6edf348

        SHA512

        7be9a1625dc59fe1909a0cd3e5755c6c5539b21d78f68be85840342241cce3c33abe24f2bf6a041765b897c00fab463663f287d0593bf6d478240916412f122a

      • C:\Program Files (x86)\SmArTOnes\stT7WhWjRsbWOv.tlb

        Filesize

        3KB

        MD5

        a36e583e3b8b36cb7cca9ac8a85b95e4

        SHA1

        1f74147b4b869cab46fae2d6e80d7dc54797c9d6

        SHA256

        8b655baf678070732478326f97ed51a3615cc5f211cd756607c98015d7d6a5b4

        SHA512

        a2005dab8e4d5a542b25cbef1a36e7731d53542026551e1ac9375a54fd64a9a1a9eec2400c2f6cf938339f7f4b75b9e238b78be3249668a7f584b1ecb358fca6

      • C:\Program Files (x86)\SmArTOnes\stT7WhWjRsbWOv.x64.dll

        Filesize

        707KB

        MD5

        f4c5ab25bbc98f47999f48cc8e836066

        SHA1

        240ef6ec03ad3302fb11bccd275896ac8d7238ee

        SHA256

        f5564178e8acdaf297123f5cdc446ca875f5f66cdd369ee85d660efee542bd98

        SHA512

        5e06118e551dfbd432e17b0b5aeeb168242fdb9a5eb9a31fec446c4a2de48c5fbdbab873e67cb3797d7784b275df1de4958cc77ce1e0429586c8f747079d2b7b

      • C:\Program Files (x86)\SmArTOnes\stT7WhWjRsbWOv.x64.dll

        Filesize

        707KB

        MD5

        f4c5ab25bbc98f47999f48cc8e836066

        SHA1

        240ef6ec03ad3302fb11bccd275896ac8d7238ee

        SHA256

        f5564178e8acdaf297123f5cdc446ca875f5f66cdd369ee85d660efee542bd98

        SHA512

        5e06118e551dfbd432e17b0b5aeeb168242fdb9a5eb9a31fec446c4a2de48c5fbdbab873e67cb3797d7784b275df1de4958cc77ce1e0429586c8f747079d2b7b

      • C:\Program Files (x86)\SmArTOnes\stT7WhWjRsbWOv.x64.dll

        Filesize

        707KB

        MD5

        f4c5ab25bbc98f47999f48cc8e836066

        SHA1

        240ef6ec03ad3302fb11bccd275896ac8d7238ee

        SHA256

        f5564178e8acdaf297123f5cdc446ca875f5f66cdd369ee85d660efee542bd98

        SHA512

        5e06118e551dfbd432e17b0b5aeeb168242fdb9a5eb9a31fec446c4a2de48c5fbdbab873e67cb3797d7784b275df1de4958cc77ce1e0429586c8f747079d2b7b

      • memory/896-132-0x0000000002CB0000-0x0000000002D54000-memory.dmp

        Filesize

        656KB

      • memory/3180-138-0x0000000000000000-mapping.dmp

      • memory/4536-141-0x0000000000000000-mapping.dmp