Analysis
-
max time kernel
22s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24/11/2022, 05:04
Static task
static1
Behavioral task
behavioral1
Sample
76764fe94155ddf7b197d77283a219ea3168745892f691ebe51232d14cc5aa38.exe
Resource
win7-20220812-en
General
-
Target
76764fe94155ddf7b197d77283a219ea3168745892f691ebe51232d14cc5aa38.exe
-
Size
781KB
-
MD5
b281d34b634b46cd92fe99aa1b0fe1f1
-
SHA1
79c0c74f644afa6ac249c6cfaa06bb728c74b0f6
-
SHA256
76764fe94155ddf7b197d77283a219ea3168745892f691ebe51232d14cc5aa38
-
SHA512
223ecb0637e0e12a04f2c41374c7d2e78d043f685426536799c39ca885b207f9a9858116a9e03b630fc8b53f53e8aba45b10147a0b4d1ac9c2c89d933fc0a2a2
-
SSDEEP
12288:h1OgLdaO2+f65f+YOfY0bU5phYwX6nK3LbbSLkUGh:h1OYdaO2+C5fz+YRUwXV3Lbu4Dh
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 732 QVYS6dT8Jij5VQC.exe -
Loads dropped DLL 1 IoCs
pid Process 1200 76764fe94155ddf7b197d77283a219ea3168745892f691ebe51232d14cc5aa38.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\blenobcoagfeeikbhjoohnjkgcogenhm\2.0\manifest.json QVYS6dT8Jij5VQC.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\blenobcoagfeeikbhjoohnjkgcogenhm\2.0\manifest.json QVYS6dT8Jij5VQC.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\blenobcoagfeeikbhjoohnjkgcogenhm\2.0\manifest.json QVYS6dT8Jij5VQC.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\GroupPolicy QVYS6dT8Jij5VQC.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini QVYS6dT8Jij5VQC.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol QVYS6dT8Jij5VQC.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI QVYS6dT8Jij5VQC.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 732 QVYS6dT8Jij5VQC.exe 732 QVYS6dT8Jij5VQC.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1200 wrote to memory of 732 1200 76764fe94155ddf7b197d77283a219ea3168745892f691ebe51232d14cc5aa38.exe 27 PID 1200 wrote to memory of 732 1200 76764fe94155ddf7b197d77283a219ea3168745892f691ebe51232d14cc5aa38.exe 27 PID 1200 wrote to memory of 732 1200 76764fe94155ddf7b197d77283a219ea3168745892f691ebe51232d14cc5aa38.exe 27 PID 1200 wrote to memory of 732 1200 76764fe94155ddf7b197d77283a219ea3168745892f691ebe51232d14cc5aa38.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\76764fe94155ddf7b197d77283a219ea3168745892f691ebe51232d14cc5aa38.exe"C:\Users\Admin\AppData\Local\Temp\76764fe94155ddf7b197d77283a219ea3168745892f691ebe51232d14cc5aa38.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\7zS56D8.tmp\QVYS6dT8Jij5VQC.exe.\QVYS6dT8Jij5VQC.exe2⤵
- Executes dropped EXE
- Drops Chrome extension
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:732
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\7zS56D8.tmp\[email protected]\bootstrap.js
Filesize2KB
MD5df13f711e20e9c80171846d4f2f7ae06
SHA156d29cda58427efe0e21d3880d39eb1b0ef60bee
SHA2566c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4
SHA5126c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e
-
C:\Users\Admin\AppData\Local\Temp\7zS56D8.tmp\[email protected]\chrome.manifest
Filesize35B
MD5ab54a4b86191fbfc6797059c32768b5c
SHA1c36ccfed0439eb0c4671f41770e2d17824c3d8e5
SHA256e51d50ac15da6ff55e39f9ac0ea872789e970675a858555511f2f1d67511ff1d
SHA5129403df5c1087129f69639a49aa682935a4ae4f6bb2ca2fca0bbc19fe2a8512e6403731331d036bdae0e62c54c4ffa734a79f27aa1edff2bb296c014996dee4df
-
C:\Users\Admin\AppData\Local\Temp\7zS56D8.tmp\[email protected]\content\bg.js
Filesize8KB
MD56f132cf90eed58c98fc77d10a3fbb55f
SHA1ccf9076c3ae74dc2358825f028b8296a9a678bc7
SHA256fc047040ab6c78bbfbd9988a5670183041fc741cacbbbbea240fcc38e35266f5
SHA5125d58c1c9e5c2805382912807e3939e1c7cab89dfc0e5e7e00a6beed9cc8241c6aafdb9a6a8f9624bc440bd0501c9f5eea45b72d8958f8cedd0c41a5cde855baf
-
C:\Users\Admin\AppData\Local\Temp\7zS56D8.tmp\[email protected]\install.rdf
Filesize596B
MD5e53755e11ae137aad3d2bd08a798aec0
SHA1220c759eb11e8785c08f0152d2c818f5a2192f63
SHA256561e63ef0b6c46737995ac9f3f952b9d17c7a456b668877808532acc279b9b70
SHA51216f1b30594d15a4273b37736516f7a3ad98015f1351b0bff7c66206baf43ab11a27233b3c9e7362844821a78384f32df4c7e3bb5a1f2167d14d8564b4d752350
-
Filesize
1KB
MD55d278c9bebcb9b3c77185a8241bdb804
SHA19bd1561dcfea7ae5459bd149a3793e079fa64273
SHA256782e8d996dc3115ee9e540193d41324c0de46ae41f0df43a3ae3ebfc05c38e30
SHA512adaba1c3186712efc893eb3da03a46eae28b701aea6ef70b0b63e84103bf426739156606e26b92e4ceb828bde612c113c51807c3615e7e39c1aa3491195fcb17
-
Filesize
623KB
MD53b3e9f85b1e1d1defb4813cb1676b553
SHA117a064e28b670d6d4e579ac078a81e7334704b58
SHA25626fc2e717907241142895bb38734755ebb1ca82f1d23f48e09ec0d75cd4ad381
SHA5120f7d3df630b73820490a0d767707c69f5cbb94265b67a202c6f652e601ba970d1257583cf6082aa9fea97b10e7c0a40d0ac3947599602964b14a492c7452da36
-
Filesize
6KB
MD52fb8e095880a73de220395dc4e31d210
SHA15f7d00e258b3f83132a7d837df47a1dc4173216a
SHA256a7607f1df85bd2599c2130cbf7118e6927916717e201ddd4c9a8870de615280a
SHA5124cfc6ed7e990dd326f09e3c202fdd4836834eada4445ef3a13c7bd42998fb4434df58d5ffdda15e383ef5c9bf31a5947419c487d3e95bd1608893816c5083ab8
-
Filesize
147B
MD5e682d27ef1f484e69fc16090ed8748b1
SHA1edb8224f1f6af81bb6d2919d9f2aa09113b78ab7
SHA256e43e4cd9ad33caa9b07f9e2c5d124eb285df062ac2515c4752d0f042cbf06b07
SHA5121911d7d25faf94d26fe57752a532e64726d98651a108bb8e51f82bfa869bad2e3acaeeb0e5605af5de05b462a1cce26907f4cc82c66cde6c04e0226b929435ff
-
Filesize
144B
MD5fca19198fd8af21016a8b1dec7980002
SHA1fd01a47d14004e17a625efe66cc46a06c786cf40
SHA256332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a
SHA51260f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47
-
Filesize
531B
MD536d98318ab2b3b2585a30984db328afb
SHA1f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5
SHA256ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7
SHA5126f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a
-
Filesize
499B
MD5412f42459d2bababeff0662c4acd8163
SHA1f5d87fdb182074d09b9747d6df8abac5c32bbf77
SHA256794c6c04f2c69455ac7f18ffc5a34814e2ad9a7dac62a44b57348330d2879217
SHA512ecc4503e336f05efa9cb6459301c625c944846df474d96a4abfb4a37974c09e9c2bc04da02914aa6a13913d288b7d5329d8a2924012becb35d615a07b1b1ddda
-
Filesize
623KB
MD53b3e9f85b1e1d1defb4813cb1676b553
SHA117a064e28b670d6d4e579ac078a81e7334704b58
SHA25626fc2e717907241142895bb38734755ebb1ca82f1d23f48e09ec0d75cd4ad381
SHA5120f7d3df630b73820490a0d767707c69f5cbb94265b67a202c6f652e601ba970d1257583cf6082aa9fea97b10e7c0a40d0ac3947599602964b14a492c7452da36