Analysis

  • max time kernel
    119s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    24/11/2022, 05:13

General

  • Target

    3ffc69d165b72c475533186b228c4ba455a2af40ca1870ef76c12ebeb6148a21.exe

  • Size

    2.0MB

  • MD5

    e0738a25b5f05931d7ecb60f051a8295

  • SHA1

    e401a7d8f263c384692b247eb6c72000dbb6f714

  • SHA256

    3ffc69d165b72c475533186b228c4ba455a2af40ca1870ef76c12ebeb6148a21

  • SHA512

    f1f6be599a35fc97109f433b237111aadca596e93834f4570d4a297618a9ace5d383eb63a1ade66905d659df77ebcf1403aa7a9b263625ed7e713134d0ebe96d

  • SSDEEP

    24576:h1OYdaOZJo99gJW4tFAlN3DdJ6RND6oSnHA5NPFmTLc4ecFgAKnMpAUu:h1OsDJooJDtFgTy5snHSUc4E3cAUu

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 3 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 11 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 8 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3ffc69d165b72c475533186b228c4ba455a2af40ca1870ef76c12ebeb6148a21.exe
    "C:\Users\Admin\AppData\Local\Temp\3ffc69d165b72c475533186b228c4ba455a2af40ca1870ef76c12ebeb6148a21.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1600
    • C:\Users\Admin\AppData\Local\Temp\7zSEE08.tmp\JANAUcEkIWsNXQ2.exe
      .\JANAUcEkIWsNXQ2.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops Chrome extension
      • Installs/modifies Browser Helper Object
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:1428
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32.exe /s "C:\Program Files (x86)\BRuowuserr Shop\lm8xpMVlEjwRhB.x64.dll"
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1104
        • C:\Windows\system32\regsvr32.exe
          /s "C:\Program Files (x86)\BRuowuserr Shop\lm8xpMVlEjwRhB.x64.dll"
          4⤵
          • Loads dropped DLL
          • Installs/modifies Browser Helper Object
          PID:1788

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\BRuowuserr Shop\lm8xpMVlEjwRhB.dat

    Filesize

    6KB

    MD5

    3b6cc84a2e1370c3c095bf6239ab3eba

    SHA1

    47719d60ad770613824958c3708e33a00fa6a35f

    SHA256

    bd2285d0a8302ad9ae8d9fa2b2325e0a0079c9f06261c6650ef4f0a6a37c041d

    SHA512

    1850acdd52932bb2efa87a8531805bbcedc5e312ebe36540db79e019bddbccc9fdc1b8cfc08c9162cf0ed92bb2879204d836ad241f53e06d2a2454a0738f9d06

  • C:\Program Files (x86)\BRuowuserr Shop\lm8xpMVlEjwRhB.x64.dll

    Filesize

    692KB

    MD5

    dd6c687a7bc8036ff03c493edaf43fea

    SHA1

    cc4258585f61d57dd465270dbb7c0d82a2021a5f

    SHA256

    8bb13e80a99d9631efc47771fa8ee332d880acdc4e1baaabc2ad17c16823091c

    SHA512

    084f49f3b7a76b23a73b2957d227c953903e270f74bf1d7405a5d68e2f716b52db7e7e156469de5425125a3a27856e2e97172279cba70a213f5ba33188cacc8c

  • C:\Users\Admin\AppData\Local\Temp\7zSEE08.tmp\JANAUcEkIWsNXQ2.dat

    Filesize

    6KB

    MD5

    3b6cc84a2e1370c3c095bf6239ab3eba

    SHA1

    47719d60ad770613824958c3708e33a00fa6a35f

    SHA256

    bd2285d0a8302ad9ae8d9fa2b2325e0a0079c9f06261c6650ef4f0a6a37c041d

    SHA512

    1850acdd52932bb2efa87a8531805bbcedc5e312ebe36540db79e019bddbccc9fdc1b8cfc08c9162cf0ed92bb2879204d836ad241f53e06d2a2454a0738f9d06

  • C:\Users\Admin\AppData\Local\Temp\7zSEE08.tmp\JANAUcEkIWsNXQ2.exe

    Filesize

    623KB

    MD5

    92a70e40452d88d8c4b46f2ad8361977

    SHA1

    162c9ed1873fca1ef6ab9a2234a2812a203d6b56

    SHA256

    e61d40631449eb3f098a3bde542a0f87fc6f715cfcba919777e299e9ab12c1b8

    SHA512

    ef3aab2f1c816909878f6292bf0c2c4217c086a0bd39e936f8f2df19f2c2a16fbe8354d49048feddffa8e8e1ac7e3063b84fbaf0bdec7024494a87f807269e81

  • C:\Users\Admin\AppData\Local\Temp\7zSEE08.tmp\JANAUcEkIWsNXQ2.exe

    Filesize

    623KB

    MD5

    92a70e40452d88d8c4b46f2ad8361977

    SHA1

    162c9ed1873fca1ef6ab9a2234a2812a203d6b56

    SHA256

    e61d40631449eb3f098a3bde542a0f87fc6f715cfcba919777e299e9ab12c1b8

    SHA512

    ef3aab2f1c816909878f6292bf0c2c4217c086a0bd39e936f8f2df19f2c2a16fbe8354d49048feddffa8e8e1ac7e3063b84fbaf0bdec7024494a87f807269e81

  • C:\Users\Admin\AppData\Local\Temp\7zSEE08.tmp\jknlgecpokgcklmmdpnnngpmelmjmhoj\background.html

    Filesize

    147B

    MD5

    d75ad4c1dd59ca3cf5e648beae787fbd

    SHA1

    c9e8c8162780175bdb06a01f7e547364a57239d0

    SHA256

    7c9f41c4ce8bed1a77269db447a48dadb53e1be0ae60c0bbf79cc002e9f29098

    SHA512

    d4ecb0aef6dfc7f33b50ff48beed1b709ab77a2680a5e533e1a8e486643638e8b98a1c9bdd93517200010647acf0b40e7378eafa26eff0483c1982fc9a3cbd90

  • C:\Users\Admin\AppData\Local\Temp\7zSEE08.tmp\jknlgecpokgcklmmdpnnngpmelmjmhoj\content.js

    Filesize

    144B

    MD5

    fca19198fd8af21016a8b1dec7980002

    SHA1

    fd01a47d14004e17a625efe66cc46a06c786cf40

    SHA256

    332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a

    SHA512

    60f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47

  • C:\Users\Admin\AppData\Local\Temp\7zSEE08.tmp\jknlgecpokgcklmmdpnnngpmelmjmhoj\lsdb.js

    Filesize

    531B

    MD5

    36d98318ab2b3b2585a30984db328afb

    SHA1

    f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5

    SHA256

    ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7

    SHA512

    6f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a

  • C:\Users\Admin\AppData\Local\Temp\7zSEE08.tmp\jknlgecpokgcklmmdpnnngpmelmjmhoj\manifest.json

    Filesize

    508B

    MD5

    2a6e5f2043bcf805a8f4a0e6c8866f00

    SHA1

    2fa588f185073c20f18b365a7da266708decda81

    SHA256

    6e68a80c8ef4c984249c4904b99c796f7c17586e8d788a55df8611a9af32417f

    SHA512

    838dea9b6c439a5ed4e5e9c5c2771effe41dff7813eb7d33c8effca532240e5d9bdc4673d0342f288c2625035e8e15475ae8812c6613c22dce29b905fa9d5517

  • C:\Users\Admin\AppData\Local\Temp\7zSEE08.tmp\jknlgecpokgcklmmdpnnngpmelmjmhoj\zzyqmENEZo.js

    Filesize

    5KB

    MD5

    0a63fe84f4f3d6de3af85de94a92341c

    SHA1

    4f4737a5befbcdfb05f29acb576155eeb5c45d09

    SHA256

    9f7ba1229816da2a002dd5187820fff02d3adf5dd8f1c075287f2e4eb0a07290

    SHA512

    5b259871911865b9c715e9c0540ae259a7a1d226e19da2d0e115e6c2b81d974b8a658f037ca05c56a9a1dc75a3fa4905f9536be473cc691397a7f3d4d19148f4

  • C:\Users\Admin\AppData\Local\Temp\7zSEE08.tmp\lm8xpMVlEjwRhB.dll

    Filesize

    611KB

    MD5

    23a76cebd4442a5c81b58da519eac909

    SHA1

    e640584aa3ce6f666098e4b3c69203e1d7484548

    SHA256

    426cf8cfba58e437f1add68a6e8072b773b19e1fb4cad0ee3a065ba2358d06de

    SHA512

    e192b47cbb2ef9f91637cb370866b2233c00c36e5fae5d72ca9da4f478a113fb65128456cd75c57134192deb6157e4c5e3379c19d448ce9364444b37660d2fbd

  • C:\Users\Admin\AppData\Local\Temp\7zSEE08.tmp\lm8xpMVlEjwRhB.tlb

    Filesize

    3KB

    MD5

    4f10ec1039aef56bdfc26e48d57461b3

    SHA1

    f3dedd15bab08bad8d418f2f7b892defb357670b

    SHA256

    98362dd931236aa92fb7ebd4dcb56986dfc8f5471d48105ab47e3b57249e2eb8

    SHA512

    4162289976a8eeb362bcc3f8f8f54cabdc4d4bff9e91f2bee211c748fc43e47b1a51a54b85aebcc24a79471790aa98ca81ede7a40d946cd00df601762e83f6b3

  • C:\Users\Admin\AppData\Local\Temp\7zSEE08.tmp\lm8xpMVlEjwRhB.x64.dll

    Filesize

    692KB

    MD5

    dd6c687a7bc8036ff03c493edaf43fea

    SHA1

    cc4258585f61d57dd465270dbb7c0d82a2021a5f

    SHA256

    8bb13e80a99d9631efc47771fa8ee332d880acdc4e1baaabc2ad17c16823091c

    SHA512

    084f49f3b7a76b23a73b2957d227c953903e270f74bf1d7405a5d68e2f716b52db7e7e156469de5425125a3a27856e2e97172279cba70a213f5ba33188cacc8c

  • C:\Users\Admin\AppData\Local\Temp\7zSEE08.tmp\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    df13f711e20e9c80171846d4f2f7ae06

    SHA1

    56d29cda58427efe0e21d3880d39eb1b0ef60bee

    SHA256

    6c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4

    SHA512

    6c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e

  • C:\Users\Admin\AppData\Local\Temp\7zSEE08.tmp\[email protected]\chrome.manifest

    Filesize

    35B

    MD5

    1bb471fc8722d905d48531cbd3bfeb84

    SHA1

    87d9c52089fdf7a1fd5750f1d229cc1f4a375b75

    SHA256

    d5768cdb09c15a22ae375c8f9562546a63878342d2fe135d4edb0044be011fdc

    SHA512

    825ce4e1b68088729ab4f129b44fcd0a6ab8071d2e6eab3b529d6335d1b7d7a05930c85005c30f7e570ca8b1b808cd529caa4ad2aed36b9b5a4c11a1ca45eb7b

  • C:\Users\Admin\AppData\Local\Temp\7zSEE08.tmp\[email protected]\content\bg.js

    Filesize

    7KB

    MD5

    25f7a78cdf290b788ca46fa52d9263f0

    SHA1

    72a010be9a24667c1e7a0e4625beb99b75aaf26e

    SHA256

    f988a16018881490d842cca562f425942a300af6d9cef908bbddc64744feeba6

    SHA512

    02fce8adaba0d76abac37000b48c084caf9329db33901acba1ba8126849630dac5d3b72bd601f0a39c801b41575910568dc6b00229c1f86502c13f42d448d685

  • C:\Users\Admin\AppData\Local\Temp\7zSEE08.tmp\[email protected]\install.rdf

    Filesize

    605B

    MD5

    c600d5cc913380493e912ec7d3dd5c73

    SHA1

    98a821c5513d2cc1ad6890df42233f2427bf04ab

    SHA256

    0e5805616906b352091124083d69a460bff4083498c315795d5516f9c4b36cfd

    SHA512

    94df00cb4778fd9b892bf61d934b8e7bce00e4333da1a5af2a743b3e40225f78fc271ca2ece2520ed1c34e4d5ed0a623608b6efe8b402123e867a1937f27ddd9

  • \Program Files (x86)\BRuowuserr Shop\lm8xpMVlEjwRhB.dll

    Filesize

    611KB

    MD5

    23a76cebd4442a5c81b58da519eac909

    SHA1

    e640584aa3ce6f666098e4b3c69203e1d7484548

    SHA256

    426cf8cfba58e437f1add68a6e8072b773b19e1fb4cad0ee3a065ba2358d06de

    SHA512

    e192b47cbb2ef9f91637cb370866b2233c00c36e5fae5d72ca9da4f478a113fb65128456cd75c57134192deb6157e4c5e3379c19d448ce9364444b37660d2fbd

  • \Program Files (x86)\BRuowuserr Shop\lm8xpMVlEjwRhB.x64.dll

    Filesize

    692KB

    MD5

    dd6c687a7bc8036ff03c493edaf43fea

    SHA1

    cc4258585f61d57dd465270dbb7c0d82a2021a5f

    SHA256

    8bb13e80a99d9631efc47771fa8ee332d880acdc4e1baaabc2ad17c16823091c

    SHA512

    084f49f3b7a76b23a73b2957d227c953903e270f74bf1d7405a5d68e2f716b52db7e7e156469de5425125a3a27856e2e97172279cba70a213f5ba33188cacc8c

  • \Program Files (x86)\BRuowuserr Shop\lm8xpMVlEjwRhB.x64.dll

    Filesize

    692KB

    MD5

    dd6c687a7bc8036ff03c493edaf43fea

    SHA1

    cc4258585f61d57dd465270dbb7c0d82a2021a5f

    SHA256

    8bb13e80a99d9631efc47771fa8ee332d880acdc4e1baaabc2ad17c16823091c

    SHA512

    084f49f3b7a76b23a73b2957d227c953903e270f74bf1d7405a5d68e2f716b52db7e7e156469de5425125a3a27856e2e97172279cba70a213f5ba33188cacc8c

  • \Users\Admin\AppData\Local\Temp\7zSEE08.tmp\JANAUcEkIWsNXQ2.exe

    Filesize

    623KB

    MD5

    92a70e40452d88d8c4b46f2ad8361977

    SHA1

    162c9ed1873fca1ef6ab9a2234a2812a203d6b56

    SHA256

    e61d40631449eb3f098a3bde542a0f87fc6f715cfcba919777e299e9ab12c1b8

    SHA512

    ef3aab2f1c816909878f6292bf0c2c4217c086a0bd39e936f8f2df19f2c2a16fbe8354d49048feddffa8e8e1ac7e3063b84fbaf0bdec7024494a87f807269e81

  • memory/1600-54-0x0000000075BE1000-0x0000000075BE3000-memory.dmp

    Filesize

    8KB

  • memory/1788-78-0x000007FEFBD41000-0x000007FEFBD43000-memory.dmp

    Filesize

    8KB