Analysis
-
max time kernel
271s -
max time network
346s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 05:16
Static task
static1
Behavioral task
behavioral1
Sample
2e9e8d38bdba2b7f729e428ea8fea16e3f9241a1d6b71f7fee90cc8fe8e76b9c.exe
Resource
win7-20221111-en
General
-
Target
2e9e8d38bdba2b7f729e428ea8fea16e3f9241a1d6b71f7fee90cc8fe8e76b9c.exe
-
Size
2.0MB
-
MD5
efb7594401f4071256e34782dee8f134
-
SHA1
d872155287be8d7c58145f3be7b314592067be76
-
SHA256
2e9e8d38bdba2b7f729e428ea8fea16e3f9241a1d6b71f7fee90cc8fe8e76b9c
-
SHA512
91265e4efbbe23f11e5cf447fe75a51e91de6c35ddc885f86776a9508e33c6e8122cdc092de875f34d1ed52f30248e3ff6a1ff46c97c80104cd691b357fc9f1b
-
SSDEEP
24576:h1OYdaOGJo99gJW4tFAlN3DdJ6RND6oSnHA5NPFmTLc4ecFgAKnMpAUv:h1OsoJooJDtFgTy5snHSUc4E3cAUv
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2912 n99RONmYqab73y3.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops Chrome extension 5 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\chacnkijhlimknekjfppieahimcgdnml\2.0\manifest.json n99RONmYqab73y3.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\chacnkijhlimknekjfppieahimcgdnml\2.0\manifest.json n99RONmYqab73y3.exe File created C:\Users\DefaultAccount\AppData\Local\Google\Chrome\User Data\Default\Extensions\chacnkijhlimknekjfppieahimcgdnml\2.0\manifest.json n99RONmYqab73y3.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\chacnkijhlimknekjfppieahimcgdnml\2.0\manifest.json n99RONmYqab73y3.exe File created C:\Users\WDAGUtilityAccount\AppData\Local\Google\Chrome\User Data\Default\Extensions\chacnkijhlimknekjfppieahimcgdnml\2.0\manifest.json n99RONmYqab73y3.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI n99RONmYqab73y3.exe File opened for modification C:\Windows\System32\GroupPolicy n99RONmYqab73y3.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini n99RONmYqab73y3.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol n99RONmYqab73y3.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2912 n99RONmYqab73y3.exe 2912 n99RONmYqab73y3.exe 2912 n99RONmYqab73y3.exe 2912 n99RONmYqab73y3.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2912 2088 2e9e8d38bdba2b7f729e428ea8fea16e3f9241a1d6b71f7fee90cc8fe8e76b9c.exe 82 PID 2088 wrote to memory of 2912 2088 2e9e8d38bdba2b7f729e428ea8fea16e3f9241a1d6b71f7fee90cc8fe8e76b9c.exe 82 PID 2088 wrote to memory of 2912 2088 2e9e8d38bdba2b7f729e428ea8fea16e3f9241a1d6b71f7fee90cc8fe8e76b9c.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e9e8d38bdba2b7f729e428ea8fea16e3f9241a1d6b71f7fee90cc8fe8e76b9c.exe"C:\Users\Admin\AppData\Local\Temp\2e9e8d38bdba2b7f729e428ea8fea16e3f9241a1d6b71f7fee90cc8fe8e76b9c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\7zS66FD.tmp\n99RONmYqab73y3.exe.\n99RONmYqab73y3.exe2⤵
- Executes dropped EXE
- Drops Chrome extension
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2912
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
139B
MD50b4291036529f255da5116fbf6c1110e
SHA128e73f0f996a08e641da7c95cb671685a3e63996
SHA256d4f15dca0df5bb0a57f4f53c8c99428cfe6747a1011b569727f4ee3caa0945e5
SHA5125b1784817a5471cb069b7e9d4700e4e0b8edacc83a3a14ef6b06a41ca7369147d8af7fbe554557a1bc4bbda3f3a2604a962a12f47c6bbbc6148fce3a5b703c0a
-
Filesize
144B
MD5fca19198fd8af21016a8b1dec7980002
SHA1fd01a47d14004e17a625efe66cc46a06c786cf40
SHA256332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a
SHA51260f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47
-
Filesize
531B
MD536d98318ab2b3b2585a30984db328afb
SHA1f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5
SHA256ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7
SHA5126f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a
-
Filesize
499B
MD5eb05de53f375bc74691c7651d864f770
SHA18b41a52cf88ca96cf83167435ffccc956595faaf
SHA256c8d7ad676efff8b7496757cde7fcd4bf0b23769c1b375c6e1799fdff5ff53ff0
SHA5128c052ecc894bdf4fbda1fc2c7d40420c7ac604820a1288a1fa6541f3738e7637cf9da709697a2516909d988f34f20a0330aaf1cd1b0b62c9bae55e237b90889f
-
Filesize
6KB
MD5586df7198b72c37b5bad18e159e99edc
SHA1b382149401f70d3cf7f7e68dc9d3c51314aa63cc
SHA2562fe771319cd177759bf2fd9b82b18f84025147dbc0a5e36c15e2d828cbca08c5
SHA51276c7b5afe14496c31201dfe99e1006570fa82dcb436f89a363518645ed352df411d3aa6c720523151f6f2ce3a4cb544de10cc21d13992aa1199f0c205b3e44b8
-
Filesize
6KB
MD5b288aace2d009f86edafea5df4a9b5be
SHA1db986b8ff9d267d225c1d5ca7d2646197cf21b74
SHA256949fa802cbb633abdcbeb12778a7bac8547b69d1f1220f29b57d62f54c778441
SHA512cd1c73d2ba44d467d61b830e3c15c02048980b250b81b46c4febdba95a2eddf4674f85fad6071fca2cd38fa477caec6a84c9f7b6d28349fa93c342a95a7deab2
-
Filesize
623KB
MD592a70e40452d88d8c4b46f2ad8361977
SHA1162c9ed1873fca1ef6ab9a2234a2812a203d6b56
SHA256e61d40631449eb3f098a3bde542a0f87fc6f715cfcba919777e299e9ab12c1b8
SHA512ef3aab2f1c816909878f6292bf0c2c4217c086a0bd39e936f8f2df19f2c2a16fbe8354d49048feddffa8e8e1ac7e3063b84fbaf0bdec7024494a87f807269e81
-
Filesize
623KB
MD592a70e40452d88d8c4b46f2ad8361977
SHA1162c9ed1873fca1ef6ab9a2234a2812a203d6b56
SHA256e61d40631449eb3f098a3bde542a0f87fc6f715cfcba919777e299e9ab12c1b8
SHA512ef3aab2f1c816909878f6292bf0c2c4217c086a0bd39e936f8f2df19f2c2a16fbe8354d49048feddffa8e8e1ac7e3063b84fbaf0bdec7024494a87f807269e81