Analysis

  • max time kernel
    47s
  • max time network
    59s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 07:27

General

  • Target

    5f5fd5a497cd14ac5f8b519816c0a239120d0cc3b338e3ce39c53f0e7d4a4c03.exe

  • Size

    931KB

  • MD5

    187359eb208e008f9c896d87e85b4972

  • SHA1

    a1b1c9751d664cbee01142484b740d2038ebb69e

  • SHA256

    5f5fd5a497cd14ac5f8b519816c0a239120d0cc3b338e3ce39c53f0e7d4a4c03

  • SHA512

    bc3ee363e8efa97c7dc0317a9290b9155525b76389bcdf9d9eaedaf8940f5ff4caca9981e32a52cd8b9e20dfd96887135f831dc076f6034b0d0d8fd61a021d1c

  • SSDEEP

    24576:h1OYdaOaMWSUbvCXEQKSqGv8VWumF6RmcJozyPvpfs:h1OsQMWyUQ+GUVFIcHPvpfs

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 3 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5f5fd5a497cd14ac5f8b519816c0a239120d0cc3b338e3ce39c53f0e7d4a4c03.exe
    "C:\Users\Admin\AppData\Local\Temp\5f5fd5a497cd14ac5f8b519816c0a239120d0cc3b338e3ce39c53f0e7d4a4c03.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1516
    • C:\Users\Admin\AppData\Local\Temp\7zS9712.tmp\iyUv5lPzxDAuJTq.exe
      .\iyUv5lPzxDAuJTq.exe
      2⤵
      • Executes dropped EXE
      • Drops Chrome extension
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:980

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7zS9712.tmp\chogfbadnkencecajmbmnpnbifakjlob\Hlbj47MKTn.js

    Filesize

    6KB

    MD5

    6800a037dad132a943b15999142ea2d2

    SHA1

    6d7c1ab5856af983ee83cac2192e1cc6e23ecab6

    SHA256

    20278204645a2ba9e2992cb705b3fa9f637846453e91b224c83b2b4bc7188033

    SHA512

    cb3b378dc8e20447e70a2e446993e44b367c79cc5c4ebb512eb68f13e05e194b220f64e3e17aaaa48feeb38db45e3682ae42d15e9f33de12ee73f6eed3b9485d

  • C:\Users\Admin\AppData\Local\Temp\7zS9712.tmp\chogfbadnkencecajmbmnpnbifakjlob\background.html

    Filesize

    147B

    MD5

    c962f56dfd79dd3cee1f7d8b3e19b7fe

    SHA1

    2cc96fec0984410b83193170156c9eee1965a09e

    SHA256

    d9e8a03fb297493c62059870b4cc0351f5b4bc2d784b719f8a0bf555165d57bc

    SHA512

    150f3a88d5120e77866fd867a1a997953d5b348a601c55577ba71e44dd01c3f11e10bb7691aff24fe1ecd0760de8a30c6d2d5942a44605cb80a0a938bdc2a2f5

  • C:\Users\Admin\AppData\Local\Temp\7zS9712.tmp\chogfbadnkencecajmbmnpnbifakjlob\content.js

    Filesize

    144B

    MD5

    fca19198fd8af21016a8b1dec7980002

    SHA1

    fd01a47d14004e17a625efe66cc46a06c786cf40

    SHA256

    332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a

    SHA512

    60f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47

  • C:\Users\Admin\AppData\Local\Temp\7zS9712.tmp\chogfbadnkencecajmbmnpnbifakjlob\lsdb.js

    Filesize

    531B

    MD5

    36d98318ab2b3b2585a30984db328afb

    SHA1

    f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5

    SHA256

    ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7

    SHA512

    6f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a

  • C:\Users\Admin\AppData\Local\Temp\7zS9712.tmp\chogfbadnkencecajmbmnpnbifakjlob\manifest.json

    Filesize

    498B

    MD5

    640199ea4621e34510de919f6a54436f

    SHA1

    dc65dbfad02bd2688030bd56ca1cab85917a9937

    SHA256

    e4aa7c089e32d14ddf584e9de6d007ec16581cd30c248ff7284bc0eb7757d4af

    SHA512

    d64bc524d6df7c4c21a5ddfb0e6636317482ef4dc28006bd0a38d5e26c2db75626f216143026bf8acf3baa11d86c278e902c78afad4f806ca36f9e54bc75ff0a

  • C:\Users\Admin\AppData\Local\Temp\7zS9712.tmp\iyUv5lPzxDAuJTq.dat

    Filesize

    1KB

    MD5

    76d33aa9b66521fac5a5bea28d5694e9

    SHA1

    cd1ef14a874a7aa8766cfd77fc4ca905a7c186b6

    SHA256

    0000d903bc6d7e802ba3ea8919a61c6bdaee005c6b84413bbaddf3e4204e30e8

    SHA512

    b4443740df74f09873537407bea7cc39df4523fae1b402b11aa5121d701876e76d4a63975d7a7bf154b1bceefe4843a315ed828feeadf4338bfed9b7b471c62c

  • C:\Users\Admin\AppData\Local\Temp\7zS9712.tmp\iyUv5lPzxDAuJTq.exe

    Filesize

    771KB

    MD5

    e8ef8ed232808bfa240b33b376bb74a8

    SHA1

    b7ebfbda42fb24594210d3f97921c5b33b88585d

    SHA256

    a4265c00fc8eb9371329ddbc19e760b433ea9f4ab4e16d4d95682031940ad6c9

    SHA512

    24a4de7ba07c5712a94cb8334764b6d23799dc4bb7153acf4eb7289ec4577b79bc9bf4adf6e0c65b13441d7783314ec4d9a13a61cf447124c43c44ff55fa8ef8

  • C:\Users\Admin\AppData\Local\Temp\7zS9712.tmp\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    df13f711e20e9c80171846d4f2f7ae06

    SHA1

    56d29cda58427efe0e21d3880d39eb1b0ef60bee

    SHA256

    6c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4

    SHA512

    6c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e

  • C:\Users\Admin\AppData\Local\Temp\7zS9712.tmp\[email protected]\chrome.manifest

    Filesize

    35B

    MD5

    cdfebf33df6cc406f75d97eb7841130b

    SHA1

    66427d2337da0910dd840c59b03f0fe13bfaccca

    SHA256

    05c45b7a1cd5394b3a76515af07672b79f50475120a2935c46097a5aabd5581f

    SHA512

    fa94fa857a54b1aae0af733ce2305877c71216e2391784cbf43a0e4e7049f9d5fb9b282e098262d58aa088314a40b35993e4f0a13b8245870a3b35d68a5500d8

  • C:\Users\Admin\AppData\Local\Temp\7zS9712.tmp\[email protected]\content\bg.js

    Filesize

    9KB

    MD5

    ee860fedbc2c5b43ec9355b36af8f010

    SHA1

    42de034da2d290a8e9db0e8e83460e027ecff23a

    SHA256

    28258c9a331c4fe466726010ef138d99c5f43650134d5affc1e628dcf0e9ebdc

    SHA512

    ad228aa93b462ac5327a5d39239f2fb7924dfd08f22f2f2c348d9728b5085a4b9aab6fd11f549db17c88960562a873ae42ed7f022f7f0b1b4760d0351966b7bc

  • C:\Users\Admin\AppData\Local\Temp\7zS9712.tmp\[email protected]\install.rdf

    Filesize

    592B

    MD5

    d4b973edad65fef657be9977d65ccb52

    SHA1

    3972f72fbed52c5224d0b00cbac5a798b30f977a

    SHA256

    1eced0f38fdd559ace0320eb4fab509bf3cf605769e8b2b75efca24752d19ae7

    SHA512

    85f212b8686791715eb8aceb24b031d8a22eef591cb5311849d7be389de4bf51828823334ec030632f82999aa01fb0e1bdf340c21f420e29440b6351de595c20

  • \Users\Admin\AppData\Local\Temp\7zS9712.tmp\iyUv5lPzxDAuJTq.exe

    Filesize

    771KB

    MD5

    e8ef8ed232808bfa240b33b376bb74a8

    SHA1

    b7ebfbda42fb24594210d3f97921c5b33b88585d

    SHA256

    a4265c00fc8eb9371329ddbc19e760b433ea9f4ab4e16d4d95682031940ad6c9

    SHA512

    24a4de7ba07c5712a94cb8334764b6d23799dc4bb7153acf4eb7289ec4577b79bc9bf4adf6e0c65b13441d7783314ec4d9a13a61cf447124c43c44ff55fa8ef8

  • memory/980-56-0x0000000000000000-mapping.dmp

  • memory/1516-54-0x0000000076161000-0x0000000076163000-memory.dmp

    Filesize

    8KB