Analysis

  • max time kernel
    180s
  • max time network
    189s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/11/2022, 07:34

General

  • Target

    306d88067802ac5d2f9d7b31064c18d9302cbfee20c5c3989414f4b0dbdde68a.exe

  • Size

    931KB

  • MD5

    be143feeef58d83296bd209e69b68ca1

  • SHA1

    1da5762f2a47adef19d249ec4616c1b7518175fc

  • SHA256

    306d88067802ac5d2f9d7b31064c18d9302cbfee20c5c3989414f4b0dbdde68a

  • SHA512

    be390e38888fae4b47133d9298ecafee9856fd77e17f0486e916bbb490c3aefd6508b92e74f412c1c6d52a89e3e2710e479c79e737b7d0f59ac03a1b3b45daa6

  • SSDEEP

    24576:h1OYdaOPMWSUbvCXEQKSqGv8VWumF6RmcJozyPvpfE:h1OsxMWyUQ+GUVFIcHPvpfE

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\306d88067802ac5d2f9d7b31064c18d9302cbfee20c5c3989414f4b0dbdde68a.exe
    "C:\Users\Admin\AppData\Local\Temp\306d88067802ac5d2f9d7b31064c18d9302cbfee20c5c3989414f4b0dbdde68a.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1616
    • C:\Users\Admin\AppData\Local\Temp\7zS17DD.tmp\BrNcMY08ySPLgsH.exe
      .\BrNcMY08ySPLgsH.exe
      2⤵
      • Executes dropped EXE
      • Drops Chrome extension
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3188
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
    1⤵
      PID:2412
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
      1⤵
        PID:688

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\7zS17DD.tmp\BrNcMY08ySPLgsH.dat

              Filesize

              1KB

              MD5

              2d16198d24b05c716ff713fbe6e5d221

              SHA1

              7128df0c74adb4173cc4ba0ff05acf8dffa75477

              SHA256

              cffbcaeaa26e6b0bc97bc64cedcf969a547c1bb7002f8d625a4ea77ed0de71a2

              SHA512

              0d926302222c368c71d83847c8a03e5e53a74dbbcd509a41f8e5f66a0c057356f4632175325554ad5c403489cfbcec9f787cec8f58ad024f7d40c494e238cdf7

            • C:\Users\Admin\AppData\Local\Temp\7zS17DD.tmp\BrNcMY08ySPLgsH.exe

              Filesize

              771KB

              MD5

              e8ef8ed232808bfa240b33b376bb74a8

              SHA1

              b7ebfbda42fb24594210d3f97921c5b33b88585d

              SHA256

              a4265c00fc8eb9371329ddbc19e760b433ea9f4ab4e16d4d95682031940ad6c9

              SHA512

              24a4de7ba07c5712a94cb8334764b6d23799dc4bb7153acf4eb7289ec4577b79bc9bf4adf6e0c65b13441d7783314ec4d9a13a61cf447124c43c44ff55fa8ef8

            • C:\Users\Admin\AppData\Local\Temp\7zS17DD.tmp\BrNcMY08ySPLgsH.exe

              Filesize

              771KB

              MD5

              e8ef8ed232808bfa240b33b376bb74a8

              SHA1

              b7ebfbda42fb24594210d3f97921c5b33b88585d

              SHA256

              a4265c00fc8eb9371329ddbc19e760b433ea9f4ab4e16d4d95682031940ad6c9

              SHA512

              24a4de7ba07c5712a94cb8334764b6d23799dc4bb7153acf4eb7289ec4577b79bc9bf4adf6e0c65b13441d7783314ec4d9a13a61cf447124c43c44ff55fa8ef8

            • C:\Users\Admin\AppData\Local\Temp\7zS17DD.tmp\[email protected]\bootstrap.js

              Filesize

              2KB

              MD5

              df13f711e20e9c80171846d4f2f7ae06

              SHA1

              56d29cda58427efe0e21d3880d39eb1b0ef60bee

              SHA256

              6c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4

              SHA512

              6c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e

            • C:\Users\Admin\AppData\Local\Temp\7zS17DD.tmp\[email protected]\chrome.manifest

              Filesize

              35B

              MD5

              9e0f65e9978a6eda84b7c5dfec4eb7b4

              SHA1

              4c2907c129310272a7aa8051d00bef1828c4c836

              SHA256

              6e4b3d70ff1da3dc686bd6facb7a0f63cd67afcec4832a6eda525fbe0d0106fc

              SHA512

              910df1460c9fc5975ab55a75fc1f2fa8999ba8267dab48bdfd3a235b33170f9da4809dd3818e75566a85a034edb641ef78719340325ce0db385ecadbafe55a3c

            • C:\Users\Admin\AppData\Local\Temp\7zS17DD.tmp\[email protected]\content\bg.js

              Filesize

              8KB

              MD5

              9b73c63d4a6f014ff47870515d2c0673

              SHA1

              ed688d3d6a26a947feda1afaf298de2e7e998097

              SHA256

              7914a821c47c04262a6917fc53a7a202354210483b89eae3550ab90c80f32d7c

              SHA512

              60a501c9ea11ee4fa3979c2d503795b3cee6ab492b4dd498fa19f8aeb36371683fd85c34d7526381c616b8363df99257ad2365d3ef37b0e6a42c63c15387aafc

            • C:\Users\Admin\AppData\Local\Temp\7zS17DD.tmp\[email protected]\install.rdf

              Filesize

              598B

              MD5

              fd77574c7823a4364117cdab874b6803

              SHA1

              93b33801013fe3bd8a4ba700e4409f1027ded865

              SHA256

              a2b0c857cab2217f3ffde05175be302b35234bcdf6c9028fc8cc5d98aa9f6009

              SHA512

              3cf529a51c3b78e2b42f791289660c53047633bfc3b96c73c5de7a3fa33d03c528e211fc4294c1f5414127b7ddedbeefdc54618651d0586ab97029fa328997df

            • C:\Users\Admin\AppData\Local\Temp\7zS17DD.tmp\cgpmamfkccjhgehbomnhdknghabnkdde\background.html

              Filesize

              146B

              MD5

              82351539edab14d417070d143294be67

              SHA1

              833871a38d0cf4fc9d1b7629ed9d58793042e011

              SHA256

              90b09d8b98c0bb04d4d5bb877d85c8651e274c02dcc85d752b0bdf5e9e636829

              SHA512

              df8474483af36dbdc511bee71a0d535774714e033c63ef06d127e904386dd4c1129bd3172d5f97c6d81156e323ddc80101da370ede9b53d9f97b36363881f16d

            • C:\Users\Admin\AppData\Local\Temp\7zS17DD.tmp\cgpmamfkccjhgehbomnhdknghabnkdde\cd84KbvlE.js

              Filesize

              6KB

              MD5

              064212d60967e3ddf9f817255e20f1b1

              SHA1

              69effe9c7396908b09df94624cb6ed4fbd94d08a

              SHA256

              9b7a5e7432f6a206bb6aed24a0bd7052fba27631fbbaeb8fe0d3f002e7924a8a

              SHA512

              8b6c1723d869485bdf5e38915e5d68a1b252af2ce66245a09af81a5567cbafc98cb8ca6c413954873b8a0514fe159258c3f2d2b4b71e2917905475e076f6f819

            • C:\Users\Admin\AppData\Local\Temp\7zS17DD.tmp\cgpmamfkccjhgehbomnhdknghabnkdde\content.js

              Filesize

              144B

              MD5

              fca19198fd8af21016a8b1dec7980002

              SHA1

              fd01a47d14004e17a625efe66cc46a06c786cf40

              SHA256

              332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a

              SHA512

              60f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47

            • C:\Users\Admin\AppData\Local\Temp\7zS17DD.tmp\cgpmamfkccjhgehbomnhdknghabnkdde\lsdb.js

              Filesize

              531B

              MD5

              36d98318ab2b3b2585a30984db328afb

              SHA1

              f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5

              SHA256

              ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7

              SHA512

              6f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a

            • C:\Users\Admin\AppData\Local\Temp\7zS17DD.tmp\cgpmamfkccjhgehbomnhdknghabnkdde\manifest.json

              Filesize

              498B

              MD5

              640199ea4621e34510de919f6a54436f

              SHA1

              dc65dbfad02bd2688030bd56ca1cab85917a9937

              SHA256

              e4aa7c089e32d14ddf584e9de6d007ec16581cd30c248ff7284bc0eb7757d4af

              SHA512

              d64bc524d6df7c4c21a5ddfb0e6636317482ef4dc28006bd0a38d5e26c2db75626f216143026bf8acf3baa11d86c278e902c78afad4f806ca36f9e54bc75ff0a