Analysis

  • max time kernel
    41s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    24/11/2022, 09:18

General

  • Target

    f5a64bb8320cf669773306cc9a1519620e1a01793a7cef3bc634d53e20eb19f2.exe

  • Size

    923KB

  • MD5

    1bd7d2235f0d2166eaf6f5d0dcc27168

  • SHA1

    3da94f123f7e560f6a4b6ba1d1fc78416e212d8d

  • SHA256

    f5a64bb8320cf669773306cc9a1519620e1a01793a7cef3bc634d53e20eb19f2

  • SHA512

    eacc7dbd183c5f20704aad52c65bfb93f99a5d41062efc796c2230b97222582d6ebbb121357ae76006fa0be0f078db9ae642d9715278aab02a3a2cbe7dfc0708

  • SSDEEP

    24576:h1OYdaOC4BQGx2jUReefMaGeOPw8Y7H3b+Qr:h1OsA4BQ02o4efMz68Y/+Qr

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 3 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f5a64bb8320cf669773306cc9a1519620e1a01793a7cef3bc634d53e20eb19f2.exe
    "C:\Users\Admin\AppData\Local\Temp\f5a64bb8320cf669773306cc9a1519620e1a01793a7cef3bc634d53e20eb19f2.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:864
    • C:\Users\Admin\AppData\Local\Temp\7zSF0F.tmp\8RDGeqOsiccHOYR.exe
      .\8RDGeqOsiccHOYR.exe
      2⤵
      • Executes dropped EXE
      • Drops Chrome extension
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:892

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\7zSF0F.tmp\8RDGeqOsiccHOYR.dat

          Filesize

          1KB

          MD5

          e6a0f944459447154fa3dcea5ea25939

          SHA1

          b1ebaa19f99d926add2b7716a06e115326548a58

          SHA256

          d3758c97156de3425fcfa56d0f1971c1c72ef8ee56111613e6ce6ae46a80f322

          SHA512

          c7402b5eb7819fd1a91907f130d083e94af6b5dd0b5a4f03c06d591c3a182ac2be5ed3807eb89cd778f49eeb72df89443222dc3453c0439d330fa2ba02718599

        • C:\Users\Admin\AppData\Local\Temp\7zSF0F.tmp\8RDGeqOsiccHOYR.exe

          Filesize

          766KB

          MD5

          98bb6d71947f05029c05bf6475839ce5

          SHA1

          9caad62d2dcb2f3d72e068643b4266cae20e2870

          SHA256

          0455048865ea330b772bf2586abc91f7ddeda4f7d6ef9f2de89576554fa7b3c1

          SHA512

          0ec35056c52cca408bfb5024226194f9727eaba5c415c3ccbe6acb0785774e43d4ddf65818c127a8770c9b05d40658479b34ffab4e4a475ed8ad142bc61bbaad

        • C:\Users\Admin\AppData\Local\Temp\7zSF0F.tmp\plehkdongpkbbldopdfanbngafpgmfol\OwN9.js

          Filesize

          5KB

          MD5

          ac25d0788b9a2477df99ce6f52bcca07

          SHA1

          150de9b19ec69622937344aacf8d3a719e8238c2

          SHA256

          c29014ec0065689e99d18e287c41b587fc88886bf2a8e90c3a1e9494210c1ccf

          SHA512

          9757414c17e03a4acfe70d59c88f3d1ce17c83f195f4809c9939ecf1b1a583e67937c8ed45794e8a6270a619823883f9c88ca6abfd5b3f9a6a729ede498f8c14

        • C:\Users\Admin\AppData\Local\Temp\7zSF0F.tmp\plehkdongpkbbldopdfanbngafpgmfol\background.html

          Filesize

          141B

          MD5

          98121a996d97f2a979bf0752da92bb60

          SHA1

          74b8e1233166b954f783b75c6544aac22124af94

          SHA256

          c54b207e48b82673bdfc5126c51b24dd5cff8bbea17c22729a0a0bd7fa0d617d

          SHA512

          f3937fff889a8996e469355a06541c8aac8e828f792b2860bd3f0837ad41f3bc0f0624971d7fdb27b2c453847718ac4f9ba0e73f0d1a32373a069dbc5393ef50

        • C:\Users\Admin\AppData\Local\Temp\7zSF0F.tmp\plehkdongpkbbldopdfanbngafpgmfol\content.js

          Filesize

          144B

          MD5

          fca19198fd8af21016a8b1dec7980002

          SHA1

          fd01a47d14004e17a625efe66cc46a06c786cf40

          SHA256

          332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a

          SHA512

          60f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47

        • C:\Users\Admin\AppData\Local\Temp\7zSF0F.tmp\plehkdongpkbbldopdfanbngafpgmfol\lsdb.js

          Filesize

          531B

          MD5

          36d98318ab2b3b2585a30984db328afb

          SHA1

          f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5

          SHA256

          ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7

          SHA512

          6f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a

        • C:\Users\Admin\AppData\Local\Temp\7zSF0F.tmp\plehkdongpkbbldopdfanbngafpgmfol\manifest.json

          Filesize

          498B

          MD5

          640199ea4621e34510de919f6a54436f

          SHA1

          dc65dbfad02bd2688030bd56ca1cab85917a9937

          SHA256

          e4aa7c089e32d14ddf584e9de6d007ec16581cd30c248ff7284bc0eb7757d4af

          SHA512

          d64bc524d6df7c4c21a5ddfb0e6636317482ef4dc28006bd0a38d5e26c2db75626f216143026bf8acf3baa11d86c278e902c78afad4f806ca36f9e54bc75ff0a

        • C:\Users\Admin\AppData\Local\Temp\7zSF0F.tmp\[email protected]\bootstrap.js

          Filesize

          2KB

          MD5

          df13f711e20e9c80171846d4f2f7ae06

          SHA1

          56d29cda58427efe0e21d3880d39eb1b0ef60bee

          SHA256

          6c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4

          SHA512

          6c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e

        • C:\Users\Admin\AppData\Local\Temp\7zSF0F.tmp\[email protected]\chrome.manifest

          Filesize

          35B

          MD5

          6c118b0778c5f39285b6d281e556fcf3

          SHA1

          a6df3235d9eb05fd5679f9647d4c689a5fa7d03d

          SHA256

          f064075a2460b00f7dacc466413dc98c09f4d99080eddacd66753d9d3e627764

          SHA512

          83dd6c586f21f9e59e05b1e105dcc49429ea1bc289c4d935376d7b43ad258eb0f4af4452d1deb5d276278cec6694329a7b7aa304a066dbd6d6d68c2249838193

        • C:\Users\Admin\AppData\Local\Temp\7zSF0F.tmp\[email protected]\content\bg.js

          Filesize

          8KB

          MD5

          da83875d6d20184f54b7e7eea5abf8f6

          SHA1

          26e844ef1d019d5c4367a658035afbe88560466b

          SHA256

          954a1b302b2eeeeae09b50cf4157806a9f2826bb92fe9071962a805dbca52faf

          SHA512

          e94f18f964bed81091df8df81a22dbdfc4c84c881cc04bd176d7cf7694632e16df80a5cc87b6f8d4b57fd19273d047693575190cda80da793a21df240da03688

        • C:\Users\Admin\AppData\Local\Temp\7zSF0F.tmp\[email protected]\install.rdf

          Filesize

          593B

          MD5

          c0a55a2f6535acfdd5c9aca6758502aa

          SHA1

          463aeec9ea2dda54c837a206cf4b29b93c0a85cc

          SHA256

          37c5e961aee82f2fb1f9827d117c73de86e961b484489df1617151fc2244d343

          SHA512

          6f8378864837ec4f9a7810b83cdf8721ab70f272dcd6fe02f0a85c9cfa937d30d9b630843db7762030ed386b287e41dbafe1dbd6b25a888fd91e290e90d69fc1

        • \Users\Admin\AppData\Local\Temp\7zSF0F.tmp\8RDGeqOsiccHOYR.exe

          Filesize

          766KB

          MD5

          98bb6d71947f05029c05bf6475839ce5

          SHA1

          9caad62d2dcb2f3d72e068643b4266cae20e2870

          SHA256

          0455048865ea330b772bf2586abc91f7ddeda4f7d6ef9f2de89576554fa7b3c1

          SHA512

          0ec35056c52cca408bfb5024226194f9727eaba5c415c3ccbe6acb0785774e43d4ddf65818c127a8770c9b05d40658479b34ffab4e4a475ed8ad142bc61bbaad

        • memory/864-54-0x0000000075141000-0x0000000075143000-memory.dmp

          Filesize

          8KB