Analysis

  • max time kernel
    279s
  • max time network
    329s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 09:18

General

  • Target

    cecedb270f63c94ac455d146f821761a5bd0c0aabb5f491e4cd28e1f085d05a4.exe

  • Size

    2.5MB

  • MD5

    91e7ed514535ddccf7ec7e93374aefe4

  • SHA1

    09ee4490a2eb030dc56051960cbb9b5df61db320

  • SHA256

    cecedb270f63c94ac455d146f821761a5bd0c0aabb5f491e4cd28e1f085d05a4

  • SHA512

    0093b761bac8fb8c0f983b4e9b73f47a944e2802b6564b4df2ef8d1b2f33edb279d232d082798317e0a999ba1e046238f4c6fb9966891939c4d82b981f794a89

  • SSDEEP

    49152:h1OsfMN6wdBh5N5Z4E8PuXitzuS4xBoYfzdgZ6YLFz5i4U/jA0GQ3o:h1OIMNtdBZouS4xK/hQY

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops Chrome extension 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cecedb270f63c94ac455d146f821761a5bd0c0aabb5f491e4cd28e1f085d05a4.exe
    "C:\Users\Admin\AppData\Local\Temp\cecedb270f63c94ac455d146f821761a5bd0c0aabb5f491e4cd28e1f085d05a4.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2428
    • C:\Users\Admin\AppData\Local\Temp\7zS1042.tmp\9Twgi8OYPGiKnRs.exe
      .\9Twgi8OYPGiKnRs.exe
      2⤵
      • Executes dropped EXE
      • Drops Chrome extension
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4984

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7zS1042.tmp\9Twgi8OYPGiKnRs.dat

    Filesize

    7KB

    MD5

    62832a1d0a7d3b2243bd3a2ef7a194ac

    SHA1

    b90b255ad8f4fa61f2959ebdad1855742ac62e40

    SHA256

    5bb5dd300e33297a35445197bc5a1583346f906ee87fef774cb25fa4ad5b27d1

    SHA512

    36464df2042ed700cf351c30f4767cc02d8196e45ddd94d2a6c1d443cb58b3695ce2013421732346d9034aa3a9ff50830e4d1cc86bb6ad353f6a4c4ffc1f30a3

  • C:\Users\Admin\AppData\Local\Temp\7zS1042.tmp\9Twgi8OYPGiKnRs.exe

    Filesize

    765KB

    MD5

    21c7e6ab35acdb8d15ac0590900c5206

    SHA1

    bd696ab0d1806c5492b4444d96fe272f217f4058

    SHA256

    314c44ac357c692c66516271e02fe280e9fc6d030a7172f2379c81fa383d44ec

    SHA512

    775636d7ec02398e32463ceaa7e1b18fe20689ed75d9c731b37b83f4c3ce828d2d2274d2f75d4f2c25133775969864467eff69b5fbf40e286fbfca6bdee1d3dd

  • C:\Users\Admin\AppData\Local\Temp\7zS1042.tmp\9Twgi8OYPGiKnRs.exe

    Filesize

    765KB

    MD5

    21c7e6ab35acdb8d15ac0590900c5206

    SHA1

    bd696ab0d1806c5492b4444d96fe272f217f4058

    SHA256

    314c44ac357c692c66516271e02fe280e9fc6d030a7172f2379c81fa383d44ec

    SHA512

    775636d7ec02398e32463ceaa7e1b18fe20689ed75d9c731b37b83f4c3ce828d2d2274d2f75d4f2c25133775969864467eff69b5fbf40e286fbfca6bdee1d3dd

  • C:\Users\Admin\AppData\Local\Temp\7zS1042.tmp\cmamnmakalmobkcipkgjmmiedlmgboaa\Oam5.js

    Filesize

    6KB

    MD5

    53dcae7cf1b60c9bac583b010da7b4d0

    SHA1

    9a30db1416e79b427d6166b3da8317b7594cafec

    SHA256

    490012f6c53a92fab7d6f2e85da0e5ac694269bc3e2f96131f10641ff27268a2

    SHA512

    e0e78439312b0f22f1fa6232baf1e5fd37347d667a62e66ea2056cbafe716f3bdcc6bb13bdb47b4212c7f2d15e62dc08447e7c0f9cf0c46ff4f569d5317ac9b7

  • C:\Users\Admin\AppData\Local\Temp\7zS1042.tmp\cmamnmakalmobkcipkgjmmiedlmgboaa\background.html

    Filesize

    141B

    MD5

    c7c6291669680a8639be23c213974b77

    SHA1

    dfd5f09c1fa6eb08ae6595742e24e75b30663bd2

    SHA256

    64ba777e292e184bc3522d73278abc6d0c50df48d0d35948c5e9dbc46baba093

    SHA512

    12449265cd50f44a7296a2e3fac49ef146b5c52034f443d233139d48a320eebc88e3351b57a30511a08afa17041ac7d34dbc2cae0276bbaee80cdc17528e1c81

  • C:\Users\Admin\AppData\Local\Temp\7zS1042.tmp\cmamnmakalmobkcipkgjmmiedlmgboaa\content.js

    Filesize

    144B

    MD5

    fca19198fd8af21016a8b1dec7980002

    SHA1

    fd01a47d14004e17a625efe66cc46a06c786cf40

    SHA256

    332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a

    SHA512

    60f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47

  • C:\Users\Admin\AppData\Local\Temp\7zS1042.tmp\cmamnmakalmobkcipkgjmmiedlmgboaa\lsdb.js

    Filesize

    531B

    MD5

    36d98318ab2b3b2585a30984db328afb

    SHA1

    f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5

    SHA256

    ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7

    SHA512

    6f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a

  • C:\Users\Admin\AppData\Local\Temp\7zS1042.tmp\cmamnmakalmobkcipkgjmmiedlmgboaa\manifest.json

    Filesize

    498B

    MD5

    640199ea4621e34510de919f6a54436f

    SHA1

    dc65dbfad02bd2688030bd56ca1cab85917a9937

    SHA256

    e4aa7c089e32d14ddf584e9de6d007ec16581cd30c248ff7284bc0eb7757d4af

    SHA512

    d64bc524d6df7c4c21a5ddfb0e6636317482ef4dc28006bd0a38d5e26c2db75626f216143026bf8acf3baa11d86c278e902c78afad4f806ca36f9e54bc75ff0a