Analysis

  • max time kernel
    143s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/11/2022, 10:15

General

  • Target

    3f8bb4ceba1894af65dfa12d24e8c76bcb66f5b88c22e5907c86240fcd27dcc0.exe

  • Size

    931KB

  • MD5

    f0782327968ef87541b21ce9765f01ae

  • SHA1

    eac5db604334377e08752e445624d68cd987886a

  • SHA256

    3f8bb4ceba1894af65dfa12d24e8c76bcb66f5b88c22e5907c86240fcd27dcc0

  • SHA512

    abe616bf358307f0dfb27a4935c8b99f5f5628ecdbebdca4e00c6e1313e0e8ed0dbfeed59e11f7895150e4a99c2653d579d6ce0d1b68e12c53dc734962155832

  • SSDEEP

    24576:h1OYdaOUMWSUbvCXEQKSqGv8VWumF6RmcJozyPvpfk:h1OsSMWyUQ+GUVFIcHPvpfk

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f8bb4ceba1894af65dfa12d24e8c76bcb66f5b88c22e5907c86240fcd27dcc0.exe
    "C:\Users\Admin\AppData\Local\Temp\3f8bb4ceba1894af65dfa12d24e8c76bcb66f5b88c22e5907c86240fcd27dcc0.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1376
    • C:\Users\Admin\AppData\Local\Temp\7zS7E3D.tmp\qh3fFVA3k57o7Rj.exe
      .\qh3fFVA3k57o7Rj.exe
      2⤵
      • Executes dropped EXE
      • Drops Chrome extension
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2224
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
    1⤵
      PID:3400
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
      1⤵
        PID:320

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\7zS7E3D.tmp\akcfdpcagafaocfgkhaapoagbneololm\O82F.js

              Filesize

              6KB

              MD5

              1d136cde51a959df86242dd9223e64c5

              SHA1

              c818ed03cbf7c60f226ee6e2af146caf1651e2d2

              SHA256

              afb02ea4faab0e1ce6a9211af88bb02901c76f5e6466938d5e5f9961641eadd4

              SHA512

              c52b67d04883bee54dc6b68be6b8d60e6f2cc9823a147f03732e240824f5d07edf2d0ff890fa88de86416c833b3e4a170e4f673c8a46f43a72aa6a8aadaa9ad9

            • C:\Users\Admin\AppData\Local\Temp\7zS7E3D.tmp\akcfdpcagafaocfgkhaapoagbneololm\background.html

              Filesize

              141B

              MD5

              d3704bd64660e960b31c48ce31e84d58

              SHA1

              e4c5b2774ff352582c2bc459c90855369f8a47dc

              SHA256

              822793c6044aa93e50783a7e910b3ae117446b7cecefe6e5ac62dcc444b69ec6

              SHA512

              e69686ad28c4a179275126f50f7929cff6b6c6058853fcbce312710ae864bed35a9e28f1ae84910c2ae033da519e02726b3999f66f000c2a2eb2870e38301845

            • C:\Users\Admin\AppData\Local\Temp\7zS7E3D.tmp\akcfdpcagafaocfgkhaapoagbneololm\content.js

              Filesize

              144B

              MD5

              fca19198fd8af21016a8b1dec7980002

              SHA1

              fd01a47d14004e17a625efe66cc46a06c786cf40

              SHA256

              332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a

              SHA512

              60f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47

            • C:\Users\Admin\AppData\Local\Temp\7zS7E3D.tmp\akcfdpcagafaocfgkhaapoagbneololm\lsdb.js

              Filesize

              531B

              MD5

              36d98318ab2b3b2585a30984db328afb

              SHA1

              f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5

              SHA256

              ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7

              SHA512

              6f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a

            • C:\Users\Admin\AppData\Local\Temp\7zS7E3D.tmp\akcfdpcagafaocfgkhaapoagbneololm\manifest.json

              Filesize

              498B

              MD5

              640199ea4621e34510de919f6a54436f

              SHA1

              dc65dbfad02bd2688030bd56ca1cab85917a9937

              SHA256

              e4aa7c089e32d14ddf584e9de6d007ec16581cd30c248ff7284bc0eb7757d4af

              SHA512

              d64bc524d6df7c4c21a5ddfb0e6636317482ef4dc28006bd0a38d5e26c2db75626f216143026bf8acf3baa11d86c278e902c78afad4f806ca36f9e54bc75ff0a

            • C:\Users\Admin\AppData\Local\Temp\7zS7E3D.tmp\[email protected]\bootstrap.js

              Filesize

              2KB

              MD5

              df13f711e20e9c80171846d4f2f7ae06

              SHA1

              56d29cda58427efe0e21d3880d39eb1b0ef60bee

              SHA256

              6c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4

              SHA512

              6c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e

            • C:\Users\Admin\AppData\Local\Temp\7zS7E3D.tmp\[email protected]\chrome.manifest

              Filesize

              35B

              MD5

              48eaac075357388c8d0c43832e1a13c5

              SHA1

              005a321cd90ff19bed67666fd27415de37387742

              SHA256

              1ab2463522cda3793f8de317156230882703981a528cba8d4b9ab2846ab3f508

              SHA512

              f924aa2a12b7da8b93183ca06f0ae06e4a517307166bddb66f50b042c66afa7dedea26475bfe3d2962e1331d17262047d4586b5b4df20051fbd4b417836ddec9

            • C:\Users\Admin\AppData\Local\Temp\7zS7E3D.tmp\[email protected]\content\bg.js

              Filesize

              8KB

              MD5

              9817c12b4096eb75c16e7c7d3023a961

              SHA1

              9477fe4807574932e5497320e951b4961b7084ed

              SHA256

              d4f4de08293d0dfc38aaeaeb9e48dcf5eebffa061e672609f3ca4a160b7de8ef

              SHA512

              ef23dd538d27ddf35df47954359af3a67a185388369ee02dfe3f1c4dd188e2b30ebf65a13c53139618e5da85ca1bfd91bdc1975b57c0797cc10acab0baa8e258

            • C:\Users\Admin\AppData\Local\Temp\7zS7E3D.tmp\[email protected]\install.rdf

              Filesize

              597B

              MD5

              f234d5ababe453ecef1f80ed68c5afc8

              SHA1

              8281fee337c4ed68985bf1afd1db2d0d2b8de020

              SHA256

              5cb62b89f20f26551aeacee1fad37ed4017fe04f4d0e833cb84e4092c5b525b2

              SHA512

              8bf79b1b4ecad47cd4bfa9d79552b90ac85222b42906b2b33a952aec0daca58dbf516e3c5f131f4470eb6ad1483aefe1bd64b39648b74dd4bbe98422ac62054f

            • C:\Users\Admin\AppData\Local\Temp\7zS7E3D.tmp\qh3fFVA3k57o7Rj.dat

              Filesize

              1KB

              MD5

              dc0a3e9cf5b178b31fa3029c1b3ce9a3

              SHA1

              b2d11e1ffa2b21b4a98affcae303a211839ba409

              SHA256

              ec2460f277c941caef6b171eca6f477a8df65913be016ee06e0d58b91b1b6922

              SHA512

              b81a82acecb9de9db48de9744db497f446ae26de96bcdbbe093b0a8dd3acf8e0344aeb04b70770da9658986717db069d5a5d40efa888e1e0678373908aebb99c

            • C:\Users\Admin\AppData\Local\Temp\7zS7E3D.tmp\qh3fFVA3k57o7Rj.exe

              Filesize

              771KB

              MD5

              e8ef8ed232808bfa240b33b376bb74a8

              SHA1

              b7ebfbda42fb24594210d3f97921c5b33b88585d

              SHA256

              a4265c00fc8eb9371329ddbc19e760b433ea9f4ab4e16d4d95682031940ad6c9

              SHA512

              24a4de7ba07c5712a94cb8334764b6d23799dc4bb7153acf4eb7289ec4577b79bc9bf4adf6e0c65b13441d7783314ec4d9a13a61cf447124c43c44ff55fa8ef8

            • C:\Users\Admin\AppData\Local\Temp\7zS7E3D.tmp\qh3fFVA3k57o7Rj.exe

              Filesize

              771KB

              MD5

              e8ef8ed232808bfa240b33b376bb74a8

              SHA1

              b7ebfbda42fb24594210d3f97921c5b33b88585d

              SHA256

              a4265c00fc8eb9371329ddbc19e760b433ea9f4ab4e16d4d95682031940ad6c9

              SHA512

              24a4de7ba07c5712a94cb8334764b6d23799dc4bb7153acf4eb7289ec4577b79bc9bf4adf6e0c65b13441d7783314ec4d9a13a61cf447124c43c44ff55fa8ef8