Analysis

  • max time kernel
    44s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 11:12

General

  • Target

    2e7720589a8ca47a05ce66224c550332a0cc7ae0c613943631acd11f3da84c1e.exe

  • Size

    931KB

  • MD5

    8a3ec8f9d647a9ba3a32f1c787fd6616

  • SHA1

    9ee7f811917de3389291cb95580fecae11c73eb3

  • SHA256

    2e7720589a8ca47a05ce66224c550332a0cc7ae0c613943631acd11f3da84c1e

  • SHA512

    bd751db9f26c21f56f203ef79acc3838a7ca76b8cf6bb9e6612952cf8c335ecef8e69f4eea95ebacda3dbb964bd27e3d5d0a68c7420237b560e7aba8bc39d134

  • SSDEEP

    24576:h1OYdaOlMWSUbvCXEQKSqGv8VWumF6RmcJozyPvpf0:h1Os/MWyUQ+GUVFIcHPvpf0

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 3 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2e7720589a8ca47a05ce66224c550332a0cc7ae0c613943631acd11f3da84c1e.exe
    "C:\Users\Admin\AppData\Local\Temp\2e7720589a8ca47a05ce66224c550332a0cc7ae0c613943631acd11f3da84c1e.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Users\Admin\AppData\Local\Temp\7zS771.tmp\EXqeEiOB1B450SL.exe
      .\EXqeEiOB1B450SL.exe
      2⤵
      • Executes dropped EXE
      • Drops Chrome extension
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1312

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7zS771.tmp\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    df13f711e20e9c80171846d4f2f7ae06

    SHA1

    56d29cda58427efe0e21d3880d39eb1b0ef60bee

    SHA256

    6c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4

    SHA512

    6c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e

  • C:\Users\Admin\AppData\Local\Temp\7zS771.tmp\[email protected]\chrome.manifest

    Filesize

    35B

    MD5

    fe2061fa73bc2a7f035068af2a569dae

    SHA1

    0e343a2ced6b71791125a8b6121d01e41712bf25

    SHA256

    0c7d92e9fc50317438d85fd672a4a24c8f95d8aff6387f2627551678d7c79c8c

    SHA512

    405540594a575811f2ef560e4cfccb804ade23d1b5f0c0d66e2b7ba884851ee4c17ac061a75d5eb470bcee871ce5009a93ec902f62b550e0728a29e116645d8d

  • C:\Users\Admin\AppData\Local\Temp\7zS771.tmp\[email protected]\content\bg.js

    Filesize

    8KB

    MD5

    916d2f5ab0cbfdc907f62bc0bb4dae1f

    SHA1

    88256705e106785093a9151424bf7c4492fc34d0

    SHA256

    44b551a7edcefefeb50a73401dbbbcc0d791d6ff7387e6fc2c8e088ffadfc7de

    SHA512

    afacf2d5f3205d7fa98422c296c6fccf17f2290239bfb2d18cf258e2dad4060fa0b87d83b9d6b3117a3f79af05469b51e28ec2b47d7c4409936d70cdaee9c3be

  • C:\Users\Admin\AppData\Local\Temp\7zS771.tmp\[email protected]\install.rdf

    Filesize

    597B

    MD5

    c0f26a338f045822310ef740156fe377

    SHA1

    43305156add0d6d0df36361f96019b1f37f7f083

    SHA256

    5ac595b978f8a7d4e7ee4fd9bdd58c32d1ca8cc3040e54924282cee121846d15

    SHA512

    06fbcbdb20e0151e58f75ac603c9f1d8f9c713d943f7bb925ec7c0d80723d71f8438fedc0fea6a25c02667a523a7ef36def498e792eeb74b009c934dc9a60b93

  • C:\Users\Admin\AppData\Local\Temp\7zS771.tmp\EXqeEiOB1B450SL.dat

    Filesize

    1KB

    MD5

    231afa70f4b20870fd0da55041e3ae1b

    SHA1

    86f183154e58f6ffcb1724123c23ea32a6cb8f11

    SHA256

    e9f1808dc2449b95f3d56ccb73ac0009729aa0fee15fd719754d5a64268d6083

    SHA512

    ad32b47e0032f6dea41b7e2d4c5f0aa659b7687bbc9c56db4d0532b6e17fcd7c571627cafa3fb3fd37c705d5b087b02bb62d7c2a027c78f07c5aa2bcfe97917c

  • C:\Users\Admin\AppData\Local\Temp\7zS771.tmp\EXqeEiOB1B450SL.exe

    Filesize

    771KB

    MD5

    e8ef8ed232808bfa240b33b376bb74a8

    SHA1

    b7ebfbda42fb24594210d3f97921c5b33b88585d

    SHA256

    a4265c00fc8eb9371329ddbc19e760b433ea9f4ab4e16d4d95682031940ad6c9

    SHA512

    24a4de7ba07c5712a94cb8334764b6d23799dc4bb7153acf4eb7289ec4577b79bc9bf4adf6e0c65b13441d7783314ec4d9a13a61cf447124c43c44ff55fa8ef8

  • C:\Users\Admin\AppData\Local\Temp\7zS771.tmp\aijjhfklnkpbdmkdcfeghaapgnaccjab\UK0J.js

    Filesize

    6KB

    MD5

    af49acad3bdc248abc36bb33a3a5aa0a

    SHA1

    137e8f1ad16cc908df66eccdcb43d11f7fbe37d7

    SHA256

    1cf7b0bcf63ee053f72972f602eb3a81f60fa3d2510821b2a55c6a5c2b5e1f63

    SHA512

    e0bdfc8c201338581ba8e806074ec669704a2cff5bb1aa376f116cd64ed7cc69d10e8fa1fd02a115f73598864b5a68c0265ed06b2665253d7272bdd19f6eece9

  • C:\Users\Admin\AppData\Local\Temp\7zS771.tmp\aijjhfklnkpbdmkdcfeghaapgnaccjab\background.html

    Filesize

    141B

    MD5

    b7b1b31ca077f5cd81bbf3561452a812

    SHA1

    91a060200c3d6f645e86f4cb7f0bbcd1969024ca

    SHA256

    a2f8a89c8dfcd43eaf24e27ab51c287cebde4e775faf2dd4520753b708b161b2

    SHA512

    bb2f2b4f093ef648991f6fcd4578f8ce5c717afdee0855826245dc5db448650a835e4f8e0cabe7da8221f09cddb1da29b2df7ab3ebab12838fa2b76099a11d42

  • C:\Users\Admin\AppData\Local\Temp\7zS771.tmp\aijjhfklnkpbdmkdcfeghaapgnaccjab\content.js

    Filesize

    144B

    MD5

    fca19198fd8af21016a8b1dec7980002

    SHA1

    fd01a47d14004e17a625efe66cc46a06c786cf40

    SHA256

    332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a

    SHA512

    60f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47

  • C:\Users\Admin\AppData\Local\Temp\7zS771.tmp\aijjhfklnkpbdmkdcfeghaapgnaccjab\lsdb.js

    Filesize

    531B

    MD5

    36d98318ab2b3b2585a30984db328afb

    SHA1

    f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5

    SHA256

    ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7

    SHA512

    6f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a

  • C:\Users\Admin\AppData\Local\Temp\7zS771.tmp\aijjhfklnkpbdmkdcfeghaapgnaccjab\manifest.json

    Filesize

    498B

    MD5

    640199ea4621e34510de919f6a54436f

    SHA1

    dc65dbfad02bd2688030bd56ca1cab85917a9937

    SHA256

    e4aa7c089e32d14ddf584e9de6d007ec16581cd30c248ff7284bc0eb7757d4af

    SHA512

    d64bc524d6df7c4c21a5ddfb0e6636317482ef4dc28006bd0a38d5e26c2db75626f216143026bf8acf3baa11d86c278e902c78afad4f806ca36f9e54bc75ff0a

  • \Users\Admin\AppData\Local\Temp\7zS771.tmp\EXqeEiOB1B450SL.exe

    Filesize

    771KB

    MD5

    e8ef8ed232808bfa240b33b376bb74a8

    SHA1

    b7ebfbda42fb24594210d3f97921c5b33b88585d

    SHA256

    a4265c00fc8eb9371329ddbc19e760b433ea9f4ab4e16d4d95682031940ad6c9

    SHA512

    24a4de7ba07c5712a94cb8334764b6d23799dc4bb7153acf4eb7289ec4577b79bc9bf4adf6e0c65b13441d7783314ec4d9a13a61cf447124c43c44ff55fa8ef8

  • memory/1732-54-0x0000000075711000-0x0000000075713000-memory.dmp

    Filesize

    8KB