Analysis

  • max time kernel
    40s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    24/11/2022, 11:26

General

  • Target

    7d211591bde4abc011d4b1906dbeca3574cde632b21f568ef397d82238ff7cf5.exe

  • Size

    931KB

  • MD5

    e5fc2d311ab64493ed9f612208151305

  • SHA1

    2a6668ab82d6f78d760d9000101dfc091778c71a

  • SHA256

    7d211591bde4abc011d4b1906dbeca3574cde632b21f568ef397d82238ff7cf5

  • SHA512

    34441703b0a7b8bb2be524220de1b74cfaf7bd114a98f6fec1bdb3ffffc18d04514c21d5c3f32b290e729702f958ede547ca202aff1adcbb4378281edc224f53

  • SSDEEP

    24576:h1OYdaONMWSUbvCXEQKSqGv8VWumF6RmcJozyPvpfC:h1OsnMWyUQ+GUVFIcHPvpfC

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 3 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7d211591bde4abc011d4b1906dbeca3574cde632b21f568ef397d82238ff7cf5.exe
    "C:\Users\Admin\AppData\Local\Temp\7d211591bde4abc011d4b1906dbeca3574cde632b21f568ef397d82238ff7cf5.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:972
    • C:\Users\Admin\AppData\Local\Temp\7zS9A0F.tmp\SkAv8yBCY1GjGf1.exe
      .\SkAv8yBCY1GjGf1.exe
      2⤵
      • Executes dropped EXE
      • Drops Chrome extension
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:588

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7zS9A0F.tmp\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    df13f711e20e9c80171846d4f2f7ae06

    SHA1

    56d29cda58427efe0e21d3880d39eb1b0ef60bee

    SHA256

    6c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4

    SHA512

    6c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e

  • C:\Users\Admin\AppData\Local\Temp\7zS9A0F.tmp\[email protected]\chrome.manifest

    Filesize

    35B

    MD5

    4385f5a82db6b691ec2b6dd05292d01d

    SHA1

    8cc7e62aa2d7fca2c64a399c6a90875a0f3b4430

    SHA256

    027a85f5eaad27c7c698f8e1739c68abeb9219d73677bdd6a957b23b2103f229

    SHA512

    ecebf3e6ee7d34c6c98f62bb6dd76300c88b379aa0c3d2a50ce924d20ec4a728c926d80e37461634fa54dd70bda6277d134d495e896b338f25a40eb6597c7d82

  • C:\Users\Admin\AppData\Local\Temp\7zS9A0F.tmp\[email protected]\content\bg.js

    Filesize

    8KB

    MD5

    2a6e2ef08d42221d7959d673ab46f169

    SHA1

    1adc1e907871c181e3ee01c5d27c71933f0dd884

    SHA256

    f6b2a403a4bdfdf9152be8c0114dec888d601ad446f0377c96da23e520563521

    SHA512

    0a7fcba82fee38e73f142d772d9034b8caecf4ebd69d8c8ba3bae4cbfb8fdd6ecb18c010da7f1b1a434f29f212812ae606344cd0a6e48d53f338324d0f5b8ed9

  • C:\Users\Admin\AppData\Local\Temp\7zS9A0F.tmp\[email protected]\install.rdf

    Filesize

    592B

    MD5

    643144777be5555f7f3058c6ea4eca67

    SHA1

    b1d257e95e35547958e3c7602cad0bf42b806d7d

    SHA256

    2b1b7913f5e6d8f61a3c1db2128123f05a4b81a150ad3684d7b4fcd545b07496

    SHA512

    7ac1e0e7688291a231a5bd8f1ed3288d0294ea8c52f86390edeae915066fb98887d3f0feab7af4bae2d8670156eb506d324f6de739c923cb97b6a824c2e77556

  • C:\Users\Admin\AppData\Local\Temp\7zS9A0F.tmp\SkAv8yBCY1GjGf1.dat

    Filesize

    1KB

    MD5

    ca8f2b55b80c08549db231f8758eadf1

    SHA1

    4d2a4b424d8e486cf0f07deded459901739da437

    SHA256

    e38ad431580ed7211374ca618047169b17e100025de0778691506fc15a9005b8

    SHA512

    c0a9fb3d366b635d54f872966a86b645141c225972935083c80e45b9d54370f09b4db1279ef418d1b6bcd8d97f07c66fa99a009cec751f82d84814ab408862d7

  • C:\Users\Admin\AppData\Local\Temp\7zS9A0F.tmp\SkAv8yBCY1GjGf1.exe

    Filesize

    771KB

    MD5

    e8ef8ed232808bfa240b33b376bb74a8

    SHA1

    b7ebfbda42fb24594210d3f97921c5b33b88585d

    SHA256

    a4265c00fc8eb9371329ddbc19e760b433ea9f4ab4e16d4d95682031940ad6c9

    SHA512

    24a4de7ba07c5712a94cb8334764b6d23799dc4bb7153acf4eb7289ec4577b79bc9bf4adf6e0c65b13441d7783314ec4d9a13a61cf447124c43c44ff55fa8ef8

  • C:\Users\Admin\AppData\Local\Temp\7zS9A0F.tmp\lfhmdciimlmkpdaliofpmcjbokpaplie\Vnhy6u4u.js

    Filesize

    6KB

    MD5

    d734b8bc1524864c4d00c330b0fe608a

    SHA1

    d210218520b959a56a0f05e3b043e82f6c07b1b9

    SHA256

    047321f561da13cdfb9887e33c57ed9a892e76c619e3cb47418ed76e3f9f3db1

    SHA512

    dc04cdd42946aa2fcb4ed061c5733aab300af9d5ebf14253a228e3729421c469bdf016211dc3dd2b2073ca925ac2b5a40f18e5669690f5f60da567ebb2ed3569

  • C:\Users\Admin\AppData\Local\Temp\7zS9A0F.tmp\lfhmdciimlmkpdaliofpmcjbokpaplie\background.html

    Filesize

    145B

    MD5

    888f6d3f2aef255921c9596d1eb51b9b

    SHA1

    2d203f88329cd2f16778f889af3735446c2a2baa

    SHA256

    9492416ccc184daaf4d6f1df893a5b6c5ac37281cfffb2494118fd55d3ecf85f

    SHA512

    3dca23fa4fa6663fc9daf4d1345ebde27cb14a9b9b6682ff80f1ac3065ad3e973de9dcf6ff9f8322fa1b105b7da3b7b44e13db3fc32fab38d2ba0914703d740a

  • C:\Users\Admin\AppData\Local\Temp\7zS9A0F.tmp\lfhmdciimlmkpdaliofpmcjbokpaplie\content.js

    Filesize

    144B

    MD5

    fca19198fd8af21016a8b1dec7980002

    SHA1

    fd01a47d14004e17a625efe66cc46a06c786cf40

    SHA256

    332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a

    SHA512

    60f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47

  • C:\Users\Admin\AppData\Local\Temp\7zS9A0F.tmp\lfhmdciimlmkpdaliofpmcjbokpaplie\lsdb.js

    Filesize

    531B

    MD5

    36d98318ab2b3b2585a30984db328afb

    SHA1

    f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5

    SHA256

    ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7

    SHA512

    6f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a

  • C:\Users\Admin\AppData\Local\Temp\7zS9A0F.tmp\lfhmdciimlmkpdaliofpmcjbokpaplie\manifest.json

    Filesize

    498B

    MD5

    640199ea4621e34510de919f6a54436f

    SHA1

    dc65dbfad02bd2688030bd56ca1cab85917a9937

    SHA256

    e4aa7c089e32d14ddf584e9de6d007ec16581cd30c248ff7284bc0eb7757d4af

    SHA512

    d64bc524d6df7c4c21a5ddfb0e6636317482ef4dc28006bd0a38d5e26c2db75626f216143026bf8acf3baa11d86c278e902c78afad4f806ca36f9e54bc75ff0a

  • \Users\Admin\AppData\Local\Temp\7zS9A0F.tmp\SkAv8yBCY1GjGf1.exe

    Filesize

    771KB

    MD5

    e8ef8ed232808bfa240b33b376bb74a8

    SHA1

    b7ebfbda42fb24594210d3f97921c5b33b88585d

    SHA256

    a4265c00fc8eb9371329ddbc19e760b433ea9f4ab4e16d4d95682031940ad6c9

    SHA512

    24a4de7ba07c5712a94cb8334764b6d23799dc4bb7153acf4eb7289ec4577b79bc9bf4adf6e0c65b13441d7783314ec4d9a13a61cf447124c43c44ff55fa8ef8

  • memory/972-54-0x00000000754F1000-0x00000000754F3000-memory.dmp

    Filesize

    8KB