Analysis

  • max time kernel
    25s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    24/11/2022, 11:28

General

  • Target

    f9fe51090d8fbed94e58e94b052a6603e20ffc261466388dbfe64e95061da3f6.exe

  • Size

    931KB

  • MD5

    7a75b21d0fcfdbcc6e29a5f705dd115b

  • SHA1

    36d47b70c9b6f2bf204e5cb08597795748244c1a

  • SHA256

    f9fe51090d8fbed94e58e94b052a6603e20ffc261466388dbfe64e95061da3f6

  • SHA512

    a6cc3e055b25333ef2b9777ef686858b1181e083a7c0ba4752fe8366d5daf960bfdd46eab91899b0208ee0624f601a9f9a598683b8cf4ef42aad4151431edec1

  • SSDEEP

    24576:h1OYdaOxMWSUbvCXEQKSqGv8VWumF6RmcJozyPvpfW:h1OsHMWyUQ+GUVFIcHPvpfW

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 3 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f9fe51090d8fbed94e58e94b052a6603e20ffc261466388dbfe64e95061da3f6.exe
    "C:\Users\Admin\AppData\Local\Temp\f9fe51090d8fbed94e58e94b052a6603e20ffc261466388dbfe64e95061da3f6.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:748
    • C:\Users\Admin\AppData\Local\Temp\7zS2CAD.tmp\j0WJ4WKoEn3ktef.exe
      .\j0WJ4WKoEn3ktef.exe
      2⤵
      • Executes dropped EXE
      • Drops Chrome extension
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1908

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7zS2CAD.tmp\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    df13f711e20e9c80171846d4f2f7ae06

    SHA1

    56d29cda58427efe0e21d3880d39eb1b0ef60bee

    SHA256

    6c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4

    SHA512

    6c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e

  • C:\Users\Admin\AppData\Local\Temp\7zS2CAD.tmp\[email protected]\chrome.manifest

    Filesize

    35B

    MD5

    61fb47c8f1e8e9947466419511bb87bf

    SHA1

    da92eba898fc258754bf2cc2672948553e527e4c

    SHA256

    cc9625a7409e1923032516430a58e84ac505bb92d2a28395f5cae7a0f88752f3

    SHA512

    136998ccc979c2e41a740ee09d1d45bffea9e7c45ed7960233ffb436795c9de8c29660b2f15ea3aa99f54de5babca4bd6e378fe9f89cfb009b3d44765d3892cc

  • C:\Users\Admin\AppData\Local\Temp\7zS2CAD.tmp\[email protected]\content\bg.js

    Filesize

    9KB

    MD5

    e42693f4ccd732997e888a52b244ee84

    SHA1

    b65023c821fac3f525252dd8715eb5df0d2b2a37

    SHA256

    ce03bb4edfb42ec6089516de79ef7e4fc1ed367b380dcb5f3e9a2637c341e969

    SHA512

    13b7596a5ceb66e64ae170030d78d0045d71608edd059c449cd71c3e4d61f96b783fee5923b7c33528a2417a18aedecbf07e361b96a9942f2530811ae6ef8e82

  • C:\Users\Admin\AppData\Local\Temp\7zS2CAD.tmp\[email protected]\install.rdf

    Filesize

    593B

    MD5

    2d4f735cfe7f9924b588bee31a19f7f8

    SHA1

    52a69a7d6ec4616ed52d1b480ea5b726c178f8ec

    SHA256

    11a3e33e0105414d2bcaad0cb7e5a41e5c27ac17da9322e34445ca561ab39498

    SHA512

    79f49b2a2e2595b9609d74dc93c42c16d85f67ce5c7dfd516279b92257bc0031ee20824bc0dec3d809f96899211c2b7303b95c6bf571e0cb1c9bf78ab07cd7ee

  • C:\Users\Admin\AppData\Local\Temp\7zS2CAD.tmp\j0WJ4WKoEn3ktef.dat

    Filesize

    1KB

    MD5

    4583cbb5114ede59f40328abd918c246

    SHA1

    d17487f507ef7d2914627cff4ff8b1723154fa07

    SHA256

    6e2fbe12dd2cbc429e1a8e9cb1e5b8f47d1aed1f48d765309d967174829a0e60

    SHA512

    b5dfc4d4811fbaa767167d3c37cd8be1493cb4e030d95ce61a6d8b75a4cf193b32ae9041c95580999232d71b5dd395a6ec231876de4792dd9e256aae790e70e7

  • C:\Users\Admin\AppData\Local\Temp\7zS2CAD.tmp\j0WJ4WKoEn3ktef.exe

    Filesize

    771KB

    MD5

    e8ef8ed232808bfa240b33b376bb74a8

    SHA1

    b7ebfbda42fb24594210d3f97921c5b33b88585d

    SHA256

    a4265c00fc8eb9371329ddbc19e760b433ea9f4ab4e16d4d95682031940ad6c9

    SHA512

    24a4de7ba07c5712a94cb8334764b6d23799dc4bb7153acf4eb7289ec4577b79bc9bf4adf6e0c65b13441d7783314ec4d9a13a61cf447124c43c44ff55fa8ef8

  • C:\Users\Admin\AppData\Local\Temp\7zS2CAD.tmp\jclekefnebbdmdaifplfookmdjpigmkl\background.html

    Filesize

    138B

    MD5

    b566a7b485f09aa71608552679b7bdfb

    SHA1

    fcdc8805206820a2cd7d43d31b104088de594f4b

    SHA256

    fbcf0e9cbb35c1133503b638b1d971099cd542daee708dc4ccc13908fea9f5f6

    SHA512

    5a27fd0c21a282cd034ce7ec848966259f5e5d7ba077404399bb7ff7f2d189354e3c25c5c4eb6f5e9f5a9b16bb4a139db375cd9d21de68e9e2cbbd104844b333

  • C:\Users\Admin\AppData\Local\Temp\7zS2CAD.tmp\jclekefnebbdmdaifplfookmdjpigmkl\content.js

    Filesize

    144B

    MD5

    fca19198fd8af21016a8b1dec7980002

    SHA1

    fd01a47d14004e17a625efe66cc46a06c786cf40

    SHA256

    332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a

    SHA512

    60f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47

  • C:\Users\Admin\AppData\Local\Temp\7zS2CAD.tmp\jclekefnebbdmdaifplfookmdjpigmkl\k.js

    Filesize

    6KB

    MD5

    6b723803a38addf8cc92edb82fdda443

    SHA1

    8581691059e12004a4e5f75e50d1cf926337235e

    SHA256

    a31d0fa60dcfaceb974cf19210f50e7894fbf1b90b09b0d45280bd89d1c63dbb

    SHA512

    2697ad9a4e6469b9c933b61a0a610f18e594afb33d1e8279fd969d1c7cc4ac7946c2677f6be0c972520f64ec87987f4c48354a1fb7cb78215c612712de2e6872

  • C:\Users\Admin\AppData\Local\Temp\7zS2CAD.tmp\jclekefnebbdmdaifplfookmdjpigmkl\lsdb.js

    Filesize

    531B

    MD5

    36d98318ab2b3b2585a30984db328afb

    SHA1

    f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5

    SHA256

    ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7

    SHA512

    6f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a

  • C:\Users\Admin\AppData\Local\Temp\7zS2CAD.tmp\jclekefnebbdmdaifplfookmdjpigmkl\manifest.json

    Filesize

    498B

    MD5

    640199ea4621e34510de919f6a54436f

    SHA1

    dc65dbfad02bd2688030bd56ca1cab85917a9937

    SHA256

    e4aa7c089e32d14ddf584e9de6d007ec16581cd30c248ff7284bc0eb7757d4af

    SHA512

    d64bc524d6df7c4c21a5ddfb0e6636317482ef4dc28006bd0a38d5e26c2db75626f216143026bf8acf3baa11d86c278e902c78afad4f806ca36f9e54bc75ff0a

  • \Users\Admin\AppData\Local\Temp\7zS2CAD.tmp\j0WJ4WKoEn3ktef.exe

    Filesize

    771KB

    MD5

    e8ef8ed232808bfa240b33b376bb74a8

    SHA1

    b7ebfbda42fb24594210d3f97921c5b33b88585d

    SHA256

    a4265c00fc8eb9371329ddbc19e760b433ea9f4ab4e16d4d95682031940ad6c9

    SHA512

    24a4de7ba07c5712a94cb8334764b6d23799dc4bb7153acf4eb7289ec4577b79bc9bf4adf6e0c65b13441d7783314ec4d9a13a61cf447124c43c44ff55fa8ef8

  • memory/748-54-0x0000000075B11000-0x0000000075B13000-memory.dmp

    Filesize

    8KB