Analysis

  • max time kernel
    178s
  • max time network
    186s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 16:31

General

  • Target

    fc8c5fc02988fd6d9075a427cbd1da27d435cd3f4d271f014518e18b3f5254d6.exe

  • Size

    920KB

  • MD5

    f0d51b6f45fb32d3810d54c42030df9c

  • SHA1

    7818788c24631893f2a3053c47ce48987e17ebae

  • SHA256

    fc8c5fc02988fd6d9075a427cbd1da27d435cd3f4d271f014518e18b3f5254d6

  • SHA512

    434d9539edab3ebca4bc908ec4497e7f15dfc547eceaeb1eab8fc6e104234435f37c46a6fcd9b9978729778d972a2155278b761806247f464e6b2065429e1872

  • SSDEEP

    24576:h1OYdaO4MtdHAqcdDVhYwiei7+EpFAh/kKT:h1OsZPHVmVhYwiLtKkKT

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fc8c5fc02988fd6d9075a427cbd1da27d435cd3f4d271f014518e18b3f5254d6.exe
    "C:\Users\Admin\AppData\Local\Temp\fc8c5fc02988fd6d9075a427cbd1da27d435cd3f4d271f014518e18b3f5254d6.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4632
    • C:\Users\Admin\AppData\Local\Temp\7zSEE7B.tmp\7yV7E2fCe70m7Hk.exe
      .\7yV7E2fCe70m7Hk.exe
      2⤵
      • Executes dropped EXE
      • Drops Chrome extension
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      PID:4944
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
    1⤵
      PID:1968
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
      1⤵
        PID:2024

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Credential Access

      Credentials in Files

      1
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      1
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\7zSEE7B.tmp\[email protected]\bootstrap.js
        Filesize

        2KB

        MD5

        df13f711e20e9c80171846d4f2f7ae06

        SHA1

        56d29cda58427efe0e21d3880d39eb1b0ef60bee

        SHA256

        6c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4

        SHA512

        6c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e

      • C:\Users\Admin\AppData\Local\Temp\7zSEE7B.tmp\[email protected]\chrome.manifest
        Filesize

        35B

        MD5

        fec028841fe2b164868e9f77cd6722d6

        SHA1

        b800317f16786494caeccb034410bc68d906fdcb

        SHA256

        587a35850f30dca113e18891cc6fc1933b8a1ff21e02c9ec15425e4dae6ffe22

        SHA512

        81ad4395229632ef3207a5e5cece6f49ca883e913a7174f656bfc46ce657f7119edb96a75387f1b91a1de5805fb99dd8dafbdc2662e3e63b3b8ebd69580e368e

      • C:\Users\Admin\AppData\Local\Temp\7zSEE7B.tmp\[email protected]\content\bg.js
        Filesize

        9KB

        MD5

        5c8eec672362cbccb631b0b8c46d16cb

        SHA1

        cc65b6869190216b33265bc9366ae8db2101edae

        SHA256

        354d58039f7c4b864725769173fddf02ad79b105a101fa4023f2b21a3c8c8ecd

        SHA512

        c31654810e01db2c25dbd9110922aee9497591496fdecadddae532219d00fbeafc36678da5bfb3a716f807ae9c91a8fdedbebba895bbc4db14dc8e1361f1ea3d

      • C:\Users\Admin\AppData\Local\Temp\7zSEE7B.tmp\[email protected]\install.rdf
        Filesize

        591B

        MD5

        b24ede31182d9f80551ab3da3fd911cf

        SHA1

        8059a04554c1d8599dc3dac9efe904a28f514a3c

        SHA256

        a61754f78a3e82fd61356b5b696a69ecde0e9897e50764d664672b4bb6e48779

        SHA512

        dec216bd79b95a155db295f6583c90f62fba7651cec354483fe4a1662fab1e985cb639b488908d68f85ae5b4e5ab0e72d556301e26b9f99d70c240c05970474a

      • C:\Users\Admin\AppData\Local\Temp\7zSEE7B.tmp\7yV7E2fCe70m7Hk.dat
        Filesize

        1KB

        MD5

        f65ffbc1cb723602f139843e558c9ada

        SHA1

        8d59ac6bcccbe3e773cd82cce9e7ede7fdc03c33

        SHA256

        d10894aa4582514f35c31349319c236f793d639cefdf454a733863ef262c4fa8

        SHA512

        11c46574e323ba5d62c519f28ffa9da1154ab85e0a2e3ea796ce19858993c4c938d827a550ddb15f000be05eecffc999a0d919fdafb47b87049718393bf00595

      • C:\Users\Admin\AppData\Local\Temp\7zSEE7B.tmp\7yV7E2fCe70m7Hk.exe
        Filesize

        760KB

        MD5

        dcd148f6f3af3e3b0935c4fcc9f41811

        SHA1

        ee9bdbc7c568c7832d90b85921ab20030b6734cd

        SHA256

        f8689641199c6fc430121797965485d95abfbc430753e0e668817ab3b511a1e4

        SHA512

        34be8e60dc2decf8287a71516f359e80bb858ce52218dde1b01c821c9b95be38821f068b79b0da8dbe90865560e7ddab77b25e3971dda9be667fb3ae8f174886

      • C:\Users\Admin\AppData\Local\Temp\7zSEE7B.tmp\7yV7E2fCe70m7Hk.exe
        Filesize

        760KB

        MD5

        dcd148f6f3af3e3b0935c4fcc9f41811

        SHA1

        ee9bdbc7c568c7832d90b85921ab20030b6734cd

        SHA256

        f8689641199c6fc430121797965485d95abfbc430753e0e668817ab3b511a1e4

        SHA512

        34be8e60dc2decf8287a71516f359e80bb858ce52218dde1b01c821c9b95be38821f068b79b0da8dbe90865560e7ddab77b25e3971dda9be667fb3ae8f174886

      • C:\Users\Admin\AppData\Local\Temp\7zSEE7B.tmp\bedbialcgcifnaaildehgcapfllcnpje\BheMRWFstG.js
        Filesize

        6KB

        MD5

        2471db0b55e5d8bfab58fb19278abca9

        SHA1

        d07dc2d1e1e2c8e871afc5aa60ac067f3c93e1de

        SHA256

        4c23c1fd306ba69036167e118f772f87f3d31450017d25714856a9ed17279d72

        SHA512

        be44830e232aa2e6ed2a6a26508dfa21bac950c6b69ec68ff9eded560d35680807b557c3e75b5e3800221b3873b0a53e785e2828ad297f9291542e6d39e58708

      • C:\Users\Admin\AppData\Local\Temp\7zSEE7B.tmp\bedbialcgcifnaaildehgcapfllcnpje\background.html
        Filesize

        147B

        MD5

        03d3c37732879e138cdadfe4dd657eb9

        SHA1

        e740c481bb3d3eb37d81659d993d28897e9863f2

        SHA256

        b9ab78f867fb218a55a8d917384c9953ba13fe5b8891ccc2a21366839f4645a4

        SHA512

        44ab1cfe17b34da5dee3f3bf1710e72f1cde2470126d6fb6c134b721d8bdf327e1953cd8fa850cbc494019e6fc8d39fb43e847b5eb53fab00ed7aa8d6de4bedf

      • C:\Users\Admin\AppData\Local\Temp\7zSEE7B.tmp\bedbialcgcifnaaildehgcapfllcnpje\content.js
        Filesize

        144B

        MD5

        fca19198fd8af21016a8b1dec7980002

        SHA1

        fd01a47d14004e17a625efe66cc46a06c786cf40

        SHA256

        332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a

        SHA512

        60f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47

      • C:\Users\Admin\AppData\Local\Temp\7zSEE7B.tmp\bedbialcgcifnaaildehgcapfllcnpje\lsdb.js
        Filesize

        531B

        MD5

        36d98318ab2b3b2585a30984db328afb

        SHA1

        f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5

        SHA256

        ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7

        SHA512

        6f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a

      • C:\Users\Admin\AppData\Local\Temp\7zSEE7B.tmp\bedbialcgcifnaaildehgcapfllcnpje\manifest.json
        Filesize

        498B

        MD5

        664e2884e17f23553a19eee317642194

        SHA1

        a28ccc088d6b6692646150f3e8f111e568723fb4

        SHA256

        ee4ef853224cde2aa7e54351c02bc811af939202b82e19cbd1cc011fc3565191

        SHA512

        b2cef8c4dfb6a0648f21c53393b982c9171d8a0344a94970c13866ebd2870de2cd99dab5984000b10802c54a748230104c7997c3d2cd3ac5e97c9355a4cb7ecb

      • memory/4944-132-0x0000000000000000-mapping.dmp