Analysis

  • max time kernel
    61s
  • max time network
    67s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 16:33

General

  • Target

    fbe99b3275e86ff285a859159a05dc7242e5dc054c9a6c42b0efd0fde83edb8e.exe

  • Size

    920KB

  • MD5

    f03636099cc3d3ce3164368ee2e4de32

  • SHA1

    d4fd4158e347ac72086c6c24b86455f7feae0fc5

  • SHA256

    fbe99b3275e86ff285a859159a05dc7242e5dc054c9a6c42b0efd0fde83edb8e

  • SHA512

    dbfbb2288d6c71136f73ddc3cac06de858b6fc255d3e8bba167eb54c030888b42c7ba949b6f0bd5263bb2d035b603193293e14b4e9a6664da6ad9ef42e29afcf

  • SSDEEP

    24576:h1OYdaOEMtdHAqcdDVhYwiei7+EpFAh/kKN:h1Os5PHVmVhYwiLtKkKN

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 3 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fbe99b3275e86ff285a859159a05dc7242e5dc054c9a6c42b0efd0fde83edb8e.exe
    "C:\Users\Admin\AppData\Local\Temp\fbe99b3275e86ff285a859159a05dc7242e5dc054c9a6c42b0efd0fde83edb8e.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1980
    • C:\Users\Admin\AppData\Local\Temp\7zSF097.tmp\TcitRZ2OPdteR46.exe
      .\TcitRZ2OPdteR46.exe
      2⤵
      • Executes dropped EXE
      • Drops Chrome extension
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1496

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7zSF097.tmp\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    df13f711e20e9c80171846d4f2f7ae06

    SHA1

    56d29cda58427efe0e21d3880d39eb1b0ef60bee

    SHA256

    6c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4

    SHA512

    6c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e

  • C:\Users\Admin\AppData\Local\Temp\7zSF097.tmp\[email protected]\chrome.manifest

    Filesize

    35B

    MD5

    e812c2dd8c16dbceb9432c6c57084847

    SHA1

    38424c4706424f36921397414a3e6121c7da1f8a

    SHA256

    bcf1b05a4392957f0ea3310ac2ae19d3ed3e5eaee694d1699f60b9bcd7643f5e

    SHA512

    d8e254c38d20711831d8d7f29f9824ae0bf1e07902e700bd61fabaef26f395b4e834a19465caf0a681681af3698c028268aa3321dfb439165fd6bcf00fe217f9

  • C:\Users\Admin\AppData\Local\Temp\7zSF097.tmp\[email protected]\content\bg.js

    Filesize

    8KB

    MD5

    bdc4197119af879e2119c64956838691

    SHA1

    d3524e05491fb507d735d8f70e141e47dc3ae54e

    SHA256

    1fe9387644b430eb37ba528e2bfd1bf651b65df287ea1ffa6a0ffbc590dd3769

    SHA512

    c5703c2ba37558ec2a43d88b0c13186040e24dcf71fe6bb7adc5b46104737968befb813f8f43961ff69f5e52c2f90f5420ccfa2c38cd576f56ddc000534ea769

  • C:\Users\Admin\AppData\Local\Temp\7zSF097.tmp\[email protected]\install.rdf

    Filesize

    592B

    MD5

    b2e27e877e7707ea2f01b1b79c8c121b

    SHA1

    119c85d71ff90b9e87a66353117e909ed282bb43

    SHA256

    bea08f28cc610bd251ef15f2bbc9a24f5d5e2da5369b29777fb01d943a975368

    SHA512

    0ad0e1d8163456b4b9fc00eac549d547cba7a7f8c9ba27115e1abf46b54b452360d9675ca0c7280a70821ae001c3b45dfd2090faa619f416a93dc89c2adf7497

  • C:\Users\Admin\AppData\Local\Temp\7zSF097.tmp\TcitRZ2OPdteR46.dat

    Filesize

    1KB

    MD5

    0b300dd077f26a71d3f522a2d5eade42

    SHA1

    4c879afc77a21c6cae3a2d0b5e4cd3b4357322ae

    SHA256

    b09fb10eda804382f30f4211eed5bb725298dbba1a63a44d05296f88b2519bdf

    SHA512

    0e6e216f7b3bd2f561fe8c551b5562dc9910d8853a744c17e76c40cf423af59479a49a86624ddbbb9b1adcabb5ed2152e16b1c681c4f490bd603b4d60229bfaf

  • C:\Users\Admin\AppData\Local\Temp\7zSF097.tmp\TcitRZ2OPdteR46.exe

    Filesize

    760KB

    MD5

    dcd148f6f3af3e3b0935c4fcc9f41811

    SHA1

    ee9bdbc7c568c7832d90b85921ab20030b6734cd

    SHA256

    f8689641199c6fc430121797965485d95abfbc430753e0e668817ab3b511a1e4

    SHA512

    34be8e60dc2decf8287a71516f359e80bb858ce52218dde1b01c821c9b95be38821f068b79b0da8dbe90865560e7ddab77b25e3971dda9be667fb3ae8f174886

  • C:\Users\Admin\AppData\Local\Temp\7zSF097.tmp\imofgndmnepipakkgmlmkiajnmdpfkhp\XFvWz4.js

    Filesize

    6KB

    MD5

    9dbc57dbc75176bb13c6c5e6deb7a8de

    SHA1

    5e0e9eba989c9725de71589bf3c4829a29ecaa64

    SHA256

    869d2d4ae8ff2595aa274b56b796cdd392ebdd75bec2b209c7d3dc72b1667b50

    SHA512

    82f8ec8045036e8b00bf95f418cb2bd8ba0eb009b1d5b32290ad10c7e3fbcb8d11e18ed321caa6d8ffabf661e8f8f5a4b351c45592a653eb6180b36c83f13b6a

  • C:\Users\Admin\AppData\Local\Temp\7zSF097.tmp\imofgndmnepipakkgmlmkiajnmdpfkhp\background.html

    Filesize

    143B

    MD5

    65733b57b899431a79dd10220a1d4315

    SHA1

    f4f6bcee350fc657df8acd38c6d2d592e44b147e

    SHA256

    2f2a75ae916e026ccd414ca6531261afb4f23816e959cd82e6fb3e762e9cb424

    SHA512

    46a1df82feade7daa43f433f0cff05396a706b7c47fcbc84acb6ddb9469aef6307e773aab34c874f3ddc54f4af22971ab19e7851a434081a072a472c51b8fe7d

  • C:\Users\Admin\AppData\Local\Temp\7zSF097.tmp\imofgndmnepipakkgmlmkiajnmdpfkhp\content.js

    Filesize

    144B

    MD5

    fca19198fd8af21016a8b1dec7980002

    SHA1

    fd01a47d14004e17a625efe66cc46a06c786cf40

    SHA256

    332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a

    SHA512

    60f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47

  • C:\Users\Admin\AppData\Local\Temp\7zSF097.tmp\imofgndmnepipakkgmlmkiajnmdpfkhp\lsdb.js

    Filesize

    531B

    MD5

    36d98318ab2b3b2585a30984db328afb

    SHA1

    f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5

    SHA256

    ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7

    SHA512

    6f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a

  • C:\Users\Admin\AppData\Local\Temp\7zSF097.tmp\imofgndmnepipakkgmlmkiajnmdpfkhp\manifest.json

    Filesize

    498B

    MD5

    640199ea4621e34510de919f6a54436f

    SHA1

    dc65dbfad02bd2688030bd56ca1cab85917a9937

    SHA256

    e4aa7c089e32d14ddf584e9de6d007ec16581cd30c248ff7284bc0eb7757d4af

    SHA512

    d64bc524d6df7c4c21a5ddfb0e6636317482ef4dc28006bd0a38d5e26c2db75626f216143026bf8acf3baa11d86c278e902c78afad4f806ca36f9e54bc75ff0a

  • \Users\Admin\AppData\Local\Temp\7zSF097.tmp\TcitRZ2OPdteR46.exe

    Filesize

    760KB

    MD5

    dcd148f6f3af3e3b0935c4fcc9f41811

    SHA1

    ee9bdbc7c568c7832d90b85921ab20030b6734cd

    SHA256

    f8689641199c6fc430121797965485d95abfbc430753e0e668817ab3b511a1e4

    SHA512

    34be8e60dc2decf8287a71516f359e80bb858ce52218dde1b01c821c9b95be38821f068b79b0da8dbe90865560e7ddab77b25e3971dda9be667fb3ae8f174886

  • memory/1496-56-0x0000000000000000-mapping.dmp

  • memory/1980-54-0x00000000767B1000-0x00000000767B3000-memory.dmp

    Filesize

    8KB