Analysis

  • max time kernel
    144s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 16:33

General

  • Target

    fbe99b3275e86ff285a859159a05dc7242e5dc054c9a6c42b0efd0fde83edb8e.exe

  • Size

    920KB

  • MD5

    f03636099cc3d3ce3164368ee2e4de32

  • SHA1

    d4fd4158e347ac72086c6c24b86455f7feae0fc5

  • SHA256

    fbe99b3275e86ff285a859159a05dc7242e5dc054c9a6c42b0efd0fde83edb8e

  • SHA512

    dbfbb2288d6c71136f73ddc3cac06de858b6fc255d3e8bba167eb54c030888b42c7ba949b6f0bd5263bb2d035b603193293e14b4e9a6664da6ad9ef42e29afcf

  • SSDEEP

    24576:h1OYdaOEMtdHAqcdDVhYwiei7+EpFAh/kKN:h1Os5PHVmVhYwiLtKkKN

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fbe99b3275e86ff285a859159a05dc7242e5dc054c9a6c42b0efd0fde83edb8e.exe
    "C:\Users\Admin\AppData\Local\Temp\fbe99b3275e86ff285a859159a05dc7242e5dc054c9a6c42b0efd0fde83edb8e.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2736
    • C:\Users\Admin\AppData\Local\Temp\7zSFF73.tmp\TcitRZ2OPdteR46.exe
      .\TcitRZ2OPdteR46.exe
      2⤵
      • Executes dropped EXE
      • Drops Chrome extension
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3624
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
    1⤵
      PID:1340
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
      1⤵
        PID:4972

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\7zSFF73.tmp\[email protected]\bootstrap.js

        Filesize

        2KB

        MD5

        df13f711e20e9c80171846d4f2f7ae06

        SHA1

        56d29cda58427efe0e21d3880d39eb1b0ef60bee

        SHA256

        6c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4

        SHA512

        6c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e

      • C:\Users\Admin\AppData\Local\Temp\7zSFF73.tmp\[email protected]\chrome.manifest

        Filesize

        35B

        MD5

        e812c2dd8c16dbceb9432c6c57084847

        SHA1

        38424c4706424f36921397414a3e6121c7da1f8a

        SHA256

        bcf1b05a4392957f0ea3310ac2ae19d3ed3e5eaee694d1699f60b9bcd7643f5e

        SHA512

        d8e254c38d20711831d8d7f29f9824ae0bf1e07902e700bd61fabaef26f395b4e834a19465caf0a681681af3698c028268aa3321dfb439165fd6bcf00fe217f9

      • C:\Users\Admin\AppData\Local\Temp\7zSFF73.tmp\[email protected]\content\bg.js

        Filesize

        8KB

        MD5

        bdc4197119af879e2119c64956838691

        SHA1

        d3524e05491fb507d735d8f70e141e47dc3ae54e

        SHA256

        1fe9387644b430eb37ba528e2bfd1bf651b65df287ea1ffa6a0ffbc590dd3769

        SHA512

        c5703c2ba37558ec2a43d88b0c13186040e24dcf71fe6bb7adc5b46104737968befb813f8f43961ff69f5e52c2f90f5420ccfa2c38cd576f56ddc000534ea769

      • C:\Users\Admin\AppData\Local\Temp\7zSFF73.tmp\[email protected]\install.rdf

        Filesize

        592B

        MD5

        b2e27e877e7707ea2f01b1b79c8c121b

        SHA1

        119c85d71ff90b9e87a66353117e909ed282bb43

        SHA256

        bea08f28cc610bd251ef15f2bbc9a24f5d5e2da5369b29777fb01d943a975368

        SHA512

        0ad0e1d8163456b4b9fc00eac549d547cba7a7f8c9ba27115e1abf46b54b452360d9675ca0c7280a70821ae001c3b45dfd2090faa619f416a93dc89c2adf7497

      • C:\Users\Admin\AppData\Local\Temp\7zSFF73.tmp\TcitRZ2OPdteR46.dat

        Filesize

        1KB

        MD5

        0b300dd077f26a71d3f522a2d5eade42

        SHA1

        4c879afc77a21c6cae3a2d0b5e4cd3b4357322ae

        SHA256

        b09fb10eda804382f30f4211eed5bb725298dbba1a63a44d05296f88b2519bdf

        SHA512

        0e6e216f7b3bd2f561fe8c551b5562dc9910d8853a744c17e76c40cf423af59479a49a86624ddbbb9b1adcabb5ed2152e16b1c681c4f490bd603b4d60229bfaf

      • C:\Users\Admin\AppData\Local\Temp\7zSFF73.tmp\TcitRZ2OPdteR46.exe

        Filesize

        760KB

        MD5

        dcd148f6f3af3e3b0935c4fcc9f41811

        SHA1

        ee9bdbc7c568c7832d90b85921ab20030b6734cd

        SHA256

        f8689641199c6fc430121797965485d95abfbc430753e0e668817ab3b511a1e4

        SHA512

        34be8e60dc2decf8287a71516f359e80bb858ce52218dde1b01c821c9b95be38821f068b79b0da8dbe90865560e7ddab77b25e3971dda9be667fb3ae8f174886

      • C:\Users\Admin\AppData\Local\Temp\7zSFF73.tmp\TcitRZ2OPdteR46.exe

        Filesize

        760KB

        MD5

        dcd148f6f3af3e3b0935c4fcc9f41811

        SHA1

        ee9bdbc7c568c7832d90b85921ab20030b6734cd

        SHA256

        f8689641199c6fc430121797965485d95abfbc430753e0e668817ab3b511a1e4

        SHA512

        34be8e60dc2decf8287a71516f359e80bb858ce52218dde1b01c821c9b95be38821f068b79b0da8dbe90865560e7ddab77b25e3971dda9be667fb3ae8f174886

      • C:\Users\Admin\AppData\Local\Temp\7zSFF73.tmp\imofgndmnepipakkgmlmkiajnmdpfkhp\XFvWz4.js

        Filesize

        6KB

        MD5

        9dbc57dbc75176bb13c6c5e6deb7a8de

        SHA1

        5e0e9eba989c9725de71589bf3c4829a29ecaa64

        SHA256

        869d2d4ae8ff2595aa274b56b796cdd392ebdd75bec2b209c7d3dc72b1667b50

        SHA512

        82f8ec8045036e8b00bf95f418cb2bd8ba0eb009b1d5b32290ad10c7e3fbcb8d11e18ed321caa6d8ffabf661e8f8f5a4b351c45592a653eb6180b36c83f13b6a

      • C:\Users\Admin\AppData\Local\Temp\7zSFF73.tmp\imofgndmnepipakkgmlmkiajnmdpfkhp\background.html

        Filesize

        143B

        MD5

        65733b57b899431a79dd10220a1d4315

        SHA1

        f4f6bcee350fc657df8acd38c6d2d592e44b147e

        SHA256

        2f2a75ae916e026ccd414ca6531261afb4f23816e959cd82e6fb3e762e9cb424

        SHA512

        46a1df82feade7daa43f433f0cff05396a706b7c47fcbc84acb6ddb9469aef6307e773aab34c874f3ddc54f4af22971ab19e7851a434081a072a472c51b8fe7d

      • C:\Users\Admin\AppData\Local\Temp\7zSFF73.tmp\imofgndmnepipakkgmlmkiajnmdpfkhp\content.js

        Filesize

        144B

        MD5

        fca19198fd8af21016a8b1dec7980002

        SHA1

        fd01a47d14004e17a625efe66cc46a06c786cf40

        SHA256

        332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a

        SHA512

        60f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47

      • C:\Users\Admin\AppData\Local\Temp\7zSFF73.tmp\imofgndmnepipakkgmlmkiajnmdpfkhp\lsdb.js

        Filesize

        531B

        MD5

        36d98318ab2b3b2585a30984db328afb

        SHA1

        f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5

        SHA256

        ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7

        SHA512

        6f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a

      • C:\Users\Admin\AppData\Local\Temp\7zSFF73.tmp\imofgndmnepipakkgmlmkiajnmdpfkhp\manifest.json

        Filesize

        498B

        MD5

        640199ea4621e34510de919f6a54436f

        SHA1

        dc65dbfad02bd2688030bd56ca1cab85917a9937

        SHA256

        e4aa7c089e32d14ddf584e9de6d007ec16581cd30c248ff7284bc0eb7757d4af

        SHA512

        d64bc524d6df7c4c21a5ddfb0e6636317482ef4dc28006bd0a38d5e26c2db75626f216143026bf8acf3baa11d86c278e902c78afad4f806ca36f9e54bc75ff0a

      • memory/3624-132-0x0000000000000000-mapping.dmp