Analysis

  • max time kernel
    95s
  • max time network
    32s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 16:36

General

  • Target

    face5ab4daf474b83f09e98c2013ef88c351cb7aeb3c2f45005d0f25da3ad880.exe

  • Size

    2.5MB

  • MD5

    fb9ed29acb28dbe0f2ad2422127a2186

  • SHA1

    00de1180f862469afda29f388a916aee1b3a4f62

  • SHA256

    face5ab4daf474b83f09e98c2013ef88c351cb7aeb3c2f45005d0f25da3ad880

  • SHA512

    ecd2c123baeb1e1ed366ad0ff738287199ef1e21f8961de24f944f6353a7cdf00926889a7a8dcffadd673f495d6e277001c92ace8244488b3fc12000096dd45a

  • SSDEEP

    49152:h1OsysNQH0eNGTTOxTnkSM1XN+QMz3p6bOkAk+YetEW6FOCMwEFhjzdUw1:h1OLH0eNGunkt3+1z3p6iVCg

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 3 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 11 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\face5ab4daf474b83f09e98c2013ef88c351cb7aeb3c2f45005d0f25da3ad880.exe
    "C:\Users\Admin\AppData\Local\Temp\face5ab4daf474b83f09e98c2013ef88c351cb7aeb3c2f45005d0f25da3ad880.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1004
    • C:\Users\Admin\AppData\Local\Temp\7zS403C.tmp\cuOfTOSzIKMczlp.exe
      .\cuOfTOSzIKMczlp.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops Chrome extension
      • Installs/modifies Browser Helper Object
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:972
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32.exe /s "C:\Program Files (x86)\SmartOnes\by3mjxvw5eCc5K.x64.dll"
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1992
        • C:\Windows\system32\regsvr32.exe
          /s "C:\Program Files (x86)\SmartOnes\by3mjxvw5eCc5K.x64.dll"
          4⤵
          • Loads dropped DLL
          • Installs/modifies Browser Helper Object
          PID:1584

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\SmartOnes\by3mjxvw5eCc5K.dat

    Filesize

    6KB

    MD5

    4ab41aaba633532762a2de5fe1729d80

    SHA1

    67f838cfc6bf7c9f84db783a6810cd32d3d66f6f

    SHA256

    9328a1ff89c278c36b787cab216337f4589b573452c8d34cee220e7a9d61577f

    SHA512

    b46986101c064e6ac959949f55b9513e48857b53c0817dbe8b85d9dc2e5f126fae5d096ccf54b681f97134b1e58d062debda0f6038bbfc278cb52b4dc47e2eaa

  • C:\Program Files (x86)\SmartOnes\by3mjxvw5eCc5K.x64.dll

    Filesize

    891KB

    MD5

    bef492ffc032769cde00802f48a17fab

    SHA1

    a91e733c1269eb785f8e23dc475acac7432f0563

    SHA256

    473507950695ec743b98e5ef4b8970b2c7e6936556903c94f7fa88917265255d

    SHA512

    4f61d5f3a45d20cd00ed7ee6b874bf2dcbf248b8f65dfd8580c7148d6c71c316cace409be675a2ea919e8a12caf8690fafaf14c0f5479df55689401d2432afa0

  • C:\Users\Admin\AppData\Local\Temp\7zS403C.tmp\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    df13f711e20e9c80171846d4f2f7ae06

    SHA1

    56d29cda58427efe0e21d3880d39eb1b0ef60bee

    SHA256

    6c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4

    SHA512

    6c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e

  • C:\Users\Admin\AppData\Local\Temp\7zS403C.tmp\[email protected]\chrome.manifest

    Filesize

    35B

    MD5

    9ab266aa29942d270c2082d0929b63ce

    SHA1

    cc7820338979577b282e9afa8d9ed558fa76660b

    SHA256

    c3f916fb3cdbdb94b6d4a9b0691fb92edda44c15148230663e92f76406d9f1fa

    SHA512

    9c1cbafa1c1ec841b43b403d04fc250155f4ad15dea42bc9067ec9ddbfc9a4479008ab1127d6e9e4179682487f574a43db302f8ec1a81db6433160ec47674829

  • C:\Users\Admin\AppData\Local\Temp\7zS403C.tmp\[email protected]\content\bg.js

    Filesize

    7KB

    MD5

    76fc9360c28c00abda27948efdfaf039

    SHA1

    91102c50acc6edf542ee93cefcbc9697c77aceab

    SHA256

    fd665584473d4db130fb55f858628920584b21d199a36b4e2dda61a2a5818dee

    SHA512

    da76f6b2bcf676d6706c9c2190bbf751bca5505a63460b1463b7761dc62af6e0d4a2e693e3aeaf1b5a1ab33d4a719053163b652aa868f97ad74126f4e750e4fd

  • C:\Users\Admin\AppData\Local\Temp\7zS403C.tmp\[email protected]\install.rdf

    Filesize

    593B

    MD5

    d7edb6158934bb98c923f247559294a9

    SHA1

    6272cc11813205d17d53b0e51db197e77b9d53b4

    SHA256

    1a74bc6ffd74fd11bde9e173f1d8183313a3bdc5afdda6c9a072e0a087e52da3

    SHA512

    b14ae3bd6d35cc6669b0dec5ed1c4aeab581ada960092719cccf3f0606a998f99868b97d1b8861063857c4ffb2922e6bb8e6802122c4c1368048ee162306f64c

  • C:\Users\Admin\AppData\Local\Temp\7zS403C.tmp\by3mjxvw5eCc5K.dll

    Filesize

    754KB

    MD5

    0ea14ffbf9bc129f87d5a633ca028a12

    SHA1

    c91e00a9d6590556a4c13a46cb6c934f84cf2b2b

    SHA256

    9206058e3e04af4fb8d5c05ae8f088cf0a289ea0e4cd692c4f2d76439adb0d47

    SHA512

    0cfd075335346690ead8c5aef2340b56ce07c59d6243ad102fee0053d64f1a7847e56ba27f5bbcac4048f2c1cf70038e7cdffafe1cc28994603fdd65d2bf7bb2

  • C:\Users\Admin\AppData\Local\Temp\7zS403C.tmp\by3mjxvw5eCc5K.tlb

    Filesize

    3KB

    MD5

    4ab2bba691d66beca01f76ac65546fe8

    SHA1

    16f05ce91f3e2fe4b43452e24d56836fc65615af

    SHA256

    12816936003f13a1711de73328e38f311926a4cc9d1a836f46c9ccc02b6fb06f

    SHA512

    f034390bfd57618bbfd218c3df9e465dda8f4fa51fc0445c74e246472a4cde2bc0bfe4607cbc8cb31ac0edff62a84e954179fadddc2b644b8726cfa3e01694a2

  • C:\Users\Admin\AppData\Local\Temp\7zS403C.tmp\by3mjxvw5eCc5K.x64.dll

    Filesize

    891KB

    MD5

    bef492ffc032769cde00802f48a17fab

    SHA1

    a91e733c1269eb785f8e23dc475acac7432f0563

    SHA256

    473507950695ec743b98e5ef4b8970b2c7e6936556903c94f7fa88917265255d

    SHA512

    4f61d5f3a45d20cd00ed7ee6b874bf2dcbf248b8f65dfd8580c7148d6c71c316cace409be675a2ea919e8a12caf8690fafaf14c0f5479df55689401d2432afa0

  • C:\Users\Admin\AppData\Local\Temp\7zS403C.tmp\cuOfTOSzIKMczlp.dat

    Filesize

    6KB

    MD5

    4ab41aaba633532762a2de5fe1729d80

    SHA1

    67f838cfc6bf7c9f84db783a6810cd32d3d66f6f

    SHA256

    9328a1ff89c278c36b787cab216337f4589b573452c8d34cee220e7a9d61577f

    SHA512

    b46986101c064e6ac959949f55b9513e48857b53c0817dbe8b85d9dc2e5f126fae5d096ccf54b681f97134b1e58d062debda0f6038bbfc278cb52b4dc47e2eaa

  • C:\Users\Admin\AppData\Local\Temp\7zS403C.tmp\cuOfTOSzIKMczlp.exe

    Filesize

    774KB

    MD5

    fac681323e2e0ea322ef16fa551cf1e8

    SHA1

    744f89e591a6ced737cfe9214ce09c263de50211

    SHA256

    537f2df71a2f21f943a39d1c6d093a442e7ee975ed3e29b733b8bc5bf646793c

    SHA512

    22626bd0e79edac062b61d64234f563e3a8218703276a19a0b01749e2cad8387c8bd39bfe13810b787fb9e4c7f1669ea542e36bbf63c7c243fc68bb6fdf5c7b2

  • C:\Users\Admin\AppData\Local\Temp\7zS403C.tmp\cuOfTOSzIKMczlp.exe

    Filesize

    774KB

    MD5

    fac681323e2e0ea322ef16fa551cf1e8

    SHA1

    744f89e591a6ced737cfe9214ce09c263de50211

    SHA256

    537f2df71a2f21f943a39d1c6d093a442e7ee975ed3e29b733b8bc5bf646793c

    SHA512

    22626bd0e79edac062b61d64234f563e3a8218703276a19a0b01749e2cad8387c8bd39bfe13810b787fb9e4c7f1669ea542e36bbf63c7c243fc68bb6fdf5c7b2

  • C:\Users\Admin\AppData\Local\Temp\7zS403C.tmp\imanafclkdpogkokjcmijfepaoeeijhe\background.html

    Filesize

    143B

    MD5

    6471c5bc89b6151d7b742e35df58a5a4

    SHA1

    5b50941749486bd3e0d53af37719d744a7db860d

    SHA256

    f4fba05738fdaec8903c5e19e13fea6f1f4d39e84903999332e32246112b4714

    SHA512

    f82b2a26ad46ca64c373183098a6d936d965ad698e9ec052c5e854c4b34bd142bc4e9eb34b9b38bce4d612744e310389902ca4579742c01df708c358cf906dbc

  • C:\Users\Admin\AppData\Local\Temp\7zS403C.tmp\imanafclkdpogkokjcmijfepaoeeijhe\content.js

    Filesize

    144B

    MD5

    fca19198fd8af21016a8b1dec7980002

    SHA1

    fd01a47d14004e17a625efe66cc46a06c786cf40

    SHA256

    332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a

    SHA512

    60f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47

  • C:\Users\Admin\AppData\Local\Temp\7zS403C.tmp\imanafclkdpogkokjcmijfepaoeeijhe\lsdb.js

    Filesize

    531B

    MD5

    36d98318ab2b3b2585a30984db328afb

    SHA1

    f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5

    SHA256

    ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7

    SHA512

    6f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a

  • C:\Users\Admin\AppData\Local\Temp\7zS403C.tmp\imanafclkdpogkokjcmijfepaoeeijhe\manifest.json

    Filesize

    501B

    MD5

    783a662abb6dda3a7a75a0ba900fb881

    SHA1

    e6bae0ab7a9ee310cd24dd6dc4561cfab93012e1

    SHA256

    a3a94893950c33f3ad535f04b8ffc638202e6d2a4d879e4457a6678468edb779

    SHA512

    4988a9af0447e189cd23d456b3229be9079e2f23096a000f79af4f40b4c8f3e9db23c958042f25b08e07e3ddb9cbbe11f07c125fb8b185c3dd7838aac9aaf43b

  • C:\Users\Admin\AppData\Local\Temp\7zS403C.tmp\imanafclkdpogkokjcmijfepaoeeijhe\qJoROb.js

    Filesize

    5KB

    MD5

    e667889e8ecf502ff9bd9cb9a91d1854

    SHA1

    125a1a99125feec00604ae803d86732fa5f0c295

    SHA256

    20539d78ca1da37ed0ec5f410ec51eee8dfcfe9e0c5cbfc9aa581c14d9ede2f4

    SHA512

    b66f281a807667ea72274a7952f7f6aef4c0fadc4f4171abe3d7a1d3831632a89fda6cc549915a50e1c2e43272715fd72dffbda6a0a80829c6c6a0a37d1dc003

  • \Program Files (x86)\SmartOnes\by3mjxvw5eCc5K.dll

    Filesize

    754KB

    MD5

    0ea14ffbf9bc129f87d5a633ca028a12

    SHA1

    c91e00a9d6590556a4c13a46cb6c934f84cf2b2b

    SHA256

    9206058e3e04af4fb8d5c05ae8f088cf0a289ea0e4cd692c4f2d76439adb0d47

    SHA512

    0cfd075335346690ead8c5aef2340b56ce07c59d6243ad102fee0053d64f1a7847e56ba27f5bbcac4048f2c1cf70038e7cdffafe1cc28994603fdd65d2bf7bb2

  • \Program Files (x86)\SmartOnes\by3mjxvw5eCc5K.x64.dll

    Filesize

    891KB

    MD5

    bef492ffc032769cde00802f48a17fab

    SHA1

    a91e733c1269eb785f8e23dc475acac7432f0563

    SHA256

    473507950695ec743b98e5ef4b8970b2c7e6936556903c94f7fa88917265255d

    SHA512

    4f61d5f3a45d20cd00ed7ee6b874bf2dcbf248b8f65dfd8580c7148d6c71c316cace409be675a2ea919e8a12caf8690fafaf14c0f5479df55689401d2432afa0

  • \Program Files (x86)\SmartOnes\by3mjxvw5eCc5K.x64.dll

    Filesize

    891KB

    MD5

    bef492ffc032769cde00802f48a17fab

    SHA1

    a91e733c1269eb785f8e23dc475acac7432f0563

    SHA256

    473507950695ec743b98e5ef4b8970b2c7e6936556903c94f7fa88917265255d

    SHA512

    4f61d5f3a45d20cd00ed7ee6b874bf2dcbf248b8f65dfd8580c7148d6c71c316cace409be675a2ea919e8a12caf8690fafaf14c0f5479df55689401d2432afa0

  • \Users\Admin\AppData\Local\Temp\7zS403C.tmp\cuOfTOSzIKMczlp.exe

    Filesize

    774KB

    MD5

    fac681323e2e0ea322ef16fa551cf1e8

    SHA1

    744f89e591a6ced737cfe9214ce09c263de50211

    SHA256

    537f2df71a2f21f943a39d1c6d093a442e7ee975ed3e29b733b8bc5bf646793c

    SHA512

    22626bd0e79edac062b61d64234f563e3a8218703276a19a0b01749e2cad8387c8bd39bfe13810b787fb9e4c7f1669ea542e36bbf63c7c243fc68bb6fdf5c7b2

  • memory/972-56-0x0000000000000000-mapping.dmp

  • memory/1004-54-0x0000000075881000-0x0000000075883000-memory.dmp

    Filesize

    8KB

  • memory/1584-77-0x0000000000000000-mapping.dmp

  • memory/1584-78-0x000007FEFBFC1000-0x000007FEFBFC3000-memory.dmp

    Filesize

    8KB

  • memory/1992-73-0x0000000000000000-mapping.dmp