Analysis

  • max time kernel
    41s
  • max time network
    66s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 16:24

General

  • Target

    fec732a9ec1571f7c63813704718983f73c8badc00cd79f124bd5e44c5b37796.exe

  • Size

    920KB

  • MD5

    a9cd7675fd206e2a286a8e123bde40b6

  • SHA1

    5341456280c053d8de53c946167dc62ff66bd92c

  • SHA256

    fec732a9ec1571f7c63813704718983f73c8badc00cd79f124bd5e44c5b37796

  • SHA512

    bd743420b3ccd827149de347a53a910c0346db2cfd666f20263eb3e5b32dba74f7371678dbb031917492f61390c6c44db352024968500fa57b0f303ac04702cb

  • SSDEEP

    24576:h1OYdaOfMtdHAqcdDVhYwiei7+EpFAh/kKK:h1OsWPHVmVhYwiLtKkKK

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 3 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fec732a9ec1571f7c63813704718983f73c8badc00cd79f124bd5e44c5b37796.exe
    "C:\Users\Admin\AppData\Local\Temp\fec732a9ec1571f7c63813704718983f73c8badc00cd79f124bd5e44c5b37796.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:304
    • C:\Users\Admin\AppData\Local\Temp\7zSF567.tmp\iMEwRC5GDObshjy.exe
      .\iMEwRC5GDObshjy.exe
      2⤵
      • Executes dropped EXE
      • Drops Chrome extension
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:664

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7zSF567.tmp\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    df13f711e20e9c80171846d4f2f7ae06

    SHA1

    56d29cda58427efe0e21d3880d39eb1b0ef60bee

    SHA256

    6c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4

    SHA512

    6c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e

  • C:\Users\Admin\AppData\Local\Temp\7zSF567.tmp\[email protected]\chrome.manifest

    Filesize

    35B

    MD5

    65b78fedfdc9a3ee0daf13170cb95699

    SHA1

    f91e39b955279f9b94f307c91b439b7bd12adb66

    SHA256

    e742b2c854bed1774e2df4fffa8651e2d5314795e9887d0c99ecfb607a14e3e9

    SHA512

    e5cdbee2fe7a7e1c9abc9a5e7c52fd0e34eb6b8a74cc57be57e7ac2b259d4c164b20d34128f4a4b59968b650ca1666c9eda03b9c9e431d26f6a896a22e8cb1e9

  • C:\Users\Admin\AppData\Local\Temp\7zSF567.tmp\[email protected]\content\bg.js

    Filesize

    8KB

    MD5

    1afa83c353bf55803858dc0fbb26e28b

    SHA1

    69c98df8349cce45ae6cf863a580c8ddcb260b4b

    SHA256

    5ebcd30aa54a00765f55edb2b4f0ecfa428b54e1f34acf143638f4dcbf616ac9

    SHA512

    8b5bec1f1837e5467a950084ce1d1fb12b2e3e00ea3cfc0f853d8fe37d6777db10f63b4191655a3cd80cb1da723d728cb8e4dbe156198cf4086b2d7833c3f45b

  • C:\Users\Admin\AppData\Local\Temp\7zSF567.tmp\[email protected]\install.rdf

    Filesize

    592B

    MD5

    11dd989a8a5ac4743a90844e3ab79f2c

    SHA1

    3a1227db89b62331221360c70fdf3e48f30bee44

    SHA256

    f9975beeff85dd7b56616369b6c0a3527b83329d056d3c1917e381e0de89375a

    SHA512

    402d2d54832a879e9e7fa0aa6fb02452f4a5de24bcecf9d6f44d2c475b7e9115fc732e6f62faa972ef021389e7221342b412b45211ddad54785c781cd03cffe6

  • C:\Users\Admin\AppData\Local\Temp\7zSF567.tmp\iMEwRC5GDObshjy.dat

    Filesize

    1KB

    MD5

    57bc9238b024b1359acd72379a6ec91c

    SHA1

    e623d26485d7bc84978a463e095182960b154013

    SHA256

    6f1a7f5e47584f7e8d45754eb67d34c19c0a1ad49a6876323c079857602e007b

    SHA512

    506ce590221c656359512d81e5686f2a467f941d07d0167fd8f0d2f73f31274d23edba9246d3d7d919a60bdc3fbc7c1da0a0356c0d59b732a442605adc59988e

  • C:\Users\Admin\AppData\Local\Temp\7zSF567.tmp\iMEwRC5GDObshjy.exe

    Filesize

    760KB

    MD5

    dcd148f6f3af3e3b0935c4fcc9f41811

    SHA1

    ee9bdbc7c568c7832d90b85921ab20030b6734cd

    SHA256

    f8689641199c6fc430121797965485d95abfbc430753e0e668817ab3b511a1e4

    SHA512

    34be8e60dc2decf8287a71516f359e80bb858ce52218dde1b01c821c9b95be38821f068b79b0da8dbe90865560e7ddab77b25e3971dda9be667fb3ae8f174886

  • C:\Users\Admin\AppData\Local\Temp\7zSF567.tmp\kkngambjnmenamlhjkmjfoefaokgfnkp\background.html

    Filesize

    143B

    MD5

    3f1c8a52f027bef7de4cd5968834071d

    SHA1

    1df64fa65ac3b356a16ed45b8d902544057d90e7

    SHA256

    c9573a80099e8457358b6222a6f7534000330f63dbcf8201eefc5b7281f9fc7b

    SHA512

    f1a04319b134fdab8da7594ccd0d37cb43ca8666a5cafc8cd2475c387d4ad14530598bc68e2207c27ff234b11a1b228edc1c5c63b5d7d660dec5ae902ccc110a

  • C:\Users\Admin\AppData\Local\Temp\7zSF567.tmp\kkngambjnmenamlhjkmjfoefaokgfnkp\content.js

    Filesize

    144B

    MD5

    fca19198fd8af21016a8b1dec7980002

    SHA1

    fd01a47d14004e17a625efe66cc46a06c786cf40

    SHA256

    332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a

    SHA512

    60f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47

  • C:\Users\Admin\AppData\Local\Temp\7zSF567.tmp\kkngambjnmenamlhjkmjfoefaokgfnkp\hRyN8m.js

    Filesize

    6KB

    MD5

    ac2c1c1696b4b4caa279f6163abb3c92

    SHA1

    7f00cc270d172fc666405fd793933d8dbfc5b849

    SHA256

    efd4564d137116c9d150cd7e06da5449025480b591570963c7722797a6aa71a4

    SHA512

    7c99c7e12d73da3058f242adc2266ac73e9966ac476b7758eece4ce8639cf514a423cfef105b05ac74262ad78250bb7e3c0fe8d9dd3f7de5689d239e2adc0943

  • C:\Users\Admin\AppData\Local\Temp\7zSF567.tmp\kkngambjnmenamlhjkmjfoefaokgfnkp\lsdb.js

    Filesize

    531B

    MD5

    36d98318ab2b3b2585a30984db328afb

    SHA1

    f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5

    SHA256

    ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7

    SHA512

    6f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a

  • C:\Users\Admin\AppData\Local\Temp\7zSF567.tmp\kkngambjnmenamlhjkmjfoefaokgfnkp\manifest.json

    Filesize

    498B

    MD5

    640199ea4621e34510de919f6a54436f

    SHA1

    dc65dbfad02bd2688030bd56ca1cab85917a9937

    SHA256

    e4aa7c089e32d14ddf584e9de6d007ec16581cd30c248ff7284bc0eb7757d4af

    SHA512

    d64bc524d6df7c4c21a5ddfb0e6636317482ef4dc28006bd0a38d5e26c2db75626f216143026bf8acf3baa11d86c278e902c78afad4f806ca36f9e54bc75ff0a

  • \Users\Admin\AppData\Local\Temp\7zSF567.tmp\iMEwRC5GDObshjy.exe

    Filesize

    760KB

    MD5

    dcd148f6f3af3e3b0935c4fcc9f41811

    SHA1

    ee9bdbc7c568c7832d90b85921ab20030b6734cd

    SHA256

    f8689641199c6fc430121797965485d95abfbc430753e0e668817ab3b511a1e4

    SHA512

    34be8e60dc2decf8287a71516f359e80bb858ce52218dde1b01c821c9b95be38821f068b79b0da8dbe90865560e7ddab77b25e3971dda9be667fb3ae8f174886

  • memory/304-54-0x0000000074C91000-0x0000000074C93000-memory.dmp

    Filesize

    8KB

  • memory/664-56-0x0000000000000000-mapping.dmp