Analysis
-
max time kernel
42s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 16:28
Static task
static1
Behavioral task
behavioral1
Sample
fd50f51f563a2d46c2cfd899c48ae5d409ef4a87aa45bdc5a933d81ea1dfdef4.exe
Resource
win7-20221111-en
General
-
Target
fd50f51f563a2d46c2cfd899c48ae5d409ef4a87aa45bdc5a933d81ea1dfdef4.exe
-
Size
926KB
-
MD5
5f4ec87398cde04ebd61ca0e50873bf9
-
SHA1
ae82a333db6f66c1b6b0162eaa45d3bd24736635
-
SHA256
fd50f51f563a2d46c2cfd899c48ae5d409ef4a87aa45bdc5a933d81ea1dfdef4
-
SHA512
963ea5d20432e28fba20a794f4f7ee9a1034b7efa491c4478549d66f241facd72778a83a64d8d1fae2521bc1557d354356c6fdc54b072120d8b353e90f2d1290
-
SSDEEP
24576:h1OYdaOJnQju5vMu6qN2FctIOBYXZBai3GBlgpKLe/7rB:h1OsDQjO6HHzayGBe/7rB
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
J2S6DVRJS6hCGUk.exepid process 1504 J2S6DVRJS6hCGUk.exe -
Loads dropped DLL 1 IoCs
Processes:
fd50f51f563a2d46c2cfd899c48ae5d409ef4a87aa45bdc5a933d81ea1dfdef4.exepid process 1556 fd50f51f563a2d46c2cfd899c48ae5d409ef4a87aa45bdc5a933d81ea1dfdef4.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 3 IoCs
Processes:
J2S6DVRJS6hCGUk.exedescription ioc process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\dibkhppjaipdlimbcgbbcepdknapcpkm\1.3\manifest.json J2S6DVRJS6hCGUk.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\dibkhppjaipdlimbcgbbcepdknapcpkm\1.3\manifest.json J2S6DVRJS6hCGUk.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\dibkhppjaipdlimbcgbbcepdknapcpkm\1.3\manifest.json J2S6DVRJS6hCGUk.exe -
Drops file in System32 directory 4 IoCs
Processes:
J2S6DVRJS6hCGUk.exedescription ioc process File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol J2S6DVRJS6hCGUk.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI J2S6DVRJS6hCGUk.exe File opened for modification C:\Windows\System32\GroupPolicy J2S6DVRJS6hCGUk.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini J2S6DVRJS6hCGUk.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
J2S6DVRJS6hCGUk.exepid process 1504 J2S6DVRJS6hCGUk.exe 1504 J2S6DVRJS6hCGUk.exe 1504 J2S6DVRJS6hCGUk.exe 1504 J2S6DVRJS6hCGUk.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
fd50f51f563a2d46c2cfd899c48ae5d409ef4a87aa45bdc5a933d81ea1dfdef4.exedescription pid process target process PID 1556 wrote to memory of 1504 1556 fd50f51f563a2d46c2cfd899c48ae5d409ef4a87aa45bdc5a933d81ea1dfdef4.exe J2S6DVRJS6hCGUk.exe PID 1556 wrote to memory of 1504 1556 fd50f51f563a2d46c2cfd899c48ae5d409ef4a87aa45bdc5a933d81ea1dfdef4.exe J2S6DVRJS6hCGUk.exe PID 1556 wrote to memory of 1504 1556 fd50f51f563a2d46c2cfd899c48ae5d409ef4a87aa45bdc5a933d81ea1dfdef4.exe J2S6DVRJS6hCGUk.exe PID 1556 wrote to memory of 1504 1556 fd50f51f563a2d46c2cfd899c48ae5d409ef4a87aa45bdc5a933d81ea1dfdef4.exe J2S6DVRJS6hCGUk.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd50f51f563a2d46c2cfd899c48ae5d409ef4a87aa45bdc5a933d81ea1dfdef4.exe"C:\Users\Admin\AppData\Local\Temp\fd50f51f563a2d46c2cfd899c48ae5d409ef4a87aa45bdc5a933d81ea1dfdef4.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\7zSAE5A.tmp\J2S6DVRJS6hCGUk.exe.\J2S6DVRJS6hCGUk.exe2⤵
- Executes dropped EXE
- Drops Chrome extension
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1504
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5cc450045a17fb027e91df18244340964
SHA133fae57263fe1936a933bfbcc28c0e1d6ec65c56
SHA2565e67487807947ae52284ae6afd65bbeebef688b236246fe717e2b8e9537a014a
SHA5122548f8b94321427a137c0e38168a54b7c805a96a7fa0e9dff24b1172ac6e41a26c6a5a06b0ad4e15a06ae24c32d1f620556dc66720cae81b47cf3538514caa0c
-
Filesize
768KB
MD509e156c94b649920c0c6efa8508ada9a
SHA18ba966f84a07648613468b06a11d17f2650e8af0
SHA2562584e4b5077edba37c8e6f97ccdc2e582136ae0144212b37eb97cd4d8685059a
SHA5121a1d2ff05d413ec1c18735dcb06775f0e652fc778f0ce31a9bdc8e567beb32253df635ee2e9b3bdc430c49f0f5ca6128e44cbd88b2cb712a6712c8327f209375
-
C:\Users\Admin\AppData\Local\Temp\7zSAE5A.tmp\[email protected]\bootstrap.js
Filesize2KB
MD5df13f711e20e9c80171846d4f2f7ae06
SHA156d29cda58427efe0e21d3880d39eb1b0ef60bee
SHA2566c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4
SHA5126c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e
-
C:\Users\Admin\AppData\Local\Temp\7zSAE5A.tmp\[email protected]\chrome.manifest
Filesize35B
MD59757d41cb806c2f445f37435b06e7323
SHA1a6f141e64cc0db55400c5cffaa0fedfae1a3eecb
SHA2560107980b94f28a58517603bf3c0c1bca29d4e61730cec3d2be87e5a68be8222e
SHA51207d854cd9a837c28fc9fa38ec92689a4c0c28a856ff85f09082772b995fd8323ac2bb8225343ac6be117c73069b9fca9512a12bf6fa43f0129f2c010bbafd332
-
C:\Users\Admin\AppData\Local\Temp\7zSAE5A.tmp\[email protected]\content\bg.js
Filesize8KB
MD5e09e36b16b921343fdf59ba09c6fa416
SHA1f93a2665bf46e538dfb4d085d3282e2eb181f789
SHA2562373911330421610358c6ef548b2b527d7c7c9f36f999683cf5aacae9364b470
SHA51201225f1fa16fe63554365adf639ecc3b0d0e66511b6f1a7869b874b897df97174f3fa252c56d8a179f3276af834adb0324a303c1fab97ef77d3208008c204279
-
C:\Users\Admin\AppData\Local\Temp\7zSAE5A.tmp\[email protected]\install.rdf
Filesize592B
MD5dc7493b9c48af1c90f86470d2544b3da
SHA1e9649b8b30f173f06bd756e51f1cf680279ee585
SHA256167c16db6c260b17ab82ee40357ca3d400c5796fd4e478356e6b6adc407fe96c
SHA5128cb844d9b4db2470ce932ee401371a6bfbbf7123c8c6b4d2a1d0a31ccb9f980001fb0671bb548384003ffc5a383bceac77c8c7cc7d166f6de07fc312e6689e38
-
Filesize
146B
MD56ce1d5f6dd1351723e1bf441f61baa26
SHA1857859ac3b460bc2cc7a59e3e444510146b00c07
SHA25628cbbbc34c48344235a91ee313b49a3743f72a39e9e14030a3bd5fcda3597d2d
SHA51227a8d56e9d03a00b1d54f83af95f280a038f55ad9192f0a1b6b559154257bf3ad8a4524367134fa04012b5043d709c00136dfdb6a67f95c7cee9bfda89efc0fe
-
Filesize
144B
MD5fca19198fd8af21016a8b1dec7980002
SHA1fd01a47d14004e17a625efe66cc46a06c786cf40
SHA256332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a
SHA51260f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47
-
Filesize
6KB
MD5a3de2d49c0358f6ceb57b5cc55d2711f
SHA1d15ffb978bb46fb128abc5d3c1e49d2d9d455f81
SHA2566ce81f2870a3ffef0afab758335cb7f02b62a02728f8f88892cee1884bc41826
SHA512c17f9f3474fd5aac3a48d9bb4b65cae5dc70eded6fcecf929ef6968dfeea134e2e495e1334715acb294db7088267498f00b291bb56cea46a5483920d1ec313cf
-
Filesize
531B
MD536d98318ab2b3b2585a30984db328afb
SHA1f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5
SHA256ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7
SHA5126f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a
-
Filesize
498B
MD5664e2884e17f23553a19eee317642194
SHA1a28ccc088d6b6692646150f3e8f111e568723fb4
SHA256ee4ef853224cde2aa7e54351c02bc811af939202b82e19cbd1cc011fc3565191
SHA512b2cef8c4dfb6a0648f21c53393b982c9171d8a0344a94970c13866ebd2870de2cd99dab5984000b10802c54a748230104c7997c3d2cd3ac5e97c9355a4cb7ecb
-
Filesize
768KB
MD509e156c94b649920c0c6efa8508ada9a
SHA18ba966f84a07648613468b06a11d17f2650e8af0
SHA2562584e4b5077edba37c8e6f97ccdc2e582136ae0144212b37eb97cd4d8685059a
SHA5121a1d2ff05d413ec1c18735dcb06775f0e652fc778f0ce31a9bdc8e567beb32253df635ee2e9b3bdc430c49f0f5ca6128e44cbd88b2cb712a6712c8327f209375