Analysis
-
max time kernel
167s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 16:29
Static task
static1
Behavioral task
behavioral1
Sample
fd1163404f8834bdea3ccd98fc5149303ceecfd4284884460ccbddd72eaa4f09.exe
Resource
win7-20220812-en
General
-
Target
fd1163404f8834bdea3ccd98fc5149303ceecfd4284884460ccbddd72eaa4f09.exe
-
Size
931KB
-
MD5
803dbc2da9916e4f62b94fccb19a9721
-
SHA1
cd8f92834107f11c14896cf56c3584335a69ac4f
-
SHA256
fd1163404f8834bdea3ccd98fc5149303ceecfd4284884460ccbddd72eaa4f09
-
SHA512
fac4b3a06bb2181a4731c42a38186ff6e934ea5885fdc4184414376102fbc9a54f4bbcb83d053e115dc50862adb8707a2b733f23fe4ecfee40475e668b3d7469
-
SSDEEP
24576:h1OYdaOeCZ/iWCvu/2sWsJA/jlt+DHhst:h1OssCpYO/dJJDHhst
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
WZHwsS4ADOaf4Rs.exepid process 4524 WZHwsS4ADOaf4Rs.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 5 IoCs
Processes:
WZHwsS4ADOaf4Rs.exedescription ioc process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\olmmhnkdikolkgldmjceakcilnihihej\2.0\manifest.json WZHwsS4ADOaf4Rs.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\olmmhnkdikolkgldmjceakcilnihihej\2.0\manifest.json WZHwsS4ADOaf4Rs.exe File created C:\Users\DefaultAccount\AppData\Local\Google\Chrome\User Data\Default\Extensions\olmmhnkdikolkgldmjceakcilnihihej\2.0\manifest.json WZHwsS4ADOaf4Rs.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\olmmhnkdikolkgldmjceakcilnihihej\2.0\manifest.json WZHwsS4ADOaf4Rs.exe File created C:\Users\WDAGUtilityAccount\AppData\Local\Google\Chrome\User Data\Default\Extensions\olmmhnkdikolkgldmjceakcilnihihej\2.0\manifest.json WZHwsS4ADOaf4Rs.exe -
Drops file in System32 directory 4 IoCs
Processes:
WZHwsS4ADOaf4Rs.exedescription ioc process File opened for modification C:\Windows\System32\GroupPolicy WZHwsS4ADOaf4Rs.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini WZHwsS4ADOaf4Rs.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol WZHwsS4ADOaf4Rs.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI WZHwsS4ADOaf4Rs.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
WZHwsS4ADOaf4Rs.exepid process 4524 WZHwsS4ADOaf4Rs.exe 4524 WZHwsS4ADOaf4Rs.exe 4524 WZHwsS4ADOaf4Rs.exe 4524 WZHwsS4ADOaf4Rs.exe 4524 WZHwsS4ADOaf4Rs.exe 4524 WZHwsS4ADOaf4Rs.exe 4524 WZHwsS4ADOaf4Rs.exe 4524 WZHwsS4ADOaf4Rs.exe 4524 WZHwsS4ADOaf4Rs.exe 4524 WZHwsS4ADOaf4Rs.exe 4524 WZHwsS4ADOaf4Rs.exe 4524 WZHwsS4ADOaf4Rs.exe 4524 WZHwsS4ADOaf4Rs.exe 4524 WZHwsS4ADOaf4Rs.exe 4524 WZHwsS4ADOaf4Rs.exe 4524 WZHwsS4ADOaf4Rs.exe 4524 WZHwsS4ADOaf4Rs.exe 4524 WZHwsS4ADOaf4Rs.exe 4524 WZHwsS4ADOaf4Rs.exe 4524 WZHwsS4ADOaf4Rs.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
WZHwsS4ADOaf4Rs.exedescription pid process Token: SeDebugPrivilege 4524 WZHwsS4ADOaf4Rs.exe Token: SeDebugPrivilege 4524 WZHwsS4ADOaf4Rs.exe Token: SeDebugPrivilege 4524 WZHwsS4ADOaf4Rs.exe Token: SeDebugPrivilege 4524 WZHwsS4ADOaf4Rs.exe Token: SeDebugPrivilege 4524 WZHwsS4ADOaf4Rs.exe Token: SeDebugPrivilege 4524 WZHwsS4ADOaf4Rs.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
fd1163404f8834bdea3ccd98fc5149303ceecfd4284884460ccbddd72eaa4f09.exedescription pid process target process PID 8 wrote to memory of 4524 8 fd1163404f8834bdea3ccd98fc5149303ceecfd4284884460ccbddd72eaa4f09.exe WZHwsS4ADOaf4Rs.exe PID 8 wrote to memory of 4524 8 fd1163404f8834bdea3ccd98fc5149303ceecfd4284884460ccbddd72eaa4f09.exe WZHwsS4ADOaf4Rs.exe PID 8 wrote to memory of 4524 8 fd1163404f8834bdea3ccd98fc5149303ceecfd4284884460ccbddd72eaa4f09.exe WZHwsS4ADOaf4Rs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd1163404f8834bdea3ccd98fc5149303ceecfd4284884460ccbddd72eaa4f09.exe"C:\Users\Admin\AppData\Local\Temp\fd1163404f8834bdea3ccd98fc5149303ceecfd4284884460ccbddd72eaa4f09.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS12EC.tmp\WZHwsS4ADOaf4Rs.exe.\WZHwsS4ADOaf4Rs.exe2⤵
- Executes dropped EXE
- Drops Chrome extension
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\7zS12EC.tmp\WZHwsS4ADOaf4Rs.datFilesize
1KB
MD5ff860d8b7136260bf9a9b79bd829cb7b
SHA1720bf68f91a35779b074f7e00033f1cdeecb0065
SHA2566f1176eeec024145e92f5ce66c725bc836164a880366ca277e2efd30f80ed48e
SHA512ecda2757ecb02b819a542b22b9067179e6ead5f37e12e297b5e7ce2014a17c2030b08fbc83c7abddac623241171c3a5cfa3b645768265be2eff7d96314326d9c
-
C:\Users\Admin\AppData\Local\Temp\7zS12EC.tmp\WZHwsS4ADOaf4Rs.exeFilesize
772KB
MD55ed7019dcd0008dbcd8e54017b8c7dd9
SHA17e4457da2ff06c2170bad636c9eb7c1bb436fd06
SHA2567f069fe03db518eee8162ba5f65f98f2afd28137dfde9450d26cd47f6cea8eb7
SHA51210cef6104aeca8f7a135d4ffffb907b127f055477af4d98228c7385f0da15677357dfed13fc442ee173f85245224fc4b0ae100b832514c80802c5e5a054b70db
-
C:\Users\Admin\AppData\Local\Temp\7zS12EC.tmp\WZHwsS4ADOaf4Rs.exeFilesize
772KB
MD55ed7019dcd0008dbcd8e54017b8c7dd9
SHA17e4457da2ff06c2170bad636c9eb7c1bb436fd06
SHA2567f069fe03db518eee8162ba5f65f98f2afd28137dfde9450d26cd47f6cea8eb7
SHA51210cef6104aeca8f7a135d4ffffb907b127f055477af4d98228c7385f0da15677357dfed13fc442ee173f85245224fc4b0ae100b832514c80802c5e5a054b70db
-
C:\Users\Admin\AppData\Local\Temp\7zS12EC.tmp\[email protected]\bootstrap.jsFilesize
2KB
MD5df13f711e20e9c80171846d4f2f7ae06
SHA156d29cda58427efe0e21d3880d39eb1b0ef60bee
SHA2566c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4
SHA5126c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e
-
C:\Users\Admin\AppData\Local\Temp\7zS12EC.tmp\[email protected]\chrome.manifestFilesize
35B
MD5ef276a163d483dde985e53886a2b5e90
SHA1b9bc9f250fbce631e8e59677a650458f1fd8176c
SHA2569abbc6cefc1ff76950f3a08686df44964ef19daec5140b52dbb6dcbc39676c5b
SHA5128d5e7942179ed248188b30e97456be9d607495c829d37db44d672082f48265e7e421ad43f35c5bdcbe8cdaafdc12ac70332a039f3c3bafe38d93048ac52e2291
-
C:\Users\Admin\AppData\Local\Temp\7zS12EC.tmp\[email protected]\content\bg.jsFilesize
8KB
MD5e152aea1618850ac219a6e6da92eb849
SHA153e032fe14c2dc65e9df52ee5e377d969dba98d3
SHA2568b21ad1c940447d58a6e97960af9e8bb17db979e4aee8c339f496b1c1272a7ea
SHA512f1c01b5a947fbdf02f1d6ddaf8d3128e0ff253699df5ab0d3d74b2f343cd95c8ce1afa269390397786dea9242f3dda5d6a77d1175076af02c7e6a9845b981b09
-
C:\Users\Admin\AppData\Local\Temp\7zS12EC.tmp\[email protected]\install.rdfFilesize
590B
MD5c34578241c1e5325a11c784d185bfa7c
SHA14a4237c1563380a98bc2ddf548771173875887f6
SHA256096109453f528ad00af4b3c041cdc8675cc990f2ac4d6e6a5a4c79f0e5887de3
SHA51270b5893cfdec963b62095cc93a9e92c86c2e43bc4f4b05611e33af707aa2de349e2ef29ae946ff5e7da304c9f83937dfab1b8c5c41cbec5fa7958b8151ef56a8
-
C:\Users\Admin\AppData\Local\Temp\7zS12EC.tmp\olmmhnkdikolkgldmjceakcilnihihej\background.htmlFilesize
139B
MD50c4de18b73f0cdf7c95081d5430337d5
SHA1caa00c3b16cf36825398a62b8cbf0deb08f13251
SHA2568b569ca833ea17d5400572cb45377f9daa6e04c5b2cfb4ca2899bb0fd2b572e7
SHA512e0b1173b7f11a5ae2a9bb8c51fb311a9aeb84794dd7508f328153c4e49582be575654b9dbc5bd26246d83c826b67c3018890fde11784ebe28a38d1db587e775e
-
C:\Users\Admin\AppData\Local\Temp\7zS12EC.tmp\olmmhnkdikolkgldmjceakcilnihihej\content.jsFilesize
144B
MD5fca19198fd8af21016a8b1dec7980002
SHA1fd01a47d14004e17a625efe66cc46a06c786cf40
SHA256332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a
SHA51260f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47
-
C:\Users\Admin\AppData\Local\Temp\7zS12EC.tmp\olmmhnkdikolkgldmjceakcilnihihej\h7.jsFilesize
6KB
MD52faf48cba6f09dc2d921399cb3490cb6
SHA119973cb6027f780eaec544246fa571707a8896ea
SHA2563f72a8e93d7bdba94d0e04268e7d17790352cbf4df0c4ed38ebfe0499bd807ba
SHA51202dcb574e63cfba208c269d2649c090dd95fed746e88b483bfacd6df43c8ba5865af7e2a83283f75bf736a74fd9e45bcb052cfd7ffe3faaab0fa72e33614e02f
-
C:\Users\Admin\AppData\Local\Temp\7zS12EC.tmp\olmmhnkdikolkgldmjceakcilnihihej\lsdb.jsFilesize
531B
MD536d98318ab2b3b2585a30984db328afb
SHA1f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5
SHA256ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7
SHA5126f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a
-
C:\Users\Admin\AppData\Local\Temp\7zS12EC.tmp\olmmhnkdikolkgldmjceakcilnihihej\manifest.jsonFilesize
498B
MD5640199ea4621e34510de919f6a54436f
SHA1dc65dbfad02bd2688030bd56ca1cab85917a9937
SHA256e4aa7c089e32d14ddf584e9de6d007ec16581cd30c248ff7284bc0eb7757d4af
SHA512d64bc524d6df7c4c21a5ddfb0e6636317482ef4dc28006bd0a38d5e26c2db75626f216143026bf8acf3baa11d86c278e902c78afad4f806ca36f9e54bc75ff0a
-
memory/4524-132-0x0000000000000000-mapping.dmp