Analysis

  • max time kernel
    46s
  • max time network
    64s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 19:22

General

  • Target

    c8bd35d11736cbd72d645470c53484f62261b2d1d2ae99bdb802e93b4b5eab83.exe

  • Size

    920KB

  • MD5

    502f5ce9c97e6402d289da5f1873e501

  • SHA1

    e6d8a5c56bf59ced17854a74179cb09df1f8a86e

  • SHA256

    c8bd35d11736cbd72d645470c53484f62261b2d1d2ae99bdb802e93b4b5eab83

  • SHA512

    91e868b6e2492145c8b58002556c0666f0bd2add2ea668a739547b6abfc149bfbd39d605f64c093b47bd5a6c3e2b3ac07fc1a4eb2286c943451b3036390e49a1

  • SSDEEP

    24576:h1OYdaOgMtdHAqcdDVhYwiei7+EpFAh/kK+:h1OsJPHVmVhYwiLtKkK+

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 3 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c8bd35d11736cbd72d645470c53484f62261b2d1d2ae99bdb802e93b4b5eab83.exe
    "C:\Users\Admin\AppData\Local\Temp\c8bd35d11736cbd72d645470c53484f62261b2d1d2ae99bdb802e93b4b5eab83.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1052
    • C:\Users\Admin\AppData\Local\Temp\7zS1A7.tmp\CqdRVwEqqfzIvug.exe
      .\CqdRVwEqqfzIvug.exe
      2⤵
      • Executes dropped EXE
      • Drops Chrome extension
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:484

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7zS1A7.tmp\CqdRVwEqqfzIvug.dat
    Filesize

    1KB

    MD5

    1b17ae64fa4fe92f2d76abcf23ee58ff

    SHA1

    1a9678ba3edf831422fa746d9d1619e49423253c

    SHA256

    b6a3604874b688d3e94588c069b66de1ea3f740be2e5f967a986751fc33c159e

    SHA512

    8e0c00046e02aaa05a46539c5745843e9b44c3ef7437188f7ad6bc56d0b54f9c6769a92f415bfeccbf1475ab878fcb910718e3647e9aef41d795b3a25cea44bb

  • C:\Users\Admin\AppData\Local\Temp\7zS1A7.tmp\CqdRVwEqqfzIvug.exe
    Filesize

    760KB

    MD5

    dcd148f6f3af3e3b0935c4fcc9f41811

    SHA1

    ee9bdbc7c568c7832d90b85921ab20030b6734cd

    SHA256

    f8689641199c6fc430121797965485d95abfbc430753e0e668817ab3b511a1e4

    SHA512

    34be8e60dc2decf8287a71516f359e80bb858ce52218dde1b01c821c9b95be38821f068b79b0da8dbe90865560e7ddab77b25e3971dda9be667fb3ae8f174886

  • C:\Users\Admin\AppData\Local\Temp\7zS1A7.tmp\[email protected]\bootstrap.js
    Filesize

    2KB

    MD5

    df13f711e20e9c80171846d4f2f7ae06

    SHA1

    56d29cda58427efe0e21d3880d39eb1b0ef60bee

    SHA256

    6c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4

    SHA512

    6c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e

  • C:\Users\Admin\AppData\Local\Temp\7zS1A7.tmp\[email protected]\chrome.manifest
    Filesize

    35B

    MD5

    27beb651260d0340adab036c49092356

    SHA1

    0c47502253ea7bd0c7965385834db4d4281d50d0

    SHA256

    f1d71eaf0ece199bcf2af84657d5eb3898c0dd332b124aecef47ff1f91c68c89

    SHA512

    b6c8b005a9e1166b44d0fcb88676de3515dedacf5a3c5fa665a22da90dd1025b746da30ad3f8a7a020104e4f0176a893e320ae36974cff448462ddef790bf997

  • C:\Users\Admin\AppData\Local\Temp\7zS1A7.tmp\[email protected]\content\bg.js
    Filesize

    8KB

    MD5

    4b165710a52dd7cc3b71ba06b2be11ca

    SHA1

    4b19f80e5a9cccf931f4ea8b1d369c3824ea8d42

    SHA256

    2d740a494b922d017f16d4d41dcfcbd2819bba8f98dbd5a9e7a04c7d8ad2d179

    SHA512

    bf2570b4ef4ac98bb17a9f8b1b2cf246bbbb4b47f9806b7fdcad01733d5a88f7b56eff80174dd47eac4be73bd222c6a01a672e6818c739daf1138e0fbd92610b

  • C:\Users\Admin\AppData\Local\Temp\7zS1A7.tmp\[email protected]\install.rdf
    Filesize

    595B

    MD5

    2f82704bccbc29343bc756ba256503dd

    SHA1

    06319972d66df953ad4ad9e96cee76ccada2481f

    SHA256

    6de7c5d3f94b27f5a2d3841a601c2a4d6ad5cec2416a13608b21f02fd626f22c

    SHA512

    074145e97025a0de20e33e4168a3bd73d5b91de6ab0fb10f69aff8809ee38d0b78eadefc4bca7e4bad9ac53b0be1cd41c1c78cc4e578ee089d3ce2ed727df910

  • C:\Users\Admin\AppData\Local\Temp\7zS1A7.tmp\dopjbkgmnkilknodhcfcimehfbngdpjl\background.html
    Filesize

    144B

    MD5

    23538c8da37e542a22ae54e213b9fa27

    SHA1

    c279b5a686a68fced3daa95cacdcde26368378d1

    SHA256

    8e2ac9b829aad395411f64c112cf09266573d6ff5b468671eb60f35fe3191801

    SHA512

    9da8c28f8438ca039a960f3cfbf7f250e6ac2f6cb3e5ebef448463debb43aae879eab3e894971a9410f428354fe8fc870988aaa0ef2c5d6166de796ec1f1f451

  • C:\Users\Admin\AppData\Local\Temp\7zS1A7.tmp\dopjbkgmnkilknodhcfcimehfbngdpjl\content.js
    Filesize

    144B

    MD5

    fca19198fd8af21016a8b1dec7980002

    SHA1

    fd01a47d14004e17a625efe66cc46a06c786cf40

    SHA256

    332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a

    SHA512

    60f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47

  • C:\Users\Admin\AppData\Local\Temp\7zS1A7.tmp\dopjbkgmnkilknodhcfcimehfbngdpjl\cvT0Urq.js
    Filesize

    6KB

    MD5

    87b21eaa540e5a368b08af11eedba2cc

    SHA1

    cfe33cc954344a1b5348ae4389024a5eaf753f39

    SHA256

    eb06be1f24de612bcfbf17e1e8c4a312c75c8af11f33d24f538e7f01eab07d42

    SHA512

    1b518674e273e7c29f93e0ae1a6877a226fd65bf896d389b39e3db41f6e3a794ca77789f11d8b7d41d838545ece98719e07ae15cd2cd6ee525a94d917bccc496

  • C:\Users\Admin\AppData\Local\Temp\7zS1A7.tmp\dopjbkgmnkilknodhcfcimehfbngdpjl\lsdb.js
    Filesize

    531B

    MD5

    36d98318ab2b3b2585a30984db328afb

    SHA1

    f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5

    SHA256

    ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7

    SHA512

    6f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a

  • C:\Users\Admin\AppData\Local\Temp\7zS1A7.tmp\dopjbkgmnkilknodhcfcimehfbngdpjl\manifest.json
    Filesize

    498B

    MD5

    640199ea4621e34510de919f6a54436f

    SHA1

    dc65dbfad02bd2688030bd56ca1cab85917a9937

    SHA256

    e4aa7c089e32d14ddf584e9de6d007ec16581cd30c248ff7284bc0eb7757d4af

    SHA512

    d64bc524d6df7c4c21a5ddfb0e6636317482ef4dc28006bd0a38d5e26c2db75626f216143026bf8acf3baa11d86c278e902c78afad4f806ca36f9e54bc75ff0a

  • \Users\Admin\AppData\Local\Temp\7zS1A7.tmp\CqdRVwEqqfzIvug.exe
    Filesize

    760KB

    MD5

    dcd148f6f3af3e3b0935c4fcc9f41811

    SHA1

    ee9bdbc7c568c7832d90b85921ab20030b6734cd

    SHA256

    f8689641199c6fc430121797965485d95abfbc430753e0e668817ab3b511a1e4

    SHA512

    34be8e60dc2decf8287a71516f359e80bb858ce52218dde1b01c821c9b95be38821f068b79b0da8dbe90865560e7ddab77b25e3971dda9be667fb3ae8f174886

  • memory/484-56-0x0000000000000000-mapping.dmp
  • memory/1052-54-0x0000000075291000-0x0000000075293000-memory.dmp
    Filesize

    8KB