Analysis

  • max time kernel
    202s
  • max time network
    208s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 19:22

General

  • Target

    c8bd35d11736cbd72d645470c53484f62261b2d1d2ae99bdb802e93b4b5eab83.exe

  • Size

    920KB

  • MD5

    502f5ce9c97e6402d289da5f1873e501

  • SHA1

    e6d8a5c56bf59ced17854a74179cb09df1f8a86e

  • SHA256

    c8bd35d11736cbd72d645470c53484f62261b2d1d2ae99bdb802e93b4b5eab83

  • SHA512

    91e868b6e2492145c8b58002556c0666f0bd2add2ea668a739547b6abfc149bfbd39d605f64c093b47bd5a6c3e2b3ac07fc1a4eb2286c943451b3036390e49a1

  • SSDEEP

    24576:h1OYdaOgMtdHAqcdDVhYwiei7+EpFAh/kK+:h1OsJPHVmVhYwiLtKkK+

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c8bd35d11736cbd72d645470c53484f62261b2d1d2ae99bdb802e93b4b5eab83.exe
    "C:\Users\Admin\AppData\Local\Temp\c8bd35d11736cbd72d645470c53484f62261b2d1d2ae99bdb802e93b4b5eab83.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3444
    • C:\Users\Admin\AppData\Local\Temp\7zS5C39.tmp\CqdRVwEqqfzIvug.exe
      .\CqdRVwEqqfzIvug.exe
      2⤵
      • Executes dropped EXE
      • Drops Chrome extension
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1488
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
    1⤵
      PID:3624
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
      1⤵
        PID:3588

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Credential Access

      Credentials in Files

      1
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      1
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\7zS5C39.tmp\CqdRVwEqqfzIvug.dat
        Filesize

        1KB

        MD5

        1b17ae64fa4fe92f2d76abcf23ee58ff

        SHA1

        1a9678ba3edf831422fa746d9d1619e49423253c

        SHA256

        b6a3604874b688d3e94588c069b66de1ea3f740be2e5f967a986751fc33c159e

        SHA512

        8e0c00046e02aaa05a46539c5745843e9b44c3ef7437188f7ad6bc56d0b54f9c6769a92f415bfeccbf1475ab878fcb910718e3647e9aef41d795b3a25cea44bb

      • C:\Users\Admin\AppData\Local\Temp\7zS5C39.tmp\CqdRVwEqqfzIvug.exe
        Filesize

        760KB

        MD5

        dcd148f6f3af3e3b0935c4fcc9f41811

        SHA1

        ee9bdbc7c568c7832d90b85921ab20030b6734cd

        SHA256

        f8689641199c6fc430121797965485d95abfbc430753e0e668817ab3b511a1e4

        SHA512

        34be8e60dc2decf8287a71516f359e80bb858ce52218dde1b01c821c9b95be38821f068b79b0da8dbe90865560e7ddab77b25e3971dda9be667fb3ae8f174886

      • C:\Users\Admin\AppData\Local\Temp\7zS5C39.tmp\CqdRVwEqqfzIvug.exe
        Filesize

        760KB

        MD5

        dcd148f6f3af3e3b0935c4fcc9f41811

        SHA1

        ee9bdbc7c568c7832d90b85921ab20030b6734cd

        SHA256

        f8689641199c6fc430121797965485d95abfbc430753e0e668817ab3b511a1e4

        SHA512

        34be8e60dc2decf8287a71516f359e80bb858ce52218dde1b01c821c9b95be38821f068b79b0da8dbe90865560e7ddab77b25e3971dda9be667fb3ae8f174886

      • C:\Users\Admin\AppData\Local\Temp\7zS5C39.tmp\[email protected]\bootstrap.js
        Filesize

        2KB

        MD5

        df13f711e20e9c80171846d4f2f7ae06

        SHA1

        56d29cda58427efe0e21d3880d39eb1b0ef60bee

        SHA256

        6c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4

        SHA512

        6c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e

      • C:\Users\Admin\AppData\Local\Temp\7zS5C39.tmp\[email protected]\chrome.manifest
        Filesize

        35B

        MD5

        27beb651260d0340adab036c49092356

        SHA1

        0c47502253ea7bd0c7965385834db4d4281d50d0

        SHA256

        f1d71eaf0ece199bcf2af84657d5eb3898c0dd332b124aecef47ff1f91c68c89

        SHA512

        b6c8b005a9e1166b44d0fcb88676de3515dedacf5a3c5fa665a22da90dd1025b746da30ad3f8a7a020104e4f0176a893e320ae36974cff448462ddef790bf997

      • C:\Users\Admin\AppData\Local\Temp\7zS5C39.tmp\[email protected]\content\bg.js
        Filesize

        8KB

        MD5

        4b165710a52dd7cc3b71ba06b2be11ca

        SHA1

        4b19f80e5a9cccf931f4ea8b1d369c3824ea8d42

        SHA256

        2d740a494b922d017f16d4d41dcfcbd2819bba8f98dbd5a9e7a04c7d8ad2d179

        SHA512

        bf2570b4ef4ac98bb17a9f8b1b2cf246bbbb4b47f9806b7fdcad01733d5a88f7b56eff80174dd47eac4be73bd222c6a01a672e6818c739daf1138e0fbd92610b

      • C:\Users\Admin\AppData\Local\Temp\7zS5C39.tmp\[email protected]\install.rdf
        Filesize

        595B

        MD5

        2f82704bccbc29343bc756ba256503dd

        SHA1

        06319972d66df953ad4ad9e96cee76ccada2481f

        SHA256

        6de7c5d3f94b27f5a2d3841a601c2a4d6ad5cec2416a13608b21f02fd626f22c

        SHA512

        074145e97025a0de20e33e4168a3bd73d5b91de6ab0fb10f69aff8809ee38d0b78eadefc4bca7e4bad9ac53b0be1cd41c1c78cc4e578ee089d3ce2ed727df910

      • C:\Users\Admin\AppData\Local\Temp\7zS5C39.tmp\dopjbkgmnkilknodhcfcimehfbngdpjl\background.html
        Filesize

        144B

        MD5

        23538c8da37e542a22ae54e213b9fa27

        SHA1

        c279b5a686a68fced3daa95cacdcde26368378d1

        SHA256

        8e2ac9b829aad395411f64c112cf09266573d6ff5b468671eb60f35fe3191801

        SHA512

        9da8c28f8438ca039a960f3cfbf7f250e6ac2f6cb3e5ebef448463debb43aae879eab3e894971a9410f428354fe8fc870988aaa0ef2c5d6166de796ec1f1f451

      • C:\Users\Admin\AppData\Local\Temp\7zS5C39.tmp\dopjbkgmnkilknodhcfcimehfbngdpjl\content.js
        Filesize

        144B

        MD5

        fca19198fd8af21016a8b1dec7980002

        SHA1

        fd01a47d14004e17a625efe66cc46a06c786cf40

        SHA256

        332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a

        SHA512

        60f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47

      • C:\Users\Admin\AppData\Local\Temp\7zS5C39.tmp\dopjbkgmnkilknodhcfcimehfbngdpjl\cvT0Urq.js
        Filesize

        6KB

        MD5

        87b21eaa540e5a368b08af11eedba2cc

        SHA1

        cfe33cc954344a1b5348ae4389024a5eaf753f39

        SHA256

        eb06be1f24de612bcfbf17e1e8c4a312c75c8af11f33d24f538e7f01eab07d42

        SHA512

        1b518674e273e7c29f93e0ae1a6877a226fd65bf896d389b39e3db41f6e3a794ca77789f11d8b7d41d838545ece98719e07ae15cd2cd6ee525a94d917bccc496

      • C:\Users\Admin\AppData\Local\Temp\7zS5C39.tmp\dopjbkgmnkilknodhcfcimehfbngdpjl\lsdb.js
        Filesize

        531B

        MD5

        36d98318ab2b3b2585a30984db328afb

        SHA1

        f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5

        SHA256

        ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7

        SHA512

        6f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a

      • C:\Users\Admin\AppData\Local\Temp\7zS5C39.tmp\dopjbkgmnkilknodhcfcimehfbngdpjl\manifest.json
        Filesize

        498B

        MD5

        640199ea4621e34510de919f6a54436f

        SHA1

        dc65dbfad02bd2688030bd56ca1cab85917a9937

        SHA256

        e4aa7c089e32d14ddf584e9de6d007ec16581cd30c248ff7284bc0eb7757d4af

        SHA512

        d64bc524d6df7c4c21a5ddfb0e6636317482ef4dc28006bd0a38d5e26c2db75626f216143026bf8acf3baa11d86c278e902c78afad4f806ca36f9e54bc75ff0a

      • memory/1488-132-0x0000000000000000-mapping.dmp