Analysis
-
max time kernel
128s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 19:26
Static task
static1
Behavioral task
behavioral1
Sample
c78606647861db5c168361d3b403be0f688a055b7a9f3b2f25b1d6dc72a26bac.exe
Resource
win7-20221111-en
General
-
Target
c78606647861db5c168361d3b403be0f688a055b7a9f3b2f25b1d6dc72a26bac.exe
-
Size
932KB
-
MD5
42414b6927db22c83cab1f1ee1092c88
-
SHA1
43f7fbaa91c9a787b18613d259c3d80a114d53cd
-
SHA256
c78606647861db5c168361d3b403be0f688a055b7a9f3b2f25b1d6dc72a26bac
-
SHA512
2599d23ace9275d8d016475a777b2c462abb73255d62eed60780ab6e1980c434d88aaa3213f0b899a75df8e58b7f8c56764e6369c2fe37ad598bd9d37d3e5e29
-
SSDEEP
24576:h1OYdaOyCZ/iWCvu/2sWsJA/jlt+DHhsV:h1OsACpYO/dJJDHhsV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
CFuPDssEFKMO30n.exepid process 2248 CFuPDssEFKMO30n.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 5 IoCs
Processes:
CFuPDssEFKMO30n.exedescription ioc process File created C:\Users\WDAGUtilityAccount\AppData\Local\Google\Chrome\User Data\Default\Extensions\pbjjidibhjckgmhmbgjgacoogohemdbf\1.3\manifest.json CFuPDssEFKMO30n.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\pbjjidibhjckgmhmbgjgacoogohemdbf\1.3\manifest.json CFuPDssEFKMO30n.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\pbjjidibhjckgmhmbgjgacoogohemdbf\1.3\manifest.json CFuPDssEFKMO30n.exe File created C:\Users\DefaultAccount\AppData\Local\Google\Chrome\User Data\Default\Extensions\pbjjidibhjckgmhmbgjgacoogohemdbf\1.3\manifest.json CFuPDssEFKMO30n.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\pbjjidibhjckgmhmbgjgacoogohemdbf\1.3\manifest.json CFuPDssEFKMO30n.exe -
Drops file in System32 directory 4 IoCs
Processes:
CFuPDssEFKMO30n.exedescription ioc process File opened for modification C:\Windows\System32\GroupPolicy CFuPDssEFKMO30n.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini CFuPDssEFKMO30n.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol CFuPDssEFKMO30n.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI CFuPDssEFKMO30n.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
CFuPDssEFKMO30n.exepid process 2248 CFuPDssEFKMO30n.exe 2248 CFuPDssEFKMO30n.exe 2248 CFuPDssEFKMO30n.exe 2248 CFuPDssEFKMO30n.exe 2248 CFuPDssEFKMO30n.exe 2248 CFuPDssEFKMO30n.exe 2248 CFuPDssEFKMO30n.exe 2248 CFuPDssEFKMO30n.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
c78606647861db5c168361d3b403be0f688a055b7a9f3b2f25b1d6dc72a26bac.exedescription pid process target process PID 1692 wrote to memory of 2248 1692 c78606647861db5c168361d3b403be0f688a055b7a9f3b2f25b1d6dc72a26bac.exe CFuPDssEFKMO30n.exe PID 1692 wrote to memory of 2248 1692 c78606647861db5c168361d3b403be0f688a055b7a9f3b2f25b1d6dc72a26bac.exe CFuPDssEFKMO30n.exe PID 1692 wrote to memory of 2248 1692 c78606647861db5c168361d3b403be0f688a055b7a9f3b2f25b1d6dc72a26bac.exe CFuPDssEFKMO30n.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c78606647861db5c168361d3b403be0f688a055b7a9f3b2f25b1d6dc72a26bac.exe"C:\Users\Admin\AppData\Local\Temp\c78606647861db5c168361d3b403be0f688a055b7a9f3b2f25b1d6dc72a26bac.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\7zSC22C.tmp\CFuPDssEFKMO30n.exe.\CFuPDssEFKMO30n.exe2⤵
- Executes dropped EXE
- Drops Chrome extension
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2248
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:1380
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:2460
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b4f2236f55332c40dc57c1f9cc00d7c3
SHA17025201153dacb7891099f3981b3bcd679bfcfe4
SHA2563de4ce9bebab1eff7acb1398733acccc95cd9168597630184c69d5bc91967fb1
SHA512d843c924b74280636102014bb0967a1eaf9547c679f1bb9ec5c52c2b3f97266c8dfbb436c66b8825159a2304878ccc8c54e36ce2ebccf74e658d823484fce7c4
-
Filesize
772KB
MD55ed7019dcd0008dbcd8e54017b8c7dd9
SHA17e4457da2ff06c2170bad636c9eb7c1bb436fd06
SHA2567f069fe03db518eee8162ba5f65f98f2afd28137dfde9450d26cd47f6cea8eb7
SHA51210cef6104aeca8f7a135d4ffffb907b127f055477af4d98228c7385f0da15677357dfed13fc442ee173f85245224fc4b0ae100b832514c80802c5e5a054b70db
-
Filesize
772KB
MD55ed7019dcd0008dbcd8e54017b8c7dd9
SHA17e4457da2ff06c2170bad636c9eb7c1bb436fd06
SHA2567f069fe03db518eee8162ba5f65f98f2afd28137dfde9450d26cd47f6cea8eb7
SHA51210cef6104aeca8f7a135d4ffffb907b127f055477af4d98228c7385f0da15677357dfed13fc442ee173f85245224fc4b0ae100b832514c80802c5e5a054b70db
-
C:\Users\Admin\AppData\Local\Temp\7zSC22C.tmp\[email protected]\bootstrap.js
Filesize2KB
MD5df13f711e20e9c80171846d4f2f7ae06
SHA156d29cda58427efe0e21d3880d39eb1b0ef60bee
SHA2566c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4
SHA5126c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e
-
C:\Users\Admin\AppData\Local\Temp\7zSC22C.tmp\[email protected]\chrome.manifest
Filesize35B
MD5d932e04c219a5e372bd17cd4d23e552a
SHA17b0dcf10930e85e4d547df5c8273bf913291987f
SHA256ae0c72442bbe6e45e94eaee05cc7044fcabc5a57c9256f09d7cf9c2cceff521d
SHA512aa1f693b5ee455de9a9767412803fe70de9b5bcd1d2fa5ebb09d7a97170e71e894149d4269eedc14b4ae32cf35a40f72a512124f6f10cea425177cd333dca102
-
C:\Users\Admin\AppData\Local\Temp\7zSC22C.tmp\[email protected]\content\bg.js
Filesize9KB
MD523d812fcffeec23373c8926159f70c5e
SHA194430e8e6da159a033c0f68b8ddc56b0df043873
SHA25667c0b9ebebc11874d71f64ebcf54dcbe799f71835aa4e1a207f42c0a32d9ae58
SHA51286c2008ff568a2b80d40a3bfa71f341aeb31658658b7f534d3c655576c63b404986cc8caf79c53a42e15349ca316fbc84e4fd81484ae90e151c2617a3bdba9f8
-
C:\Users\Admin\AppData\Local\Temp\7zSC22C.tmp\[email protected]\install.rdf
Filesize598B
MD5f66b2c5a1d794020c185649100d446e7
SHA18410ccaf623243a9b01c719e106078b6c840e0a6
SHA256542a09c4759c33e15e4912bf1b4cf2fb56266679bb66995a22bdf974036e6617
SHA5125fac77c468d148991e9a87b2314ee9bcdf7c308339870915125585fa331c56df411fbfa214523f4e17fd85a480cf2d663897e0a24381d3e897663c2d2c707382
-
Filesize
6KB
MD5591da37b1e0a2c587da4f35148360ae0
SHA14c4ebfb208899477e1cef376efac4a432c75691e
SHA256e747825ab8545306acdc9737bb0b8e57c1a324eda8c3b8feda15071690706fe5
SHA5127fa76324aba8803371d583fbf4a719e850be68a39e9e0ba9ce0429ba628a8620a58c949deb6da6bf613bcb139bd24d7c46f60d256bb2a6c28817f3325f27fb90
-
Filesize
145B
MD51645cbdf7d677f702b2e9cb5001d572b
SHA119c03a0644da7adf0dc5a3da0c16e262f0d7206c
SHA256a7518098f8409cd5623b0edaf3cbaa02c5495f43179f2f6061ef29010105b62b
SHA5129cf144b86a90c6024c543fbbb3fb5a8d96defc0600e8dd105b8c4f4e418cec82bbeb8b670901fa0bc0d6ce97fcc11b1cb4adfc5708ae863c36a95c70d9076561
-
Filesize
144B
MD5fca19198fd8af21016a8b1dec7980002
SHA1fd01a47d14004e17a625efe66cc46a06c786cf40
SHA256332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a
SHA51260f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47
-
Filesize
531B
MD536d98318ab2b3b2585a30984db328afb
SHA1f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5
SHA256ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7
SHA5126f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a
-
Filesize
498B
MD5664e2884e17f23553a19eee317642194
SHA1a28ccc088d6b6692646150f3e8f111e568723fb4
SHA256ee4ef853224cde2aa7e54351c02bc811af939202b82e19cbd1cc011fc3565191
SHA512b2cef8c4dfb6a0648f21c53393b982c9171d8a0344a94970c13866ebd2870de2cd99dab5984000b10802c54a748230104c7997c3d2cd3ac5e97c9355a4cb7ecb