Analysis

  • max time kernel
    128s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 19:26

General

  • Target

    c78606647861db5c168361d3b403be0f688a055b7a9f3b2f25b1d6dc72a26bac.exe

  • Size

    932KB

  • MD5

    42414b6927db22c83cab1f1ee1092c88

  • SHA1

    43f7fbaa91c9a787b18613d259c3d80a114d53cd

  • SHA256

    c78606647861db5c168361d3b403be0f688a055b7a9f3b2f25b1d6dc72a26bac

  • SHA512

    2599d23ace9275d8d016475a777b2c462abb73255d62eed60780ab6e1980c434d88aaa3213f0b899a75df8e58b7f8c56764e6369c2fe37ad598bd9d37d3e5e29

  • SSDEEP

    24576:h1OYdaOyCZ/iWCvu/2sWsJA/jlt+DHhsV:h1OsACpYO/dJJDHhsV

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c78606647861db5c168361d3b403be0f688a055b7a9f3b2f25b1d6dc72a26bac.exe
    "C:\Users\Admin\AppData\Local\Temp\c78606647861db5c168361d3b403be0f688a055b7a9f3b2f25b1d6dc72a26bac.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1692
    • C:\Users\Admin\AppData\Local\Temp\7zSC22C.tmp\CFuPDssEFKMO30n.exe
      .\CFuPDssEFKMO30n.exe
      2⤵
      • Executes dropped EXE
      • Drops Chrome extension
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      PID:2248
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
    1⤵
      PID:1380
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
      1⤵
        PID:2460

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\7zSC22C.tmp\CFuPDssEFKMO30n.dat
        Filesize

        1KB

        MD5

        b4f2236f55332c40dc57c1f9cc00d7c3

        SHA1

        7025201153dacb7891099f3981b3bcd679bfcfe4

        SHA256

        3de4ce9bebab1eff7acb1398733acccc95cd9168597630184c69d5bc91967fb1

        SHA512

        d843c924b74280636102014bb0967a1eaf9547c679f1bb9ec5c52c2b3f97266c8dfbb436c66b8825159a2304878ccc8c54e36ce2ebccf74e658d823484fce7c4

      • C:\Users\Admin\AppData\Local\Temp\7zSC22C.tmp\CFuPDssEFKMO30n.exe
        Filesize

        772KB

        MD5

        5ed7019dcd0008dbcd8e54017b8c7dd9

        SHA1

        7e4457da2ff06c2170bad636c9eb7c1bb436fd06

        SHA256

        7f069fe03db518eee8162ba5f65f98f2afd28137dfde9450d26cd47f6cea8eb7

        SHA512

        10cef6104aeca8f7a135d4ffffb907b127f055477af4d98228c7385f0da15677357dfed13fc442ee173f85245224fc4b0ae100b832514c80802c5e5a054b70db

      • C:\Users\Admin\AppData\Local\Temp\7zSC22C.tmp\CFuPDssEFKMO30n.exe
        Filesize

        772KB

        MD5

        5ed7019dcd0008dbcd8e54017b8c7dd9

        SHA1

        7e4457da2ff06c2170bad636c9eb7c1bb436fd06

        SHA256

        7f069fe03db518eee8162ba5f65f98f2afd28137dfde9450d26cd47f6cea8eb7

        SHA512

        10cef6104aeca8f7a135d4ffffb907b127f055477af4d98228c7385f0da15677357dfed13fc442ee173f85245224fc4b0ae100b832514c80802c5e5a054b70db

      • C:\Users\Admin\AppData\Local\Temp\7zSC22C.tmp\[email protected]\bootstrap.js
        Filesize

        2KB

        MD5

        df13f711e20e9c80171846d4f2f7ae06

        SHA1

        56d29cda58427efe0e21d3880d39eb1b0ef60bee

        SHA256

        6c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4

        SHA512

        6c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e

      • C:\Users\Admin\AppData\Local\Temp\7zSC22C.tmp\[email protected]\chrome.manifest
        Filesize

        35B

        MD5

        d932e04c219a5e372bd17cd4d23e552a

        SHA1

        7b0dcf10930e85e4d547df5c8273bf913291987f

        SHA256

        ae0c72442bbe6e45e94eaee05cc7044fcabc5a57c9256f09d7cf9c2cceff521d

        SHA512

        aa1f693b5ee455de9a9767412803fe70de9b5bcd1d2fa5ebb09d7a97170e71e894149d4269eedc14b4ae32cf35a40f72a512124f6f10cea425177cd333dca102

      • C:\Users\Admin\AppData\Local\Temp\7zSC22C.tmp\[email protected]\content\bg.js
        Filesize

        9KB

        MD5

        23d812fcffeec23373c8926159f70c5e

        SHA1

        94430e8e6da159a033c0f68b8ddc56b0df043873

        SHA256

        67c0b9ebebc11874d71f64ebcf54dcbe799f71835aa4e1a207f42c0a32d9ae58

        SHA512

        86c2008ff568a2b80d40a3bfa71f341aeb31658658b7f534d3c655576c63b404986cc8caf79c53a42e15349ca316fbc84e4fd81484ae90e151c2617a3bdba9f8

      • C:\Users\Admin\AppData\Local\Temp\7zSC22C.tmp\[email protected]\install.rdf
        Filesize

        598B

        MD5

        f66b2c5a1d794020c185649100d446e7

        SHA1

        8410ccaf623243a9b01c719e106078b6c840e0a6

        SHA256

        542a09c4759c33e15e4912bf1b4cf2fb56266679bb66995a22bdf974036e6617

        SHA512

        5fac77c468d148991e9a87b2314ee9bcdf7c308339870915125585fa331c56df411fbfa214523f4e17fd85a480cf2d663897e0a24381d3e897663c2d2c707382

      • C:\Users\Admin\AppData\Local\Temp\7zSC22C.tmp\pbjjidibhjckgmhmbgjgacoogohemdbf\PlbIRhW8.js
        Filesize

        6KB

        MD5

        591da37b1e0a2c587da4f35148360ae0

        SHA1

        4c4ebfb208899477e1cef376efac4a432c75691e

        SHA256

        e747825ab8545306acdc9737bb0b8e57c1a324eda8c3b8feda15071690706fe5

        SHA512

        7fa76324aba8803371d583fbf4a719e850be68a39e9e0ba9ce0429ba628a8620a58c949deb6da6bf613bcb139bd24d7c46f60d256bb2a6c28817f3325f27fb90

      • C:\Users\Admin\AppData\Local\Temp\7zSC22C.tmp\pbjjidibhjckgmhmbgjgacoogohemdbf\background.html
        Filesize

        145B

        MD5

        1645cbdf7d677f702b2e9cb5001d572b

        SHA1

        19c03a0644da7adf0dc5a3da0c16e262f0d7206c

        SHA256

        a7518098f8409cd5623b0edaf3cbaa02c5495f43179f2f6061ef29010105b62b

        SHA512

        9cf144b86a90c6024c543fbbb3fb5a8d96defc0600e8dd105b8c4f4e418cec82bbeb8b670901fa0bc0d6ce97fcc11b1cb4adfc5708ae863c36a95c70d9076561

      • C:\Users\Admin\AppData\Local\Temp\7zSC22C.tmp\pbjjidibhjckgmhmbgjgacoogohemdbf\content.js
        Filesize

        144B

        MD5

        fca19198fd8af21016a8b1dec7980002

        SHA1

        fd01a47d14004e17a625efe66cc46a06c786cf40

        SHA256

        332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a

        SHA512

        60f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47

      • C:\Users\Admin\AppData\Local\Temp\7zSC22C.tmp\pbjjidibhjckgmhmbgjgacoogohemdbf\lsdb.js
        Filesize

        531B

        MD5

        36d98318ab2b3b2585a30984db328afb

        SHA1

        f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5

        SHA256

        ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7

        SHA512

        6f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a

      • C:\Users\Admin\AppData\Local\Temp\7zSC22C.tmp\pbjjidibhjckgmhmbgjgacoogohemdbf\manifest.json
        Filesize

        498B

        MD5

        664e2884e17f23553a19eee317642194

        SHA1

        a28ccc088d6b6692646150f3e8f111e568723fb4

        SHA256

        ee4ef853224cde2aa7e54351c02bc811af939202b82e19cbd1cc011fc3565191

        SHA512

        b2cef8c4dfb6a0648f21c53393b982c9171d8a0344a94970c13866ebd2870de2cd99dab5984000b10802c54a748230104c7997c3d2cd3ac5e97c9355a4cb7ecb

      • memory/2248-132-0x0000000000000000-mapping.dmp