Analysis

  • max time kernel
    189s
  • max time network
    237s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 19:30

General

  • Target

    c65b1fc1bb2010e09cb2f58f909b66bbf99513ad7c9cf33ac4a5152903c68036.exe

  • Size

    920KB

  • MD5

    64271621f260a23006355a1dba5c1f15

  • SHA1

    0c85757fb555bd955a2624b2bd5f71b5b396430d

  • SHA256

    c65b1fc1bb2010e09cb2f58f909b66bbf99513ad7c9cf33ac4a5152903c68036

  • SHA512

    2e4ff6efbb8d2fa2b191c56c6577ac5870d463afef79f003a91586f66780272acb9b57ea02d5cad5c0e0d81157b77838d8b78c909867f1a522caa67e9cd7cc6c

  • SSDEEP

    24576:h1OYdaOTMtdHAqcdDVhYwiei7+EpFAh/kKQ:h1OsuPHVmVhYwiLtKkKQ

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c65b1fc1bb2010e09cb2f58f909b66bbf99513ad7c9cf33ac4a5152903c68036.exe
    "C:\Users\Admin\AppData\Local\Temp\c65b1fc1bb2010e09cb2f58f909b66bbf99513ad7c9cf33ac4a5152903c68036.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4568
    • C:\Users\Admin\AppData\Local\Temp\7zSD6E7.tmp\MAVOvCfCV5iDFLp.exe
      .\MAVOvCfCV5iDFLp.exe
      2⤵
      • Executes dropped EXE
      • Drops Chrome extension
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4652
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
    1⤵
      PID:1368
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
      1⤵
        PID:3532

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Credential Access

      Credentials in Files

      1
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      1
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\7zSD6E7.tmp\Gb@kBWg.org\bootstrap.js
        Filesize

        2KB

        MD5

        df13f711e20e9c80171846d4f2f7ae06

        SHA1

        56d29cda58427efe0e21d3880d39eb1b0ef60bee

        SHA256

        6c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4

        SHA512

        6c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e

      • C:\Users\Admin\AppData\Local\Temp\7zSD6E7.tmp\Gb@kBWg.org\chrome.manifest
        Filesize

        35B

        MD5

        aa7be2c7a606653c941f259ca57609b0

        SHA1

        f18f9cd704426d324c0c43f62604b4d48676c583

        SHA256

        1204f2cf5d60d4b38ff2ea3d9e149bbd5fc03b54de96f611ed617787ecac373a

        SHA512

        e2a082266099123736d12d7d5c270914e50debfa0e9bb1ee813cbd935202aff8216a1d6937e124556670fca377e78c6fc62ecde40c4b21de4f01b33d5b6bc18b

      • C:\Users\Admin\AppData\Local\Temp\7zSD6E7.tmp\Gb@kBWg.org\content\bg.js
        Filesize

        8KB

        MD5

        aab7f06eba1bd5983967e677a0654cc7

        SHA1

        19e79e71c8d6379b10524452bc0b3c0f2d608f8a

        SHA256

        edaf11b0c7da9bf508fb7c69483e3bfd5e1a485a671703365baf66aa566c9ea9

        SHA512

        206ffd89afb1c844f7ad0e36606dde9c8fdcb622c7f814bba0d535d4c0064343e82fe01df25096a211fb4c9dcfc209f9d6b6f115c502b4d88ffda01453d86546

      • C:\Users\Admin\AppData\Local\Temp\7zSD6E7.tmp\Gb@kBWg.org\install.rdf
        Filesize

        593B

        MD5

        9e44d8c7f3bf0fe3da5faff4503eed50

        SHA1

        68263c5cd968b04e419fe611372bbc5a2ed61a74

        SHA256

        49cc200f59b24d81028f08920c1d1dcda7f0191a02142b25807f88dc13c1fef5

        SHA512

        727a10da33617a2cf91def72bdc9631a0dbf0b9f7d4c82dffa249954084acb2233862a99f976bf9d548adf38e7d2a9093b443f91cb240bededa4c8b3a786d1ea

      • C:\Users\Admin\AppData\Local\Temp\7zSD6E7.tmp\MAVOvCfCV5iDFLp.dat
        Filesize

        1KB

        MD5

        f12b1986a855d3a91803bcb1cc300016

        SHA1

        a3c3397c626f95a8b4cdfb3e61d58cbd1adb7c08

        SHA256

        56489df7b98a5f3163ec2053877d4cd5ba7b8754a0df186980d58b4d39146b05

        SHA512

        05616c524b4e317622799b7db1d30061be850ddd0227566265320d09efe2da562a1b86cfe33d1e975ae232a0163e81bf5e32cacb649ee8ca5cea5c0b3c83d847

      • C:\Users\Admin\AppData\Local\Temp\7zSD6E7.tmp\MAVOvCfCV5iDFLp.exe
        Filesize

        760KB

        MD5

        dcd148f6f3af3e3b0935c4fcc9f41811

        SHA1

        ee9bdbc7c568c7832d90b85921ab20030b6734cd

        SHA256

        f8689641199c6fc430121797965485d95abfbc430753e0e668817ab3b511a1e4

        SHA512

        34be8e60dc2decf8287a71516f359e80bb858ce52218dde1b01c821c9b95be38821f068b79b0da8dbe90865560e7ddab77b25e3971dda9be667fb3ae8f174886

      • C:\Users\Admin\AppData\Local\Temp\7zSD6E7.tmp\MAVOvCfCV5iDFLp.exe
        Filesize

        760KB

        MD5

        dcd148f6f3af3e3b0935c4fcc9f41811

        SHA1

        ee9bdbc7c568c7832d90b85921ab20030b6734cd

        SHA256

        f8689641199c6fc430121797965485d95abfbc430753e0e668817ab3b511a1e4

        SHA512

        34be8e60dc2decf8287a71516f359e80bb858ce52218dde1b01c821c9b95be38821f068b79b0da8dbe90865560e7ddab77b25e3971dda9be667fb3ae8f174886

      • C:\Users\Admin\AppData\Local\Temp\7zSD6E7.tmp\jhnhhelmpliiknhdloobncikdbpocdpa\background.html
        Filesize

        144B

        MD5

        7a59f21b2100464ba018e321e8c38569

        SHA1

        a2440681abc062f2a86751ea22a91fd8968d7173

        SHA256

        81b24a5f7b3fe038685b593991ae4172ea6ce5c9a511156d7b59f17b77c392ab

        SHA512

        e960c831543fb568146dd92ae04090da1d87d7523f9a1501c56b34e76eacd2502ac895c93f13ba51695a6948cd664297e5beaccfa311437116e4e937cffd9686

      • C:\Users\Admin\AppData\Local\Temp\7zSD6E7.tmp\jhnhhelmpliiknhdloobncikdbpocdpa\content.js
        Filesize

        144B

        MD5

        fca19198fd8af21016a8b1dec7980002

        SHA1

        fd01a47d14004e17a625efe66cc46a06c786cf40

        SHA256

        332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a

        SHA512

        60f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47

      • C:\Users\Admin\AppData\Local\Temp\7zSD6E7.tmp\jhnhhelmpliiknhdloobncikdbpocdpa\lsdb.js
        Filesize

        531B

        MD5

        36d98318ab2b3b2585a30984db328afb

        SHA1

        f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5

        SHA256

        ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7

        SHA512

        6f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a

      • C:\Users\Admin\AppData\Local\Temp\7zSD6E7.tmp\jhnhhelmpliiknhdloobncikdbpocdpa\manifest.json
        Filesize

        498B

        MD5

        640199ea4621e34510de919f6a54436f

        SHA1

        dc65dbfad02bd2688030bd56ca1cab85917a9937

        SHA256

        e4aa7c089e32d14ddf584e9de6d007ec16581cd30c248ff7284bc0eb7757d4af

        SHA512

        d64bc524d6df7c4c21a5ddfb0e6636317482ef4dc28006bd0a38d5e26c2db75626f216143026bf8acf3baa11d86c278e902c78afad4f806ca36f9e54bc75ff0a

      • C:\Users\Admin\AppData\Local\Temp\7zSD6E7.tmp\jhnhhelmpliiknhdloobncikdbpocdpa\yTlE65M.js
        Filesize

        6KB

        MD5

        7a9fbc88f0ccd72da673124243711096

        SHA1

        5913f2b1da3feff9bc8b0430e0ebc8e5bbd77206

        SHA256

        924cf14336f54317ebfae2a8a042568e1101d2c482b1730863e5ebb990dab60e

        SHA512

        6689e15e5bb661671f13e33941cedaa5c6d4552b385bbe547a7d6d869dc3ac347ed7adb0d416c0d21b9f1a9be54026df5a454d5e7c92682f8daa0e0e14c5ee05

      • memory/4652-132-0x0000000000000000-mapping.dmp