Analysis
-
max time kernel
152s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 19:34
Static task
static1
Behavioral task
behavioral1
Sample
c4d45d9a6d0ece342de65354ea741b7920bb64847c73b28874b83a609e339804.exe
Resource
win7-20220812-en
General
-
Target
c4d45d9a6d0ece342de65354ea741b7920bb64847c73b28874b83a609e339804.exe
-
Size
931KB
-
MD5
96a69cc0b1a6de9973cbc5b8c758c0e4
-
SHA1
a0c7a11e6da9eb1bcc1ce8b0d4150e6536a7ed0e
-
SHA256
c4d45d9a6d0ece342de65354ea741b7920bb64847c73b28874b83a609e339804
-
SHA512
51cdb38094a40ca9255c11f56d27410a0a1d04db975042b48c3b25e408f02cc4201937b48be5069af3d3b5e63a46279fbea65e081fdbe16c52b60656df32e2a5
-
SSDEEP
24576:h1OYdaOQCZ/iWCvu/2sWsJA/jlt+DHhsJ:h1OsiCpYO/dJJDHhsJ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
x4LVwCx8arnCDPS.exepid process 4232 x4LVwCx8arnCDPS.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 5 IoCs
Processes:
x4LVwCx8arnCDPS.exedescription ioc process File created C:\Users\WDAGUtilityAccount\AppData\Local\Google\Chrome\User Data\Default\Extensions\lbiccgaknphihnmfcebdddcflljkjkil\2.0\manifest.json x4LVwCx8arnCDPS.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\lbiccgaknphihnmfcebdddcflljkjkil\2.0\manifest.json x4LVwCx8arnCDPS.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\lbiccgaknphihnmfcebdddcflljkjkil\2.0\manifest.json x4LVwCx8arnCDPS.exe File created C:\Users\DefaultAccount\AppData\Local\Google\Chrome\User Data\Default\Extensions\lbiccgaknphihnmfcebdddcflljkjkil\2.0\manifest.json x4LVwCx8arnCDPS.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\lbiccgaknphihnmfcebdddcflljkjkil\2.0\manifest.json x4LVwCx8arnCDPS.exe -
Drops file in System32 directory 4 IoCs
Processes:
x4LVwCx8arnCDPS.exedescription ioc process File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol x4LVwCx8arnCDPS.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI x4LVwCx8arnCDPS.exe File opened for modification C:\Windows\System32\GroupPolicy x4LVwCx8arnCDPS.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini x4LVwCx8arnCDPS.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
x4LVwCx8arnCDPS.exepid process 4232 x4LVwCx8arnCDPS.exe 4232 x4LVwCx8arnCDPS.exe 4232 x4LVwCx8arnCDPS.exe 4232 x4LVwCx8arnCDPS.exe 4232 x4LVwCx8arnCDPS.exe 4232 x4LVwCx8arnCDPS.exe 4232 x4LVwCx8arnCDPS.exe 4232 x4LVwCx8arnCDPS.exe 4232 x4LVwCx8arnCDPS.exe 4232 x4LVwCx8arnCDPS.exe 4232 x4LVwCx8arnCDPS.exe 4232 x4LVwCx8arnCDPS.exe 4232 x4LVwCx8arnCDPS.exe 4232 x4LVwCx8arnCDPS.exe 4232 x4LVwCx8arnCDPS.exe 4232 x4LVwCx8arnCDPS.exe 4232 x4LVwCx8arnCDPS.exe 4232 x4LVwCx8arnCDPS.exe 4232 x4LVwCx8arnCDPS.exe 4232 x4LVwCx8arnCDPS.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
x4LVwCx8arnCDPS.exedescription pid process Token: SeDebugPrivilege 4232 x4LVwCx8arnCDPS.exe Token: SeDebugPrivilege 4232 x4LVwCx8arnCDPS.exe Token: SeDebugPrivilege 4232 x4LVwCx8arnCDPS.exe Token: SeDebugPrivilege 4232 x4LVwCx8arnCDPS.exe Token: SeDebugPrivilege 4232 x4LVwCx8arnCDPS.exe Token: SeDebugPrivilege 4232 x4LVwCx8arnCDPS.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
c4d45d9a6d0ece342de65354ea741b7920bb64847c73b28874b83a609e339804.exedescription pid process target process PID 2576 wrote to memory of 4232 2576 c4d45d9a6d0ece342de65354ea741b7920bb64847c73b28874b83a609e339804.exe x4LVwCx8arnCDPS.exe PID 2576 wrote to memory of 4232 2576 c4d45d9a6d0ece342de65354ea741b7920bb64847c73b28874b83a609e339804.exe x4LVwCx8arnCDPS.exe PID 2576 wrote to memory of 4232 2576 c4d45d9a6d0ece342de65354ea741b7920bb64847c73b28874b83a609e339804.exe x4LVwCx8arnCDPS.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4d45d9a6d0ece342de65354ea741b7920bb64847c73b28874b83a609e339804.exe"C:\Users\Admin\AppData\Local\Temp\c4d45d9a6d0ece342de65354ea741b7920bb64847c73b28874b83a609e339804.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zSC9CD.tmp\x4LVwCx8arnCDPS.exe.\x4LVwCx8arnCDPS.exe2⤵
- Executes dropped EXE
- Drops Chrome extension
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\7zSC9CD.tmp\[email protected]\bootstrap.jsFilesize
2KB
MD5df13f711e20e9c80171846d4f2f7ae06
SHA156d29cda58427efe0e21d3880d39eb1b0ef60bee
SHA2566c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4
SHA5126c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e
-
C:\Users\Admin\AppData\Local\Temp\7zSC9CD.tmp\[email protected]\chrome.manifestFilesize
35B
MD50dc4340e3becc27bda5738e89cf5dfe9
SHA109b8e385a1aaabe333843395b8dce98d35fb0508
SHA2563571100f954f2ac8a892e665de429946a847ca9fb1be64488eab32a91f314394
SHA5121218c558586e5ec0a24178029dbf6adee10feaee3dff89866318885cee7d0a076d559eebe0022ed170370df8f0b5ddfbdec4a53abea3c1603849eb18d4f528bd
-
C:\Users\Admin\AppData\Local\Temp\7zSC9CD.tmp\[email protected]\content\bg.jsFilesize
8KB
MD5e6233637bd20f8ee2a7f19b9a81463bb
SHA1237a040084381e678fd910baec05602e17b943da
SHA25629a8b295661e2c3680ab541ca71c81cb6fb2380f57684427944023722a57377d
SHA51291ee807d3b6db6beeaf08b6fa77a21d98bc85a4d9ecfa02602f618908973a05cac3d0c82eaa9833f56a760bceb38bca876f4610661baf9beea16f15fec44a349
-
C:\Users\Admin\AppData\Local\Temp\7zSC9CD.tmp\[email protected]\install.rdfFilesize
593B
MD523063c2de44428e2c9927ba3284226df
SHA1c8ad24aa94d7354eb4a57c9ab8cac0a3d7bf4330
SHA256e7554e62fe9fefca581ca5128caa8a5f3bd64ee5d1be7cc030d7d070a02c2d5d
SHA5128b95d31b980de7ce3390cb4a98228e8f77979785a631d303703828bddb008ac393ec0804e1b36a4e52a267e85890f78e3b6679548a3f21f054d29babf148e4b9
-
C:\Users\Admin\AppData\Local\Temp\7zSC9CD.tmp\lbiccgaknphihnmfcebdddcflljkjkil\background.htmlFilesize
140B
MD55efc4e4bb71c0fdb86f30ef74091897e
SHA1c434c9f7197da2526407e2e96bf28bc7c3f747fb
SHA25617153064aae1a68316d38bfbdbe93fc9f0f4861a710478fcf7f60898f9a2b798
SHA51288a5e46110d04ab5306481f034e0e12cc68b4fae30cd1a39b02e12270e2937004e96b8c2c27c89564e978fdc7cf61bdd03a2d102d7d47593b27cbce17dcf13ab
-
C:\Users\Admin\AppData\Local\Temp\7zSC9CD.tmp\lbiccgaknphihnmfcebdddcflljkjkil\content.jsFilesize
144B
MD5fca19198fd8af21016a8b1dec7980002
SHA1fd01a47d14004e17a625efe66cc46a06c786cf40
SHA256332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a
SHA51260f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47
-
C:\Users\Admin\AppData\Local\Temp\7zSC9CD.tmp\lbiccgaknphihnmfcebdddcflljkjkil\eF0.jsFilesize
6KB
MD51fcabe2d085fbe4deb57acc2e835e48b
SHA1d8355db9a2b0b03bf2ec1a1a0ff3f1f7e9c4821d
SHA2567faaef7aaab9d2c685d38e511d7c001b436d58b4064e2127ca59e270a8c8d4e1
SHA5122ef10775af2ea194e548da2be31967383f02f4148ea43e3bc24414cdeb5ef608fb3522b4577b1a06b8fa9f4499331c7a76bb819b59d3990ca6af3215bcd2ee68
-
C:\Users\Admin\AppData\Local\Temp\7zSC9CD.tmp\lbiccgaknphihnmfcebdddcflljkjkil\lsdb.jsFilesize
531B
MD536d98318ab2b3b2585a30984db328afb
SHA1f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5
SHA256ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7
SHA5126f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a
-
C:\Users\Admin\AppData\Local\Temp\7zSC9CD.tmp\lbiccgaknphihnmfcebdddcflljkjkil\manifest.jsonFilesize
498B
MD5640199ea4621e34510de919f6a54436f
SHA1dc65dbfad02bd2688030bd56ca1cab85917a9937
SHA256e4aa7c089e32d14ddf584e9de6d007ec16581cd30c248ff7284bc0eb7757d4af
SHA512d64bc524d6df7c4c21a5ddfb0e6636317482ef4dc28006bd0a38d5e26c2db75626f216143026bf8acf3baa11d86c278e902c78afad4f806ca36f9e54bc75ff0a
-
C:\Users\Admin\AppData\Local\Temp\7zSC9CD.tmp\x4LVwCx8arnCDPS.datFilesize
1KB
MD5b2dedf05dbd5d6d2c3b0df4e0b761c7a
SHA161526d7bf44f517af4242c3a84a1ac641c13c005
SHA256772428c47fe70542db2b8937e11b856f4d717697e8b2a2874757051e4077024c
SHA5121d28ed1bcf695f36cc893bb39e206e94b383f07c56f4ed7ec5d512efc7e17cc37b637cf288f7cf28431954fddba04bb2707fa00c1633014b8645508904f21ab1
-
C:\Users\Admin\AppData\Local\Temp\7zSC9CD.tmp\x4LVwCx8arnCDPS.exeFilesize
772KB
MD55ed7019dcd0008dbcd8e54017b8c7dd9
SHA17e4457da2ff06c2170bad636c9eb7c1bb436fd06
SHA2567f069fe03db518eee8162ba5f65f98f2afd28137dfde9450d26cd47f6cea8eb7
SHA51210cef6104aeca8f7a135d4ffffb907b127f055477af4d98228c7385f0da15677357dfed13fc442ee173f85245224fc4b0ae100b832514c80802c5e5a054b70db
-
C:\Users\Admin\AppData\Local\Temp\7zSC9CD.tmp\x4LVwCx8arnCDPS.exeFilesize
772KB
MD55ed7019dcd0008dbcd8e54017b8c7dd9
SHA17e4457da2ff06c2170bad636c9eb7c1bb436fd06
SHA2567f069fe03db518eee8162ba5f65f98f2afd28137dfde9450d26cd47f6cea8eb7
SHA51210cef6104aeca8f7a135d4ffffb907b127f055477af4d98228c7385f0da15677357dfed13fc442ee173f85245224fc4b0ae100b832514c80802c5e5a054b70db
-
memory/4232-132-0x0000000000000000-mapping.dmp