Analysis
-
max time kernel
13s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 19:00
Static task
static1
Behavioral task
behavioral1
Sample
cf135d8664655cfe782d8d61e8611bba8353900fabce3195897e8f7556096a2e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cf135d8664655cfe782d8d61e8611bba8353900fabce3195897e8f7556096a2e.exe
Resource
win10v2004-20221111-en
General
-
Target
cf135d8664655cfe782d8d61e8611bba8353900fabce3195897e8f7556096a2e.exe
-
Size
920KB
-
MD5
c7a9f88ca7de7668b1d4a586b570017f
-
SHA1
90d2de4646db74a9f78ed130548b3046dd16e6c7
-
SHA256
cf135d8664655cfe782d8d61e8611bba8353900fabce3195897e8f7556096a2e
-
SHA512
8a2963642c5d81a224cf538925cc1ab57c1777898b7c54b5739e9ff67a464fe39e58bfc3e2b7944aa50407a7eba2386ce8d3c0872658307e201dd3791f5eb3a8
-
SSDEEP
24576:h1OYdaOoCZ/iWCvu/2sWsJA/jlt+DHhsX:h1OsaCpYO/dJJDHhsX
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
WfqK4mHv54dhlYO.exepid process 968 WfqK4mHv54dhlYO.exe -
Loads dropped DLL 1 IoCs
Processes:
cf135d8664655cfe782d8d61e8611bba8353900fabce3195897e8f7556096a2e.exepid process 1668 cf135d8664655cfe782d8d61e8611bba8353900fabce3195897e8f7556096a2e.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 3 IoCs
Processes:
WfqK4mHv54dhlYO.exedescription ioc process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\fnfnbeppfinmnjnjhedifcfllpcfgeea\163\manifest.json WfqK4mHv54dhlYO.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\fnfnbeppfinmnjnjhedifcfllpcfgeea\163\manifest.json WfqK4mHv54dhlYO.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\fnfnbeppfinmnjnjhedifcfllpcfgeea\163\manifest.json WfqK4mHv54dhlYO.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
WfqK4mHv54dhlYO.exepid process 968 WfqK4mHv54dhlYO.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
cf135d8664655cfe782d8d61e8611bba8353900fabce3195897e8f7556096a2e.exedescription pid process target process PID 1668 wrote to memory of 968 1668 cf135d8664655cfe782d8d61e8611bba8353900fabce3195897e8f7556096a2e.exe WfqK4mHv54dhlYO.exe PID 1668 wrote to memory of 968 1668 cf135d8664655cfe782d8d61e8611bba8353900fabce3195897e8f7556096a2e.exe WfqK4mHv54dhlYO.exe PID 1668 wrote to memory of 968 1668 cf135d8664655cfe782d8d61e8611bba8353900fabce3195897e8f7556096a2e.exe WfqK4mHv54dhlYO.exe PID 1668 wrote to memory of 968 1668 cf135d8664655cfe782d8d61e8611bba8353900fabce3195897e8f7556096a2e.exe WfqK4mHv54dhlYO.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf135d8664655cfe782d8d61e8611bba8353900fabce3195897e8f7556096a2e.exe"C:\Users\Admin\AppData\Local\Temp\cf135d8664655cfe782d8d61e8611bba8353900fabce3195897e8f7556096a2e.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zSD9FB.tmp\WfqK4mHv54dhlYO.exe.\WfqK4mHv54dhlYO.exe2⤵
- Executes dropped EXE
- Drops Chrome extension
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\7zSD9FB.tmp\WfqK4mHv54dhlYO.datFilesize
1KB
MD5bca411820c0159d2a5699a1c02521846
SHA11984690fd65aa771e0c9167df2281fabd158714d
SHA25648523548f293362fc6eededf5170a3fef5d8f9cfb30b850d8504fbe2d039880f
SHA512f68c1c8c63e130f99f27b77f7bc5615b33eec8e9e2a1e554f50b69b250c68aecb5b49258b26affc6ba8b63a9d696d12f596c4edd5cc2874c5622e559e9f0993d
-
C:\Users\Admin\AppData\Local\Temp\7zSD9FB.tmp\WfqK4mHv54dhlYO.exeFilesize
772KB
MD55ed7019dcd0008dbcd8e54017b8c7dd9
SHA17e4457da2ff06c2170bad636c9eb7c1bb436fd06
SHA2567f069fe03db518eee8162ba5f65f98f2afd28137dfde9450d26cd47f6cea8eb7
SHA51210cef6104aeca8f7a135d4ffffb907b127f055477af4d98228c7385f0da15677357dfed13fc442ee173f85245224fc4b0ae100b832514c80802c5e5a054b70db
-
C:\Users\Admin\AppData\Local\Temp\7zSD9FB.tmp\fnfnbeppfinmnjnjhedifcfllpcfgeea\Lbjs.jsFilesize
7KB
MD5f607c215ed879e065ec17f1c9eca2903
SHA1d0d1de704513d5244ea5a0d27c5238557603957f
SHA2561e36ea0c309fb270956bcff938dd2a0180dcf31496b2532fbf0ac9729591ace7
SHA5123e8e24b6f4a37d41f3f096d1c076b76cf337bb6263f8e0a773d9f50415580a742ab61701f9233eeddf60a2e617f619bc8aab3d7c6074ce9b560d5974113905f2
-
C:\Users\Admin\AppData\Local\Temp\7zSD9FB.tmp\fnfnbeppfinmnjnjhedifcfllpcfgeea\background.htmlFilesize
141B
MD552e171afa1789b8c95ef7055dc83e0ec
SHA151e9fb9329ae1957a135d4ebea834e1cdb494d1e
SHA2569d13b6b6affaeeca8239c4a0e1d1138ec0b622f37d9ea609a652bb257ccb7e84
SHA51201e755e4faa6617894b361f09ec24fd694b33a32d2f1891e5fff39fbdb162d47c17e3e25fc39781fba3dc22b317e025674a880b978ae07945505c757436c2e27
-
C:\Users\Admin\AppData\Local\Temp\7zSD9FB.tmp\fnfnbeppfinmnjnjhedifcfllpcfgeea\content.jsFilesize
144B
MD5fca19198fd8af21016a8b1dec7980002
SHA1fd01a47d14004e17a625efe66cc46a06c786cf40
SHA256332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a
SHA51260f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47
-
C:\Users\Admin\AppData\Local\Temp\7zSD9FB.tmp\fnfnbeppfinmnjnjhedifcfllpcfgeea\lsdb.jsFilesize
531B
MD536d98318ab2b3b2585a30984db328afb
SHA1f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5
SHA256ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7
SHA5126f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a
-
C:\Users\Admin\AppData\Local\Temp\7zSD9FB.tmp\fnfnbeppfinmnjnjhedifcfllpcfgeea\manifest.jsonFilesize
600B
MD5d792ec6313fd2699574fff3ce1426456
SHA1099c7c90e0c9d1d868ea43b7b23fe433990b554a
SHA2567848aab91c11c2207bd11e4158f22ee0fdcd87229cc990a7dd7723b0aa95f7d9
SHA512d1ad82c55fdd181e5b893ecb2a02e0926e3fe28b68a1fffb21d6dd82ca99679f0a1029f5f856af894288aa16c37e445149176ed5b653f59e186d0a67eed41793
-
\Users\Admin\AppData\Local\Temp\7zSD9FB.tmp\WfqK4mHv54dhlYO.exeFilesize
772KB
MD55ed7019dcd0008dbcd8e54017b8c7dd9
SHA17e4457da2ff06c2170bad636c9eb7c1bb436fd06
SHA2567f069fe03db518eee8162ba5f65f98f2afd28137dfde9450d26cd47f6cea8eb7
SHA51210cef6104aeca8f7a135d4ffffb907b127f055477af4d98228c7385f0da15677357dfed13fc442ee173f85245224fc4b0ae100b832514c80802c5e5a054b70db
-
memory/968-56-0x0000000000000000-mapping.dmp
-
memory/1668-54-0x0000000075631000-0x0000000075633000-memory.dmpFilesize
8KB