Analysis

  • max time kernel
    38s
  • max time network
    43s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 19:35

General

  • Target

    c4a302583a771d4f2a61c5f27d131b41d028fdd0ac5808de18898e60362c7c30.exe

  • Size

    920KB

  • MD5

    9d95883f6e9a19e1fcca6c425c26490a

  • SHA1

    5d0023af9cc3f58f99dfef16d97698efa0a6aebe

  • SHA256

    c4a302583a771d4f2a61c5f27d131b41d028fdd0ac5808de18898e60362c7c30

  • SHA512

    63b883b72f2647d4cb95d08cc87e0c047938ff115620f90a44ae42f519db7059e4621e3bc991e2f87ffdbda8045c11d9226433878cd86bb7cce8c6ef666221d4

  • SSDEEP

    24576:h1OYdaOOMtdHAqcdDVhYwiei7+EpFAh/kKN:h1OsHPHVmVhYwiLtKkKN

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 3 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c4a302583a771d4f2a61c5f27d131b41d028fdd0ac5808de18898e60362c7c30.exe
    "C:\Users\Admin\AppData\Local\Temp\c4a302583a771d4f2a61c5f27d131b41d028fdd0ac5808de18898e60362c7c30.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:940
    • C:\Users\Admin\AppData\Local\Temp\7zSA45B.tmp\OocubrNokeLSKaE.exe
      .\OocubrNokeLSKaE.exe
      2⤵
      • Executes dropped EXE
      • Drops Chrome extension
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:936

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7zSA45B.tmp\[email protected]\bootstrap.js
    Filesize

    2KB

    MD5

    df13f711e20e9c80171846d4f2f7ae06

    SHA1

    56d29cda58427efe0e21d3880d39eb1b0ef60bee

    SHA256

    6c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4

    SHA512

    6c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e

  • C:\Users\Admin\AppData\Local\Temp\7zSA45B.tmp\[email protected]\chrome.manifest
    Filesize

    35B

    MD5

    a9aa370aa29c4606528cc589a3f440c1

    SHA1

    fc1afb79812887617a0e5f8752e508cd5205d00a

    SHA256

    fcf63da12e62712475ceac134a40c161a1e4aea858d120d875d52e15312f6d49

    SHA512

    bc078b1f53fd99fb03d61ba5d3b7ce5b221534f58e304198e62ad864a0e61997b38855a20d4035c4140094ba978d196ddb11327040392d87c866407722533698

  • C:\Users\Admin\AppData\Local\Temp\7zSA45B.tmp\[email protected]\content\bg.js
    Filesize

    8KB

    MD5

    ffedde3969e81e2b9e2fd10d127cab20

    SHA1

    ba11aebcbe2e593557c2c073ff112773e0e8d6fe

    SHA256

    b68ebce66b1c6d2b62e11e245b63ad65a27add57e887fd2654a0a642e77192bd

    SHA512

    0e32a1df477ee5846d74c42a835c86ff4a7df80c62282b38607d447c99887fe3eccbd3f040c8ab3362b59d018e3da0b856202045dcf1bd18e0c5828567e09a9e

  • C:\Users\Admin\AppData\Local\Temp\7zSA45B.tmp\[email protected]\install.rdf
    Filesize

    591B

    MD5

    b4066570e0b9b1686bbac490c598ba75

    SHA1

    08fc851bd6817de745554271995b8097dc04efad

    SHA256

    91407fea2608ea9c59efd8d4f3edf01582ac9c1ac97da0d9548aafa564eb8a3a

    SHA512

    d4b892dc9a631d76c17e6f1ea0cc0d25d841068dc208ae72fafaa9ef3171fd9bc55762b6088feb291bc42e338f2ec75d5ca8eb45df4d744622e94f85f1b98180

  • C:\Users\Admin\AppData\Local\Temp\7zSA45B.tmp\OocubrNokeLSKaE.dat
    Filesize

    1KB

    MD5

    cc319219114c831dd76abd191202c178

    SHA1

    97313d319298568425f9d182d65033b6347845f3

    SHA256

    f28f5d5d403c10db4faf63292f8f0908d4c1de979d7f1d6f05da34c52754f0b3

    SHA512

    52bfab5d6cf57bc739eab0175a296cd6230e8fac945f91df6a7376e40499c49cfe0ca7f0464c0edc63a67af2c6506180e6971b3b0798b6df31c2ef86af34053b

  • C:\Users\Admin\AppData\Local\Temp\7zSA45B.tmp\OocubrNokeLSKaE.exe
    Filesize

    760KB

    MD5

    dcd148f6f3af3e3b0935c4fcc9f41811

    SHA1

    ee9bdbc7c568c7832d90b85921ab20030b6734cd

    SHA256

    f8689641199c6fc430121797965485d95abfbc430753e0e668817ab3b511a1e4

    SHA512

    34be8e60dc2decf8287a71516f359e80bb858ce52218dde1b01c821c9b95be38821f068b79b0da8dbe90865560e7ddab77b25e3971dda9be667fb3ae8f174886

  • C:\Users\Admin\AppData\Local\Temp\7zSA45B.tmp\abhkmioildonbidlcgnohijemahjfeme\P0Q.js
    Filesize

    6KB

    MD5

    79f199a3f2a9131b928a0c605235a5b0

    SHA1

    9598e53da77babd8bf16d937bc83284e639e19d5

    SHA256

    32f581da089700cb7ee78a9dcfd5417aa013b810fee2f3b7372a15bafda18977

    SHA512

    f88d7caf1189b33794961f1d02f7ce2a2f5a0ad438edc44b106ee1840ad29df71d68e4d8736c8c6cb6cf7a8b38b3825e49fdf7afd443e24c8500a18de16ebfda

  • C:\Users\Admin\AppData\Local\Temp\7zSA45B.tmp\abhkmioildonbidlcgnohijemahjfeme\background.html
    Filesize

    140B

    MD5

    4a5e9725b1b8701d6776e479689e0b99

    SHA1

    91afe9e2455858d0f07ef7ceb89ecd4f36a3c511

    SHA256

    5a854d777c5c58442000d750fdf1f25bb91d2ba711b074755f7f09713b4828b8

    SHA512

    d104ee0276ba19952e95fe4bb3059bcaf293b41a3623419d81fdd15e92839b547144f9622be6bfe072c0610b2ddf064cd5bfc0674e17a0f72b359bdb39b20206

  • C:\Users\Admin\AppData\Local\Temp\7zSA45B.tmp\abhkmioildonbidlcgnohijemahjfeme\content.js
    Filesize

    144B

    MD5

    fca19198fd8af21016a8b1dec7980002

    SHA1

    fd01a47d14004e17a625efe66cc46a06c786cf40

    SHA256

    332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a

    SHA512

    60f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47

  • C:\Users\Admin\AppData\Local\Temp\7zSA45B.tmp\abhkmioildonbidlcgnohijemahjfeme\lsdb.js
    Filesize

    531B

    MD5

    36d98318ab2b3b2585a30984db328afb

    SHA1

    f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5

    SHA256

    ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7

    SHA512

    6f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a

  • C:\Users\Admin\AppData\Local\Temp\7zSA45B.tmp\abhkmioildonbidlcgnohijemahjfeme\manifest.json
    Filesize

    498B

    MD5

    640199ea4621e34510de919f6a54436f

    SHA1

    dc65dbfad02bd2688030bd56ca1cab85917a9937

    SHA256

    e4aa7c089e32d14ddf584e9de6d007ec16581cd30c248ff7284bc0eb7757d4af

    SHA512

    d64bc524d6df7c4c21a5ddfb0e6636317482ef4dc28006bd0a38d5e26c2db75626f216143026bf8acf3baa11d86c278e902c78afad4f806ca36f9e54bc75ff0a

  • \Users\Admin\AppData\Local\Temp\7zSA45B.tmp\OocubrNokeLSKaE.exe
    Filesize

    760KB

    MD5

    dcd148f6f3af3e3b0935c4fcc9f41811

    SHA1

    ee9bdbc7c568c7832d90b85921ab20030b6734cd

    SHA256

    f8689641199c6fc430121797965485d95abfbc430753e0e668817ab3b511a1e4

    SHA512

    34be8e60dc2decf8287a71516f359e80bb858ce52218dde1b01c821c9b95be38821f068b79b0da8dbe90865560e7ddab77b25e3971dda9be667fb3ae8f174886

  • memory/936-56-0x0000000000000000-mapping.dmp
  • memory/940-54-0x00000000760A1000-0x00000000760A3000-memory.dmp
    Filesize

    8KB