Analysis
-
max time kernel
42s -
max time network
71s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 19:36
Static task
static1
Behavioral task
behavioral1
Sample
c45cbf84d36531e71f684141be5571a03635aca1c8b277b6860d3f3759a2b446.exe
Resource
win7-20221111-en
General
-
Target
c45cbf84d36531e71f684141be5571a03635aca1c8b277b6860d3f3759a2b446.exe
-
Size
931KB
-
MD5
ced10b017e16f53b1be54c71f8cd58fc
-
SHA1
117b9fad268876cc1aa2d89962e4966f3231d75f
-
SHA256
c45cbf84d36531e71f684141be5571a03635aca1c8b277b6860d3f3759a2b446
-
SHA512
0abbdd7590ec4ad5eb681623ebaa3611a262f1bad84990788dfddbebdc61f1938a60912eb92aa8f840466b17c6bda5c591ae91266d93aa25d55e042b1ce11d49
-
SSDEEP
24576:h1OYdaOtCZ/iWCvu/2sWsJA/jlt+DHhsu:h1OsjCpYO/dJJDHhsu
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
KcG6727oMz7NlU0.exepid process 876 KcG6727oMz7NlU0.exe -
Loads dropped DLL 1 IoCs
Processes:
c45cbf84d36531e71f684141be5571a03635aca1c8b277b6860d3f3759a2b446.exepid process 536 c45cbf84d36531e71f684141be5571a03635aca1c8b277b6860d3f3759a2b446.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 3 IoCs
Processes:
KcG6727oMz7NlU0.exedescription ioc process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\cdjehhajhoidifofhpojkbaneioeodaa\2.0\manifest.json KcG6727oMz7NlU0.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\cdjehhajhoidifofhpojkbaneioeodaa\2.0\manifest.json KcG6727oMz7NlU0.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\cdjehhajhoidifofhpojkbaneioeodaa\2.0\manifest.json KcG6727oMz7NlU0.exe -
Drops file in System32 directory 4 IoCs
Processes:
KcG6727oMz7NlU0.exedescription ioc process File opened for modification C:\Windows\System32\GroupPolicy KcG6727oMz7NlU0.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini KcG6727oMz7NlU0.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol KcG6727oMz7NlU0.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI KcG6727oMz7NlU0.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
KcG6727oMz7NlU0.exepid process 876 KcG6727oMz7NlU0.exe 876 KcG6727oMz7NlU0.exe 876 KcG6727oMz7NlU0.exe 876 KcG6727oMz7NlU0.exe 876 KcG6727oMz7NlU0.exe 876 KcG6727oMz7NlU0.exe 876 KcG6727oMz7NlU0.exe 876 KcG6727oMz7NlU0.exe 876 KcG6727oMz7NlU0.exe 876 KcG6727oMz7NlU0.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
KcG6727oMz7NlU0.exedescription pid process Token: SeDebugPrivilege 876 KcG6727oMz7NlU0.exe Token: SeDebugPrivilege 876 KcG6727oMz7NlU0.exe Token: SeDebugPrivilege 876 KcG6727oMz7NlU0.exe Token: SeDebugPrivilege 876 KcG6727oMz7NlU0.exe Token: SeDebugPrivilege 876 KcG6727oMz7NlU0.exe Token: SeDebugPrivilege 876 KcG6727oMz7NlU0.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
c45cbf84d36531e71f684141be5571a03635aca1c8b277b6860d3f3759a2b446.exedescription pid process target process PID 536 wrote to memory of 876 536 c45cbf84d36531e71f684141be5571a03635aca1c8b277b6860d3f3759a2b446.exe KcG6727oMz7NlU0.exe PID 536 wrote to memory of 876 536 c45cbf84d36531e71f684141be5571a03635aca1c8b277b6860d3f3759a2b446.exe KcG6727oMz7NlU0.exe PID 536 wrote to memory of 876 536 c45cbf84d36531e71f684141be5571a03635aca1c8b277b6860d3f3759a2b446.exe KcG6727oMz7NlU0.exe PID 536 wrote to memory of 876 536 c45cbf84d36531e71f684141be5571a03635aca1c8b277b6860d3f3759a2b446.exe KcG6727oMz7NlU0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c45cbf84d36531e71f684141be5571a03635aca1c8b277b6860d3f3759a2b446.exe"C:\Users\Admin\AppData\Local\Temp\c45cbf84d36531e71f684141be5571a03635aca1c8b277b6860d3f3759a2b446.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS5DB.tmp\KcG6727oMz7NlU0.exe.\KcG6727oMz7NlU0.exe2⤵
- Executes dropped EXE
- Drops Chrome extension
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\7zS5DB.tmp\KcG6727oMz7NlU0.datFilesize
1KB
MD5f6dd18eafad246b91456af982dcc1ed2
SHA1b9d223873e8f493187f3b9de89d959157065efac
SHA2567db2fead4b904c5abc1429eb81ec35409e7fd64683f4a7f654c5ff37a8ebf3e0
SHA512364181aef424529e868e0b71f3a41b767214a13148c1d1e5c31e54ae3457fff083c0d72cdce85d6be7cd42065fe76b0f6c625219185fbfd9e4e5af59090d741e
-
C:\Users\Admin\AppData\Local\Temp\7zS5DB.tmp\KcG6727oMz7NlU0.exeFilesize
772KB
MD55ed7019dcd0008dbcd8e54017b8c7dd9
SHA17e4457da2ff06c2170bad636c9eb7c1bb436fd06
SHA2567f069fe03db518eee8162ba5f65f98f2afd28137dfde9450d26cd47f6cea8eb7
SHA51210cef6104aeca8f7a135d4ffffb907b127f055477af4d98228c7385f0da15677357dfed13fc442ee173f85245224fc4b0ae100b832514c80802c5e5a054b70db
-
C:\Users\Admin\AppData\Local\Temp\7zS5DB.tmp\cdjehhajhoidifofhpojkbaneioeodaa\background.htmlFilesize
144B
MD58d5b9a1a531fb10d79680393b589ba70
SHA1678bfd3978ac925ed339a70574de4fa4b502c4cf
SHA2569240e1b2f670921f8c102f48fb1afe8a2ba48ff08da5f5f133364b7f98b925f5
SHA512996007ab285d10bff7f776802f85c0fd16df07539b62de901ab1a3db38b7d4cee349eef5ce3855edb6a1b3f734750a2863f24e7e69bd182d991d7a76c9d2f446
-
C:\Users\Admin\AppData\Local\Temp\7zS5DB.tmp\cdjehhajhoidifofhpojkbaneioeodaa\content.jsFilesize
144B
MD5fca19198fd8af21016a8b1dec7980002
SHA1fd01a47d14004e17a625efe66cc46a06c786cf40
SHA256332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a
SHA51260f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47
-
C:\Users\Admin\AppData\Local\Temp\7zS5DB.tmp\cdjehhajhoidifofhpojkbaneioeodaa\lsdb.jsFilesize
531B
MD536d98318ab2b3b2585a30984db328afb
SHA1f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5
SHA256ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7
SHA5126f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a
-
C:\Users\Admin\AppData\Local\Temp\7zS5DB.tmp\cdjehhajhoidifofhpojkbaneioeodaa\manifest.jsonFilesize
498B
MD5640199ea4621e34510de919f6a54436f
SHA1dc65dbfad02bd2688030bd56ca1cab85917a9937
SHA256e4aa7c089e32d14ddf584e9de6d007ec16581cd30c248ff7284bc0eb7757d4af
SHA512d64bc524d6df7c4c21a5ddfb0e6636317482ef4dc28006bd0a38d5e26c2db75626f216143026bf8acf3baa11d86c278e902c78afad4f806ca36f9e54bc75ff0a
-
C:\Users\Admin\AppData\Local\Temp\7zS5DB.tmp\cdjehhajhoidifofhpojkbaneioeodaa\vKXTIYL.jsFilesize
6KB
MD5e3f92bd2bed80378380730dfca64cbbc
SHA1fda6b1b8c251ee74963e584e50d10abf5cee6348
SHA256011e79c7dfe99a37a5f1c1509bb4301ea1b3ca34287462c0eb2308636bb739d3
SHA5124eab75e5820cab718ca96ed8852d6bb42a7861b5dcf5c634578deadb77db80b6cb018d9b7c052792ae8135027a7d96e108a06af62ced6fcfe84063154e658dfd
-
C:\Users\Admin\AppData\Local\Temp\7zS5DB.tmp\[email protected]\bootstrap.jsFilesize
2KB
MD5df13f711e20e9c80171846d4f2f7ae06
SHA156d29cda58427efe0e21d3880d39eb1b0ef60bee
SHA2566c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4
SHA5126c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e
-
C:\Users\Admin\AppData\Local\Temp\7zS5DB.tmp\[email protected]\chrome.manifestFilesize
35B
MD5de92ea736df086a50383550b44ae598b
SHA1d43db13319592b371ea21c872fd01c111e62bb7a
SHA2568e745b783a27edcaf2fb697c4b74ccd6435ab8ae25c485b022e9cff243bd98de
SHA512fa83d9e4b5610614b02e7a425ce9f35a3cba055e3b3c9b1ec40fe6488798b828515e067c803ebbb1ba702dfbb196d983b6ba78deb5eb6144fc36d334bc593500
-
C:\Users\Admin\AppData\Local\Temp\7zS5DB.tmp\[email protected]\content\bg.jsFilesize
8KB
MD525e0ecd344a444b7124ec1a47193a54e
SHA1775c9743580a6f4d7fed045a625d202c37ba817f
SHA2565d7073ebcc001188828344627839d10a75ae126d0b6541f52c47c6a547c5405e
SHA512ee73309b18039ded278e0cc68af12caa9383005249992a19999191afdb5f1ba5a458b838c2ba042b6767b847539f92a92321ae572d9ffd7f553a44d2b900bb14
-
C:\Users\Admin\AppData\Local\Temp\7zS5DB.tmp\[email protected]\install.rdfFilesize
595B
MD518d8a89761c0e10b13f9744f330ad382
SHA1dbc5a63cf08a29cd0d524ea28d40aedb5725b029
SHA25617fb09c825370793d1260ed2bc01b5fe4ab29b587b896c5bffe7d92efc182ee6
SHA5129a298fae0fac03ab564d6741e6f84565457db6163b5993ccde21b7171f41d71ddcfaabfd019f903627ca3179492dfdbce388123d860697456c7fe93314dc329f
-
\Users\Admin\AppData\Local\Temp\7zS5DB.tmp\KcG6727oMz7NlU0.exeFilesize
772KB
MD55ed7019dcd0008dbcd8e54017b8c7dd9
SHA17e4457da2ff06c2170bad636c9eb7c1bb436fd06
SHA2567f069fe03db518eee8162ba5f65f98f2afd28137dfde9450d26cd47f6cea8eb7
SHA51210cef6104aeca8f7a135d4ffffb907b127f055477af4d98228c7385f0da15677357dfed13fc442ee173f85245224fc4b0ae100b832514c80802c5e5a054b70db
-
memory/536-54-0x0000000075891000-0x0000000075893000-memory.dmpFilesize
8KB
-
memory/876-56-0x0000000000000000-mapping.dmp