Analysis

  • max time kernel
    23s
  • max time network
    73s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 19:36

General

  • Target

    c457edbca9c250575250a2c0653636d781e235843ecaf67d9c7049e0376cf2cb.exe

  • Size

    926KB

  • MD5

    8ea5b7e6f3e4fefd30223c56b1ce35e2

  • SHA1

    a58de7c3f3639611b5393135fce9085c6c8b9f57

  • SHA256

    c457edbca9c250575250a2c0653636d781e235843ecaf67d9c7049e0376cf2cb

  • SHA512

    908e9b14bdb26f1eea526aade1986c8610001efc84cf20fc39793dfa3254e63e8b3cabcdfa38fe825637136a8514279bb0daea66fa3595b1a273ae7d707e156d

  • SSDEEP

    24576:h1OYdaOmnQju5vMu6qN2FctIOBYXZBai3GBlgpKLe/7rI:h1OsUQjO6HHzayGBe/7rI

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 3 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c457edbca9c250575250a2c0653636d781e235843ecaf67d9c7049e0376cf2cb.exe
    "C:\Users\Admin\AppData\Local\Temp\c457edbca9c250575250a2c0653636d781e235843ecaf67d9c7049e0376cf2cb.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1772
    • C:\Users\Admin\AppData\Local\Temp\7zSE310.tmp\Yz5HnUKW2y2FmMc.exe
      .\Yz5HnUKW2y2FmMc.exe
      2⤵
      • Executes dropped EXE
      • Drops Chrome extension
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:944

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7zSE310.tmp\Yz5HnUKW2y2FmMc.dat
    Filesize

    1KB

    MD5

    3ddea856513a989d62ddafa43786e3a5

    SHA1

    c329c7ffee48efabf3c17c980374eeeba477351f

    SHA256

    95a1e10cad869f18ac3d86d0257ce7797a1178fcce9073c8f0770c57512ed678

    SHA512

    52506388ef81c8f43c19fadae0beb79239b859130dbc1308a5e10db34dafd6cf071bb2559f69e0b55e63d640fa325eecf732c3d99f2f47e4d32586d05f694454

  • C:\Users\Admin\AppData\Local\Temp\7zSE310.tmp\Yz5HnUKW2y2FmMc.exe
    Filesize

    768KB

    MD5

    09e156c94b649920c0c6efa8508ada9a

    SHA1

    8ba966f84a07648613468b06a11d17f2650e8af0

    SHA256

    2584e4b5077edba37c8e6f97ccdc2e582136ae0144212b37eb97cd4d8685059a

    SHA512

    1a1d2ff05d413ec1c18735dcb06775f0e652fc778f0ce31a9bdc8e567beb32253df635ee2e9b3bdc430c49f0f5ca6128e44cbd88b2cb712a6712c8327f209375

  • C:\Users\Admin\AppData\Local\Temp\7zSE310.tmp\[email protected]\bootstrap.js
    Filesize

    2KB

    MD5

    df13f711e20e9c80171846d4f2f7ae06

    SHA1

    56d29cda58427efe0e21d3880d39eb1b0ef60bee

    SHA256

    6c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4

    SHA512

    6c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e

  • C:\Users\Admin\AppData\Local\Temp\7zSE310.tmp\[email protected]\chrome.manifest
    Filesize

    35B

    MD5

    83ad552d8efb11d6a9cf43bb6c1e7ca5

    SHA1

    9c7e3d08b1879caa25c6821cd99ca4ceff2c6ee7

    SHA256

    f26f978b0933dab1a8e560119076b68a9cd027c3bbe4bc969087a4788a840654

    SHA512

    2ff10f4e2f9cc58775f75305e2ff0a2322d91dec7670e1833b3ca784e5f01d7331c911dfed77eec08119ce0e0e5b49ca7312bdbe76e6a185d254a4b7927ea1fe

  • C:\Users\Admin\AppData\Local\Temp\7zSE310.tmp\[email protected]\content\bg.js
    Filesize

    8KB

    MD5

    4e48a68b30c51c4767a79bc86d92434e

    SHA1

    37d315b12b457df75781405da4d04228a6855d52

    SHA256

    e2605e1dcfa1d26f96825100f80d61565d68154f88a93634f3edc4ab649fdc7b

    SHA512

    e038982c92906b7e53da7d88c9b82d3a2a89c936c1a09ada28336d3cedd2cae4c9a0f0e1cf428c6cec4c325b00d825ac4367df002512d274131dc3d97cfa52d4

  • C:\Users\Admin\AppData\Local\Temp\7zSE310.tmp\[email protected]\install.rdf
    Filesize

    592B

    MD5

    7bd080ddb721545b62477e814718a611

    SHA1

    f6cb174e79a401586bf6193c8ef0b9a39cd2b31b

    SHA256

    0a3f133c940edc4eba046b5846942191a9bd4f856cf74b58134480d151175e63

    SHA512

    04339bf0a8e2c2993e0c1fdc2e9296dc39c7d8237b484764bb09c18b3cfb193c1ed33a7bb2ea0863d88906294a7902182c8ab1e1d146d770773c4d52e619291f

  • C:\Users\Admin\AppData\Local\Temp\7zSE310.tmp\ogljhocnejdjhfbkgblkfkkhkonmgcbh\background.html
    Filesize

    144B

    MD5

    3ebd605fed4dd95a6a29c9c579cd7dff

    SHA1

    dc66bd276e38a2e377cafac2e6cbf5ae880e9317

    SHA256

    471ae64f1b21ad08d06b13c90d79189b65af1fc8c34e785074f865a1dc372e48

    SHA512

    a5fa414149832fb064174245017798c431f322452c8a3cfd26d7e50ac2548094c903074d1acdec84d61043ebf74fe8697721a2b565a0bcfd10a6e89a52186c29

  • C:\Users\Admin\AppData\Local\Temp\7zSE310.tmp\ogljhocnejdjhfbkgblkfkkhkonmgcbh\content.js
    Filesize

    144B

    MD5

    fca19198fd8af21016a8b1dec7980002

    SHA1

    fd01a47d14004e17a625efe66cc46a06c786cf40

    SHA256

    332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a

    SHA512

    60f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47

  • C:\Users\Admin\AppData\Local\Temp\7zSE310.tmp\ogljhocnejdjhfbkgblkfkkhkonmgcbh\jtHibdS.js
    Filesize

    6KB

    MD5

    0cca3cb971e615ac05d4fd235265ebd8

    SHA1

    b8ce46190f20cb28841c90774ddd4951fe0545e4

    SHA256

    cf68534e57d3e123f25a0a87f2f5759a798d796c355d5677be0263ee182dd456

    SHA512

    d487c9cef20ea5d7f169cdc6cab14944f76b6163ddd748e68166b75d4abe4b8503fa6d361349e332c4a2382c9feca9097171bd98e4f0edfa44244ae95311c28a

  • C:\Users\Admin\AppData\Local\Temp\7zSE310.tmp\ogljhocnejdjhfbkgblkfkkhkonmgcbh\lsdb.js
    Filesize

    531B

    MD5

    36d98318ab2b3b2585a30984db328afb

    SHA1

    f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5

    SHA256

    ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7

    SHA512

    6f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a

  • C:\Users\Admin\AppData\Local\Temp\7zSE310.tmp\ogljhocnejdjhfbkgblkfkkhkonmgcbh\manifest.json
    Filesize

    498B

    MD5

    640199ea4621e34510de919f6a54436f

    SHA1

    dc65dbfad02bd2688030bd56ca1cab85917a9937

    SHA256

    e4aa7c089e32d14ddf584e9de6d007ec16581cd30c248ff7284bc0eb7757d4af

    SHA512

    d64bc524d6df7c4c21a5ddfb0e6636317482ef4dc28006bd0a38d5e26c2db75626f216143026bf8acf3baa11d86c278e902c78afad4f806ca36f9e54bc75ff0a

  • \Users\Admin\AppData\Local\Temp\7zSE310.tmp\Yz5HnUKW2y2FmMc.exe
    Filesize

    768KB

    MD5

    09e156c94b649920c0c6efa8508ada9a

    SHA1

    8ba966f84a07648613468b06a11d17f2650e8af0

    SHA256

    2584e4b5077edba37c8e6f97ccdc2e582136ae0144212b37eb97cd4d8685059a

    SHA512

    1a1d2ff05d413ec1c18735dcb06775f0e652fc778f0ce31a9bdc8e567beb32253df635ee2e9b3bdc430c49f0f5ca6128e44cbd88b2cb712a6712c8327f209375

  • memory/944-56-0x0000000000000000-mapping.dmp
  • memory/1772-54-0x0000000075A11000-0x0000000075A13000-memory.dmp
    Filesize

    8KB