Analysis

  • max time kernel
    44s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 19:42

General

  • Target

    c2890a820bcf3d5299f1994f2383a6ab409e7ce907c790d1349bb82038e2003a.exe

  • Size

    2.5MB

  • MD5

    d40dcb87cb5c40003b09d6f0f67df9bb

  • SHA1

    2a9ed21b3a8628504528d0c94c09fa030ca1d985

  • SHA256

    c2890a820bcf3d5299f1994f2383a6ab409e7ce907c790d1349bb82038e2003a

  • SHA512

    47aa3d40a2ee2b856807100644e3dd053806228102f199ac81b0a92dde43d2070c9936e51cd18f4cfb71bb11f9a0ec94c6ad5e652c36f0e4320797d4f4fd1f0f

  • SSDEEP

    49152:h1OsOsNQH0eNGTTOxTnkSM1XN+QMz3p6bOkAk+YetEW6FOCMwEFhjzdUwG:h1O9H0eNGunkt3+1z3p6iVCZ

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 3 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 11 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c2890a820bcf3d5299f1994f2383a6ab409e7ce907c790d1349bb82038e2003a.exe
    "C:\Users\Admin\AppData\Local\Temp\c2890a820bcf3d5299f1994f2383a6ab409e7ce907c790d1349bb82038e2003a.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:852
    • C:\Users\Admin\AppData\Local\Temp\7zS2C8D.tmp\FR8DNEr9FBvUGVe.exe
      .\FR8DNEr9FBvUGVe.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops Chrome extension
      • Installs/modifies Browser Helper Object
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:944
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32.exe /s "C:\Program Files (x86)\TinyWallet\K8ulXznHbdkDFL.x64.dll"
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:664
        • C:\Windows\system32\regsvr32.exe
          /s "C:\Program Files (x86)\TinyWallet\K8ulXznHbdkDFL.x64.dll"
          4⤵
          • Loads dropped DLL
          • Installs/modifies Browser Helper Object
          PID:1332

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Browser Extensions

1
T1176

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\TinyWallet\K8ulXznHbdkDFL.dat
    Filesize

    6KB

    MD5

    155ca2ceba5954be4b52fde2a0dd8b3a

    SHA1

    b43b260a3493158b1c9ee8fdfe4efc939ba7b390

    SHA256

    51f022da9d5b1585ab521f2878baee5620ec8f5b21e67ae085a9f497d3296de8

    SHA512

    ebf86404eb63884dffaf8c4311f428ab82ec76249f9ecac0ee3b78fb3567f889e123098aed6ebbf2ea5679faa7ff08f4c4f83a1369eb1bf7c193f0295a58a71b

  • C:\Program Files (x86)\TinyWallet\K8ulXznHbdkDFL.x64.dll
    Filesize

    891KB

    MD5

    bef492ffc032769cde00802f48a17fab

    SHA1

    a91e733c1269eb785f8e23dc475acac7432f0563

    SHA256

    473507950695ec743b98e5ef4b8970b2c7e6936556903c94f7fa88917265255d

    SHA512

    4f61d5f3a45d20cd00ed7ee6b874bf2dcbf248b8f65dfd8580c7148d6c71c316cace409be675a2ea919e8a12caf8690fafaf14c0f5479df55689401d2432afa0

  • C:\Users\Admin\AppData\Local\Temp\7zS2C8D.tmp\FR8DNEr9FBvUGVe.dat
    Filesize

    6KB

    MD5

    155ca2ceba5954be4b52fde2a0dd8b3a

    SHA1

    b43b260a3493158b1c9ee8fdfe4efc939ba7b390

    SHA256

    51f022da9d5b1585ab521f2878baee5620ec8f5b21e67ae085a9f497d3296de8

    SHA512

    ebf86404eb63884dffaf8c4311f428ab82ec76249f9ecac0ee3b78fb3567f889e123098aed6ebbf2ea5679faa7ff08f4c4f83a1369eb1bf7c193f0295a58a71b

  • C:\Users\Admin\AppData\Local\Temp\7zS2C8D.tmp\FR8DNEr9FBvUGVe.exe
    Filesize

    774KB

    MD5

    fac681323e2e0ea322ef16fa551cf1e8

    SHA1

    744f89e591a6ced737cfe9214ce09c263de50211

    SHA256

    537f2df71a2f21f943a39d1c6d093a442e7ee975ed3e29b733b8bc5bf646793c

    SHA512

    22626bd0e79edac062b61d64234f563e3a8218703276a19a0b01749e2cad8387c8bd39bfe13810b787fb9e4c7f1669ea542e36bbf63c7c243fc68bb6fdf5c7b2

  • C:\Users\Admin\AppData\Local\Temp\7zS2C8D.tmp\FR8DNEr9FBvUGVe.exe
    Filesize

    774KB

    MD5

    fac681323e2e0ea322ef16fa551cf1e8

    SHA1

    744f89e591a6ced737cfe9214ce09c263de50211

    SHA256

    537f2df71a2f21f943a39d1c6d093a442e7ee975ed3e29b733b8bc5bf646793c

    SHA512

    22626bd0e79edac062b61d64234f563e3a8218703276a19a0b01749e2cad8387c8bd39bfe13810b787fb9e4c7f1669ea542e36bbf63c7c243fc68bb6fdf5c7b2

  • C:\Users\Admin\AppData\Local\Temp\7zS2C8D.tmp\K8ulXznHbdkDFL.dll
    Filesize

    754KB

    MD5

    0ea14ffbf9bc129f87d5a633ca028a12

    SHA1

    c91e00a9d6590556a4c13a46cb6c934f84cf2b2b

    SHA256

    9206058e3e04af4fb8d5c05ae8f088cf0a289ea0e4cd692c4f2d76439adb0d47

    SHA512

    0cfd075335346690ead8c5aef2340b56ce07c59d6243ad102fee0053d64f1a7847e56ba27f5bbcac4048f2c1cf70038e7cdffafe1cc28994603fdd65d2bf7bb2

  • C:\Users\Admin\AppData\Local\Temp\7zS2C8D.tmp\K8ulXznHbdkDFL.tlb
    Filesize

    3KB

    MD5

    4ab2bba691d66beca01f76ac65546fe8

    SHA1

    16f05ce91f3e2fe4b43452e24d56836fc65615af

    SHA256

    12816936003f13a1711de73328e38f311926a4cc9d1a836f46c9ccc02b6fb06f

    SHA512

    f034390bfd57618bbfd218c3df9e465dda8f4fa51fc0445c74e246472a4cde2bc0bfe4607cbc8cb31ac0edff62a84e954179fadddc2b644b8726cfa3e01694a2

  • C:\Users\Admin\AppData\Local\Temp\7zS2C8D.tmp\K8ulXznHbdkDFL.x64.dll
    Filesize

    891KB

    MD5

    bef492ffc032769cde00802f48a17fab

    SHA1

    a91e733c1269eb785f8e23dc475acac7432f0563

    SHA256

    473507950695ec743b98e5ef4b8970b2c7e6936556903c94f7fa88917265255d

    SHA512

    4f61d5f3a45d20cd00ed7ee6b874bf2dcbf248b8f65dfd8580c7148d6c71c316cace409be675a2ea919e8a12caf8690fafaf14c0f5479df55689401d2432afa0

  • C:\Users\Admin\AppData\Local\Temp\7zS2C8D.tmp\Qw@zS.com\bootstrap.js
    Filesize

    2KB

    MD5

    df13f711e20e9c80171846d4f2f7ae06

    SHA1

    56d29cda58427efe0e21d3880d39eb1b0ef60bee

    SHA256

    6c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4

    SHA512

    6c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e

  • C:\Users\Admin\AppData\Local\Temp\7zS2C8D.tmp\Qw@zS.com\chrome.manifest
    Filesize

    35B

    MD5

    6a15b85a283b0a8b473feb335028db7e

    SHA1

    809ca204173836887ff69123a7e9d9fe3eed2e4e

    SHA256

    474bc4525c2e033fe4b2dcca24b46c1792f262de1c54e243ecc8e90479d5ec65

    SHA512

    c032569043f2ace16f52c2fa7bb6e2a9885a78723a7072f4d2a1272244de7546c846bd0c96a1e68dec813c46acbb7ac26fe84c1f66b72af1db2b9eca29354ea0

  • C:\Users\Admin\AppData\Local\Temp\7zS2C8D.tmp\Qw@zS.com\content\bg.js
    Filesize

    7KB

    MD5

    a3f45f36296499c45277b0220183910e

    SHA1

    871a0ea0cd804df19dc2063c3f05a87b62ce4b3e

    SHA256

    4b24fcc7a29df5a723c8300bb274aa3356bde2a82e7de2bfd35b88263df88a3c

    SHA512

    718f1276f4a2bd36a873f13e5646123e16a92d68b3835144e1a4aa7d6df16afb6e1ab16187c4d9a90402420df1c70511bad9d1c429b19307c7a1a455faf251aa

  • C:\Users\Admin\AppData\Local\Temp\7zS2C8D.tmp\Qw@zS.com\install.rdf
    Filesize

    595B

    MD5

    3c3c37463ffa24d79a16b1fe7537ca39

    SHA1

    1e6ccc67bfd7accb8eda84cec40a08421c82317b

    SHA256

    10ead90737a7de0cac214a7f43e4213e42af3b0cdbf4b696c86c5a2d94130d14

    SHA512

    d11052feb1797f945954a70786d513b730246024dbdcf8929912611bdc85684f2606fba7c6d3f624bddd3ce579be7cadc4e510fc9d1bde17f335cceb30f278e0

  • C:\Users\Admin\AppData\Local\Temp\7zS2C8D.tmp\jijoomdofaoanjmkhinhpkmlpkiakceg\BEsnaz0.js
    Filesize

    5KB

    MD5

    b41581b8c5a2b83b0ae9301f61c83951

    SHA1

    8f4685ea7062f9f7d381f1fa9f84fbb386a3b62d

    SHA256

    9cd573fcbc00ec3d82ffd5349cf84e4327f51d00036f616d460626002566c554

    SHA512

    767a7d23f17c5d9ecf1391b9bf69b3147c9d45438cf96c38e7e813f121e5d0cf8fca3dfdb53b7964902f66c6dce9294a0188a063d4d1b139e9fe2a4c7e2df54f

  • C:\Users\Admin\AppData\Local\Temp\7zS2C8D.tmp\jijoomdofaoanjmkhinhpkmlpkiakceg\background.html
    Filesize

    144B

    MD5

    09840dc446883e6eeb9df5e110b977db

    SHA1

    6ca1395409969be906884f20c47593e3a260a54e

    SHA256

    f8a4ae0a99d19fd21f3422c77138443ffa7327593f34fdf63d131c65c684ac33

    SHA512

    2e22d5fd4078a5f28c1e5af30d4a73b0d48d795d257c7f7b16d5f17b25a756d7e69dba02357e83c0ce797cf76758bf7e02227ec56b000efb5180b660c4df7fb9

  • C:\Users\Admin\AppData\Local\Temp\7zS2C8D.tmp\jijoomdofaoanjmkhinhpkmlpkiakceg\content.js
    Filesize

    144B

    MD5

    fca19198fd8af21016a8b1dec7980002

    SHA1

    fd01a47d14004e17a625efe66cc46a06c786cf40

    SHA256

    332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a

    SHA512

    60f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47

  • C:\Users\Admin\AppData\Local\Temp\7zS2C8D.tmp\jijoomdofaoanjmkhinhpkmlpkiakceg\lsdb.js
    Filesize

    531B

    MD5

    36d98318ab2b3b2585a30984db328afb

    SHA1

    f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5

    SHA256

    ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7

    SHA512

    6f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a

  • C:\Users\Admin\AppData\Local\Temp\7zS2C8D.tmp\jijoomdofaoanjmkhinhpkmlpkiakceg\manifest.json
    Filesize

    502B

    MD5

    38de491d48e043ad6d09e11d08940ae6

    SHA1

    222e9c064ed4282c6fc5fa1fa907d3a66862c4c3

    SHA256

    d9636ab6aa2c25454ab1dcd82ad4471fbed760368c896273cb03722367bb23fe

    SHA512

    22dc600e3231b54e397151a8535e226a8cce522a3d2d6579be60245a04fca8c29d65127a3a9fd839d91a08d77cc644f2e223953c674006ee04c668f138e9a17e

  • \Program Files (x86)\TinyWallet\K8ulXznHbdkDFL.dll
    Filesize

    754KB

    MD5

    0ea14ffbf9bc129f87d5a633ca028a12

    SHA1

    c91e00a9d6590556a4c13a46cb6c934f84cf2b2b

    SHA256

    9206058e3e04af4fb8d5c05ae8f088cf0a289ea0e4cd692c4f2d76439adb0d47

    SHA512

    0cfd075335346690ead8c5aef2340b56ce07c59d6243ad102fee0053d64f1a7847e56ba27f5bbcac4048f2c1cf70038e7cdffafe1cc28994603fdd65d2bf7bb2

  • \Program Files (x86)\TinyWallet\K8ulXznHbdkDFL.x64.dll
    Filesize

    891KB

    MD5

    bef492ffc032769cde00802f48a17fab

    SHA1

    a91e733c1269eb785f8e23dc475acac7432f0563

    SHA256

    473507950695ec743b98e5ef4b8970b2c7e6936556903c94f7fa88917265255d

    SHA512

    4f61d5f3a45d20cd00ed7ee6b874bf2dcbf248b8f65dfd8580c7148d6c71c316cace409be675a2ea919e8a12caf8690fafaf14c0f5479df55689401d2432afa0

  • \Program Files (x86)\TinyWallet\K8ulXznHbdkDFL.x64.dll
    Filesize

    891KB

    MD5

    bef492ffc032769cde00802f48a17fab

    SHA1

    a91e733c1269eb785f8e23dc475acac7432f0563

    SHA256

    473507950695ec743b98e5ef4b8970b2c7e6936556903c94f7fa88917265255d

    SHA512

    4f61d5f3a45d20cd00ed7ee6b874bf2dcbf248b8f65dfd8580c7148d6c71c316cace409be675a2ea919e8a12caf8690fafaf14c0f5479df55689401d2432afa0

  • \Users\Admin\AppData\Local\Temp\7zS2C8D.tmp\FR8DNEr9FBvUGVe.exe
    Filesize

    774KB

    MD5

    fac681323e2e0ea322ef16fa551cf1e8

    SHA1

    744f89e591a6ced737cfe9214ce09c263de50211

    SHA256

    537f2df71a2f21f943a39d1c6d093a442e7ee975ed3e29b733b8bc5bf646793c

    SHA512

    22626bd0e79edac062b61d64234f563e3a8218703276a19a0b01749e2cad8387c8bd39bfe13810b787fb9e4c7f1669ea542e36bbf63c7c243fc68bb6fdf5c7b2

  • memory/664-73-0x0000000000000000-mapping.dmp
  • memory/852-54-0x0000000074E41000-0x0000000074E43000-memory.dmp
    Filesize

    8KB

  • memory/944-56-0x0000000000000000-mapping.dmp
  • memory/1332-77-0x0000000000000000-mapping.dmp
  • memory/1332-78-0x000007FEFB641000-0x000007FEFB643000-memory.dmp
    Filesize

    8KB