Analysis

  • max time kernel
    39s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 19:46

General

  • Target

    c126e8f5001ae00a677108039fc727ce56a5dcceb0548ea62623f752a48cc347.exe

  • Size

    920KB

  • MD5

    e3a14536313551ccff343bc48f4efcda

  • SHA1

    5d222fda90982877aa30eb1eeb875b13073beb09

  • SHA256

    c126e8f5001ae00a677108039fc727ce56a5dcceb0548ea62623f752a48cc347

  • SHA512

    23ec456554fd49ddbae1a56c941fde8cec93e7edb4b668542ad36559b269c6942d61682edeaf427d6b85cbeb2dd4b15b35afd2ff62220053ce94f0af916245bc

  • SSDEEP

    24576:h1OYdaOLMtdHAqcdDVhYwiei7+EpFAh/kKq:h1Os+PHVmVhYwiLtKkKq

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 3 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c126e8f5001ae00a677108039fc727ce56a5dcceb0548ea62623f752a48cc347.exe
    "C:\Users\Admin\AppData\Local\Temp\c126e8f5001ae00a677108039fc727ce56a5dcceb0548ea62623f752a48cc347.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1364
    • C:\Users\Admin\AppData\Local\Temp\7zSB32A.tmp\dHEAmYDFNAwwheg.exe
      .\dHEAmYDFNAwwheg.exe
      2⤵
      • Executes dropped EXE
      • Drops Chrome extension
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1336

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7zSB32A.tmp\aigmbidnjipepcjfaaddgldimplanagi\background.html
    Filesize

    144B

    MD5

    51a93574351083eb3496a7a123134122

    SHA1

    17456bef0b72a5ebc89539f2bae8ff3326a04d76

    SHA256

    eb789ba5144bf8d7a5f8affd183c0780e6516cba2d441f339f4353fa80be799f

    SHA512

    e34b4533e13ffb16f269baf46c6bf4be988e36a6d5a84781e5eaa3a30c3142e8c6c1f77116fd4c69340edf9852631917ae09d010a853fadc9f389fc314307fe4

  • C:\Users\Admin\AppData\Local\Temp\7zSB32A.tmp\aigmbidnjipepcjfaaddgldimplanagi\content.js
    Filesize

    144B

    MD5

    fca19198fd8af21016a8b1dec7980002

    SHA1

    fd01a47d14004e17a625efe66cc46a06c786cf40

    SHA256

    332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a

    SHA512

    60f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47

  • C:\Users\Admin\AppData\Local\Temp\7zSB32A.tmp\aigmbidnjipepcjfaaddgldimplanagi\iA4uIFb.js
    Filesize

    6KB

    MD5

    c167c24899f0b78e27e64b8126072576

    SHA1

    ddf82a337b552378ba2ad0b124c4a0df1664636c

    SHA256

    d8fb0195ddcc94eb0b030eaef6c56957972fa9ce9e30602f12d426590a7b611f

    SHA512

    5ff8e37fe282ed52efc0f6286a4305c052a82039cd3d2d0572b620e36d6466973421b49700938dd10d941a558df45cb9364e945ee3dbadfefacac9c6b181fb41

  • C:\Users\Admin\AppData\Local\Temp\7zSB32A.tmp\aigmbidnjipepcjfaaddgldimplanagi\lsdb.js
    Filesize

    531B

    MD5

    36d98318ab2b3b2585a30984db328afb

    SHA1

    f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5

    SHA256

    ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7

    SHA512

    6f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a

  • C:\Users\Admin\AppData\Local\Temp\7zSB32A.tmp\aigmbidnjipepcjfaaddgldimplanagi\manifest.json
    Filesize

    498B

    MD5

    640199ea4621e34510de919f6a54436f

    SHA1

    dc65dbfad02bd2688030bd56ca1cab85917a9937

    SHA256

    e4aa7c089e32d14ddf584e9de6d007ec16581cd30c248ff7284bc0eb7757d4af

    SHA512

    d64bc524d6df7c4c21a5ddfb0e6636317482ef4dc28006bd0a38d5e26c2db75626f216143026bf8acf3baa11d86c278e902c78afad4f806ca36f9e54bc75ff0a

  • C:\Users\Admin\AppData\Local\Temp\7zSB32A.tmp\dHEAmYDFNAwwheg.dat
    Filesize

    1KB

    MD5

    dc550cd0e10ba2938e9af947b8873250

    SHA1

    6d09db36a7f8af4f962f2279eceb98fc9a657b85

    SHA256

    a35996275a8a029f5dfca525cf57840b8e1c557e811d6f7c23df62191847ec3d

    SHA512

    5a3d98cad641c7a55f6f73075b468c3724e6248595c3a4d96aaea30d463c71b60f93b19abdc69fe047b7bf16897135df56522d15c7f5c50849ce3e69b36d0bef

  • C:\Users\Admin\AppData\Local\Temp\7zSB32A.tmp\dHEAmYDFNAwwheg.exe
    Filesize

    760KB

    MD5

    dcd148f6f3af3e3b0935c4fcc9f41811

    SHA1

    ee9bdbc7c568c7832d90b85921ab20030b6734cd

    SHA256

    f8689641199c6fc430121797965485d95abfbc430753e0e668817ab3b511a1e4

    SHA512

    34be8e60dc2decf8287a71516f359e80bb858ce52218dde1b01c821c9b95be38821f068b79b0da8dbe90865560e7ddab77b25e3971dda9be667fb3ae8f174886

  • C:\Users\Admin\AppData\Local\Temp\7zSB32A.tmp\x@CTDos.org\bootstrap.js
    Filesize

    2KB

    MD5

    df13f711e20e9c80171846d4f2f7ae06

    SHA1

    56d29cda58427efe0e21d3880d39eb1b0ef60bee

    SHA256

    6c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4

    SHA512

    6c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e

  • C:\Users\Admin\AppData\Local\Temp\7zSB32A.tmp\x@CTDos.org\chrome.manifest
    Filesize

    35B

    MD5

    e3f460906a815edf9c1014c748f2a5e1

    SHA1

    ee9a023236fc3df7fefe60e681cce563eeed8bf9

    SHA256

    e3c746d79de88e24fe841fdff35235d74aa44e5ad799266e9157815a2b7ecf14

    SHA512

    c73d54d60a6d9a4f634a9c9963cfa14bae57af7875dc576eccdff8cc6d1ba9b9b1a2718a9d342a69d0b91f4cc103088a0406c3e2ef61cc221f848277e7d21379

  • C:\Users\Admin\AppData\Local\Temp\7zSB32A.tmp\x@CTDos.org\content\bg.js
    Filesize

    8KB

    MD5

    e0ccced926d941c5047b66c82b0640a8

    SHA1

    7d174311ec62740281498cc024b7ea3b594deaf6

    SHA256

    de83b8092a1627772f400ae7f9f2ea977ce97a4d34d3ffeb512d5c2f10c9c11c

    SHA512

    b82d90f4f12e86c7b8dc868991174ae6a3fa7c0a6ea30d6b155a4f640031e4015dc349f6e404adcd099f1fb18849149cb50a77b8a44e392376f1e57c9ea4aad8

  • C:\Users\Admin\AppData\Local\Temp\7zSB32A.tmp\x@CTDos.org\install.rdf
    Filesize

    593B

    MD5

    e7480222e6b40d2477024a0d123a3c72

    SHA1

    1d3d39d3e7b3d5bb175ad5ce5402249d919648c2

    SHA256

    a1d75ad94460c639d96b0957c57c5cfd8d107cea7976543df436112a8598cfe4

    SHA512

    a1e034cf21935262df26eea84c73109db74449b8fcae1640adc46fb32a9b6953e973c0f4abb703bb1c4c5f2b2ad44297f98a78c76fd1fd14d3e0a0aaa71a3bfc

  • \Users\Admin\AppData\Local\Temp\7zSB32A.tmp\dHEAmYDFNAwwheg.exe
    Filesize

    760KB

    MD5

    dcd148f6f3af3e3b0935c4fcc9f41811

    SHA1

    ee9bdbc7c568c7832d90b85921ab20030b6734cd

    SHA256

    f8689641199c6fc430121797965485d95abfbc430753e0e668817ab3b511a1e4

    SHA512

    34be8e60dc2decf8287a71516f359e80bb858ce52218dde1b01c821c9b95be38821f068b79b0da8dbe90865560e7ddab77b25e3971dda9be667fb3ae8f174886

  • memory/1336-56-0x0000000000000000-mapping.dmp
  • memory/1364-54-0x0000000075091000-0x0000000075093000-memory.dmp
    Filesize

    8KB