Analysis

  • max time kernel
    126s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 21:17

General

  • Target

    a46e377ba14a47f35ea34039e0ef24b3faf8c598503e0cb9065577e2999e856d.exe

  • Size

    931KB

  • MD5

    b2653d10ab487bc280f73b72ab937e9b

  • SHA1

    435906f02afb95d319a1eadfbb28b7e4ab492e9a

  • SHA256

    a46e377ba14a47f35ea34039e0ef24b3faf8c598503e0cb9065577e2999e856d

  • SHA512

    0ec0b371f9cd24f91893ca0cb9af92f79ed880ed06571c51c102186de6d05425590decfae3cd66f987727dc4305e91beaa88c764c530d38c2757963937b6d91e

  • SSDEEP

    24576:h1OYdaO8CZ/iWCvu/2sWsJA/jlt+DHhsf:h1OseCpYO/dJJDHhsf

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a46e377ba14a47f35ea34039e0ef24b3faf8c598503e0cb9065577e2999e856d.exe
    "C:\Users\Admin\AppData\Local\Temp\a46e377ba14a47f35ea34039e0ef24b3faf8c598503e0cb9065577e2999e856d.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2320
    • C:\Users\Admin\AppData\Local\Temp\7zSC9BD.tmp\IUrDKgObPybPaUK.exe
      .\IUrDKgObPybPaUK.exe
      2⤵
      • Executes dropped EXE
      • Drops Chrome extension
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1624
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
    1⤵
      PID:4840
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
      1⤵
        PID:4928

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Credential Access

      Credentials in Files

      1
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      1
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\7zSC9BD.tmp\IUrDKgObPybPaUK.dat
        Filesize

        1KB

        MD5

        6571bd4983e33bd847336d7bb723e464

        SHA1

        c3b051bfac4016b710bc7bcc1c782ec05d1ff225

        SHA256

        e20716b51fdfe004b12967fb0d56ea4935028e97b1030fc43290f720d9ecbd51

        SHA512

        6fb33de83a60c919f99de0ae237c3bc4d02c59f7767923277bd5fe5d7a6bb271f93a3ee167b820c7859516e29e6e6732f8c3740c59901f2512ff5b7698ab2a52

      • C:\Users\Admin\AppData\Local\Temp\7zSC9BD.tmp\IUrDKgObPybPaUK.exe
        Filesize

        772KB

        MD5

        5ed7019dcd0008dbcd8e54017b8c7dd9

        SHA1

        7e4457da2ff06c2170bad636c9eb7c1bb436fd06

        SHA256

        7f069fe03db518eee8162ba5f65f98f2afd28137dfde9450d26cd47f6cea8eb7

        SHA512

        10cef6104aeca8f7a135d4ffffb907b127f055477af4d98228c7385f0da15677357dfed13fc442ee173f85245224fc4b0ae100b832514c80802c5e5a054b70db

      • C:\Users\Admin\AppData\Local\Temp\7zSC9BD.tmp\IUrDKgObPybPaUK.exe
        Filesize

        772KB

        MD5

        5ed7019dcd0008dbcd8e54017b8c7dd9

        SHA1

        7e4457da2ff06c2170bad636c9eb7c1bb436fd06

        SHA256

        7f069fe03db518eee8162ba5f65f98f2afd28137dfde9450d26cd47f6cea8eb7

        SHA512

        10cef6104aeca8f7a135d4ffffb907b127f055477af4d98228c7385f0da15677357dfed13fc442ee173f85245224fc4b0ae100b832514c80802c5e5a054b70db

      • C:\Users\Admin\AppData\Local\Temp\7zSC9BD.tmp\jddlpmmhcnlhmanocabojdnglooflkhi\NQVKs8SX.js
        Filesize

        6KB

        MD5

        5f0202c34fb92290d8979dc4813afe20

        SHA1

        bf7d08c9901770365c11313b27dd58d0948cb158

        SHA256

        099220460511adab387cfd91dd370bd0dfb98aafd61a5bc5fcec068e4fdde5cc

        SHA512

        50537682bb5fcaece1a357709dd74e9445390aa2c04ddecced4097c0794c1dce258d4b5b3cc2a79d21feafbe82b0f44c5bb6e1bbdd83b1c8e214a56b798e77d6

      • C:\Users\Admin\AppData\Local\Temp\7zSC9BD.tmp\jddlpmmhcnlhmanocabojdnglooflkhi\background.html
        Filesize

        145B

        MD5

        9af79524de70f874b73ec82256a0213b

        SHA1

        d436b5d0020266802da460b1770a10f839194695

        SHA256

        5f82846c7cc7a332792857275912c932a6d86d5abeed0ae38b6da8ed2bbf78cb

        SHA512

        77f0293401f977606a71f02a6d33f4692766a2f40ed9166c5318174f1508c1fc99261edfc86e0a295a636fc80015085f80f3c02bb27f9782b6974df3b5d54dc0

      • C:\Users\Admin\AppData\Local\Temp\7zSC9BD.tmp\jddlpmmhcnlhmanocabojdnglooflkhi\content.js
        Filesize

        144B

        MD5

        fca19198fd8af21016a8b1dec7980002

        SHA1

        fd01a47d14004e17a625efe66cc46a06c786cf40

        SHA256

        332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a

        SHA512

        60f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47

      • C:\Users\Admin\AppData\Local\Temp\7zSC9BD.tmp\jddlpmmhcnlhmanocabojdnglooflkhi\lsdb.js
        Filesize

        531B

        MD5

        36d98318ab2b3b2585a30984db328afb

        SHA1

        f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5

        SHA256

        ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7

        SHA512

        6f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a

      • C:\Users\Admin\AppData\Local\Temp\7zSC9BD.tmp\jddlpmmhcnlhmanocabojdnglooflkhi\manifest.json
        Filesize

        498B

        MD5

        640199ea4621e34510de919f6a54436f

        SHA1

        dc65dbfad02bd2688030bd56ca1cab85917a9937

        SHA256

        e4aa7c089e32d14ddf584e9de6d007ec16581cd30c248ff7284bc0eb7757d4af

        SHA512

        d64bc524d6df7c4c21a5ddfb0e6636317482ef4dc28006bd0a38d5e26c2db75626f216143026bf8acf3baa11d86c278e902c78afad4f806ca36f9e54bc75ff0a

      • C:\Users\Admin\AppData\Local\Temp\7zSC9BD.tmp\[email protected]\bootstrap.js
        Filesize

        2KB

        MD5

        df13f711e20e9c80171846d4f2f7ae06

        SHA1

        56d29cda58427efe0e21d3880d39eb1b0ef60bee

        SHA256

        6c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4

        SHA512

        6c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e

      • C:\Users\Admin\AppData\Local\Temp\7zSC9BD.tmp\[email protected]\chrome.manifest
        Filesize

        35B

        MD5

        808d398d0ffdbee884c65643c27d04b5

        SHA1

        8a8d43529814879e4f33889517829624c293bf83

        SHA256

        4f589edf9f880e33d032b80fe95bb2d2b7f3fa896f24ef0b73e85a55b81ce24e

        SHA512

        49bed7c6d41ec40786cbbd5f8e9050728ca1bb02ad799ccd7f2096b3bae2541ec20f09e3b4a9e26da96d8d7eaf09aeff426ddfbc4da327b6b5bfdf20203baace

      • C:\Users\Admin\AppData\Local\Temp\7zSC9BD.tmp\[email protected]\content\bg.js
        Filesize

        8KB

        MD5

        9b4a87223138f185fdd156725577faec

        SHA1

        25734da51f591fff59ca8289480d6a7add25dc4b

        SHA256

        3a8f0058f68d3376f5125794294bab32eae41ad6b489499c53460b0a0d0e31db

        SHA512

        9fc9a444effe703de60c91c26dca5f7fcb49fdb4dc0fa4894aa73cecf2a1e103e62fba86c7a508dd50275df81fd2b8bc8f4231316a712134190f6d7a14b3c454

      • C:\Users\Admin\AppData\Local\Temp\7zSC9BD.tmp\[email protected]\install.rdf
        Filesize

        598B

        MD5

        87e5cbfad0beb3ea4adacb8eb85612b2

        SHA1

        bdcbd498ef4d8404a4963077a8949b0f7a719298

        SHA256

        f3f8a72b5ec20e8cd7d5bcac122a317953f5e606e2529b2f8653fcbd786e0070

        SHA512

        9f2ff305b6b827997eeb51b2ab3fa89220d35880c369d94648a5d9177ef560405b5a907f8c9e4acc29548c59a8011b5eedbac3791eed86db53bae3dd7fd46204

      • memory/1624-132-0x0000000000000000-mapping.dmp