Analysis

  • max time kernel
    34s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 21:21

General

  • Target

    a329ee4439064c0cc49eb11044572299a7cde977778c2e354c142e4fbc7ac088.exe

  • Size

    920KB

  • MD5

    5bbf263b4797abcee4de215dd40aecbb

  • SHA1

    97497bc2395bc9851bce4cd00670b43096c61c28

  • SHA256

    a329ee4439064c0cc49eb11044572299a7cde977778c2e354c142e4fbc7ac088

  • SHA512

    bb14a3f3e4e9b76c5927b2d2b0188933b2e9a1fbc2de3c1861e3ac6b9d4ddb8c3d751bbb84ebb6aee8923a9801e4ceff52a5a83f6ca3ad93f1d337816c98d2c0

  • SSDEEP

    24576:h1OYdaOHMtdHAqcdDVhYwiei7+EpFAh/kKZ:h1OsmPHVmVhYwiLtKkKZ

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 3 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a329ee4439064c0cc49eb11044572299a7cde977778c2e354c142e4fbc7ac088.exe
    "C:\Users\Admin\AppData\Local\Temp\a329ee4439064c0cc49eb11044572299a7cde977778c2e354c142e4fbc7ac088.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1088
    • C:\Users\Admin\AppData\Local\Temp\7zS6069.tmp\b4nkZSAJBs2VFUm.exe
      .\b4nkZSAJBs2VFUm.exe
      2⤵
      • Executes dropped EXE
      • Drops Chrome extension
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2032

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7zS6069.tmp\[email protected]\bootstrap.js
    Filesize

    2KB

    MD5

    df13f711e20e9c80171846d4f2f7ae06

    SHA1

    56d29cda58427efe0e21d3880d39eb1b0ef60bee

    SHA256

    6c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4

    SHA512

    6c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e

  • C:\Users\Admin\AppData\Local\Temp\7zS6069.tmp\[email protected]\chrome.manifest
    Filesize

    35B

    MD5

    3fb4af1b7e8a6121550be918ffb06cf7

    SHA1

    2673444934587a21bd5b2129163ac821a6e64e20

    SHA256

    6f4f279d34db2cda75cd2ab27f9a92f262f879bc519c797cb988f2ef86e2fe2c

    SHA512

    eb05b677fc93c892e2f231a14986418651e8bf9bfaac79bbfbde002ea014918b25c182081d7aaec1f1fc1ddce8e73307141efe5572dac073f1f24b3fbd7bb7bb

  • C:\Users\Admin\AppData\Local\Temp\7zS6069.tmp\[email protected]\content\bg.js
    Filesize

    8KB

    MD5

    bb7464213deacc4763a07e58271da38e

    SHA1

    ca44ee1b2884e5379a9fd0d8b6d68863451785b2

    SHA256

    4c29ef2c31e4058af824f219d6f5fa96131cd57488e293aa44ceb83abd88ef8b

    SHA512

    c403d99a8521f03b9ff5b785fb6ea5bd7f917eeab1e09456931523b3f91ac9fc977b3b4170e1d56f9e526e39ec878b46347c9b23a21ee20be18221ff5db634f0

  • C:\Users\Admin\AppData\Local\Temp\7zS6069.tmp\[email protected]\install.rdf
    Filesize

    595B

    MD5

    da4daa6dc8b1e81d34cedb78e71b3b3a

    SHA1

    039b035157d0aa608f621cd0b2a59f64868e62d3

    SHA256

    6d55be6bbf826e0728ae532f3e48324d08910c2b6f838e91758a567dc40204b2

    SHA512

    8e98f2b596704c5c54c9866e64642813a4aa926680be94aa284ec63b811d2941ce88b1ae776d6909ecbe4fd3d8d134b4e67b9339458027ad9300865dfa056d51

  • C:\Users\Admin\AppData\Local\Temp\7zS6069.tmp\b4nkZSAJBs2VFUm.dat
    Filesize

    1KB

    MD5

    f0aa96aed46542c7df84e34108a34e75

    SHA1

    c89a68a8879cab82d7125ade72703bc7d377b677

    SHA256

    4b7024d495bd9f2a0b51305a617f5d0d86495627b3b30301a26df35d68d4e045

    SHA512

    c8044d974b76735d3abe529d2af51b847a6126ca7045de1c9a2b2ad21e32220a44cd8a4d2cab6e6ca9112842e5cefa634ed9b279140c18bba75874b752372ed2

  • C:\Users\Admin\AppData\Local\Temp\7zS6069.tmp\b4nkZSAJBs2VFUm.exe
    Filesize

    760KB

    MD5

    dcd148f6f3af3e3b0935c4fcc9f41811

    SHA1

    ee9bdbc7c568c7832d90b85921ab20030b6734cd

    SHA256

    f8689641199c6fc430121797965485d95abfbc430753e0e668817ab3b511a1e4

    SHA512

    34be8e60dc2decf8287a71516f359e80bb858ce52218dde1b01c821c9b95be38821f068b79b0da8dbe90865560e7ddab77b25e3971dda9be667fb3ae8f174886

  • C:\Users\Admin\AppData\Local\Temp\7zS6069.tmp\poaphncpgffdfemhlblepcgjnebbjkjk\CRePsXn9.js
    Filesize

    6KB

    MD5

    575ea1f0ef46e4f803e1373303859b30

    SHA1

    7362cd399749f09501495627553ca237f75f13db

    SHA256

    e0b6a5c9812aca668c15ca30f5f5868ac1a66e4152551a1dd756576c095f787c

    SHA512

    6c9507cfe02a40eeb69347965cb7aade5c6ba0da9b73dafbd6adab80c545b581792b197abe8223ef31553e6c07a4d5f0d4417b925c7a3a3f0c1e776e0132f8e5

  • C:\Users\Admin\AppData\Local\Temp\7zS6069.tmp\poaphncpgffdfemhlblepcgjnebbjkjk\background.html
    Filesize

    145B

    MD5

    6179def8ae482c6dd91c7cac95662713

    SHA1

    f414b903c0c01cc5f8052450dc5bbe727941b2bc

    SHA256

    15cadd209251f27ba1ac44e8ebb67b6108af8da573428e5909d3c10972e6ebea

    SHA512

    f7bb14cdea16d1a85de83063881d2697c365dde9f5d6a496a7a664b4ef02a66b2ff91cd9d767c4d4372a5c9c9f4076f74ab2f32e1e912af39c002636cc97e477

  • C:\Users\Admin\AppData\Local\Temp\7zS6069.tmp\poaphncpgffdfemhlblepcgjnebbjkjk\content.js
    Filesize

    144B

    MD5

    fca19198fd8af21016a8b1dec7980002

    SHA1

    fd01a47d14004e17a625efe66cc46a06c786cf40

    SHA256

    332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a

    SHA512

    60f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47

  • C:\Users\Admin\AppData\Local\Temp\7zS6069.tmp\poaphncpgffdfemhlblepcgjnebbjkjk\lsdb.js
    Filesize

    531B

    MD5

    36d98318ab2b3b2585a30984db328afb

    SHA1

    f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5

    SHA256

    ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7

    SHA512

    6f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a

  • C:\Users\Admin\AppData\Local\Temp\7zS6069.tmp\poaphncpgffdfemhlblepcgjnebbjkjk\manifest.json
    Filesize

    498B

    MD5

    640199ea4621e34510de919f6a54436f

    SHA1

    dc65dbfad02bd2688030bd56ca1cab85917a9937

    SHA256

    e4aa7c089e32d14ddf584e9de6d007ec16581cd30c248ff7284bc0eb7757d4af

    SHA512

    d64bc524d6df7c4c21a5ddfb0e6636317482ef4dc28006bd0a38d5e26c2db75626f216143026bf8acf3baa11d86c278e902c78afad4f806ca36f9e54bc75ff0a

  • \Users\Admin\AppData\Local\Temp\7zS6069.tmp\b4nkZSAJBs2VFUm.exe
    Filesize

    760KB

    MD5

    dcd148f6f3af3e3b0935c4fcc9f41811

    SHA1

    ee9bdbc7c568c7832d90b85921ab20030b6734cd

    SHA256

    f8689641199c6fc430121797965485d95abfbc430753e0e668817ab3b511a1e4

    SHA512

    34be8e60dc2decf8287a71516f359e80bb858ce52218dde1b01c821c9b95be38821f068b79b0da8dbe90865560e7ddab77b25e3971dda9be667fb3ae8f174886

  • memory/1088-54-0x0000000076681000-0x0000000076683000-memory.dmp
    Filesize

    8KB

  • memory/2032-56-0x0000000000000000-mapping.dmp