Analysis
-
max time kernel
375s -
max time network
394s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 21:00
Static task
static1
Behavioral task
behavioral1
Sample
aa2c4b678d0f042bebaa8c5e174bdbbf30d52ad3dc8e364fdafe1a6883971607.exe
Resource
win7-20220901-en
General
-
Target
aa2c4b678d0f042bebaa8c5e174bdbbf30d52ad3dc8e364fdafe1a6883971607.exe
-
Size
2.5MB
-
MD5
d4c27fb54ccf8504ac729f72eaa28148
-
SHA1
4b2781cb4904a53eccc39a5e8bf5bbd8340f61d6
-
SHA256
aa2c4b678d0f042bebaa8c5e174bdbbf30d52ad3dc8e364fdafe1a6883971607
-
SHA512
9409866e879bb5d172f696bdbef8860ca5895a4e47769cac692c78a73ac0edddc75fe108761c446da9f6d296a4df245da28a79603c4bd68dc52ad900af54ac65
-
SSDEEP
49152:h1OsSIPtchP5IawtcvlV3COH8qA0OOMC1gqEaejGfru:h1OTIPtrkvlBCOHgBC6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
pkiGUSLtyFphXq0.exepid process 3412 pkiGUSLtyFphXq0.exe -
Loads dropped DLL 1 IoCs
Processes:
pkiGUSLtyFphXq0.exepid process 3412 pkiGUSLtyFphXq0.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops Chrome extension 5 IoCs
Processes:
pkiGUSLtyFphXq0.exedescription ioc process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\kdkninindehjliofiojblhiafnpgjeeh\5.2\manifest.json pkiGUSLtyFphXq0.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\kdkninindehjliofiojblhiafnpgjeeh\5.2\manifest.json pkiGUSLtyFphXq0.exe File created C:\Users\DefaultAccount\AppData\Local\Google\Chrome\User Data\Default\Extensions\kdkninindehjliofiojblhiafnpgjeeh\5.2\manifest.json pkiGUSLtyFphXq0.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\kdkninindehjliofiojblhiafnpgjeeh\5.2\manifest.json pkiGUSLtyFphXq0.exe File created C:\Users\WDAGUtilityAccount\AppData\Local\Google\Chrome\User Data\Default\Extensions\kdkninindehjliofiojblhiafnpgjeeh\5.2\manifest.json pkiGUSLtyFphXq0.exe -
Installs/modifies Browser Helper Object 2 TTPs 4 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
pkiGUSLtyFphXq0.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} pkiGUSLtyFphXq0.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA} pkiGUSLtyFphXq0.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects pkiGUSLtyFphXq0.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ pkiGUSLtyFphXq0.exe -
Drops file in Program Files directory 8 IoCs
Processes:
pkiGUSLtyFphXq0.exedescription ioc process File opened for modification C:\Program Files (x86)\PriceLess\o0tknTdr49wsTN.dat pkiGUSLtyFphXq0.exe File created C:\Program Files (x86)\PriceLess\o0tknTdr49wsTN.x64.dll pkiGUSLtyFphXq0.exe File opened for modification C:\Program Files (x86)\PriceLess\o0tknTdr49wsTN.x64.dll pkiGUSLtyFphXq0.exe File created C:\Program Files (x86)\PriceLess\o0tknTdr49wsTN.dll pkiGUSLtyFphXq0.exe File opened for modification C:\Program Files (x86)\PriceLess\o0tknTdr49wsTN.dll pkiGUSLtyFphXq0.exe File created C:\Program Files (x86)\PriceLess\o0tknTdr49wsTN.tlb pkiGUSLtyFphXq0.exe File opened for modification C:\Program Files (x86)\PriceLess\o0tknTdr49wsTN.tlb pkiGUSLtyFphXq0.exe File created C:\Program Files (x86)\PriceLess\o0tknTdr49wsTN.dat pkiGUSLtyFphXq0.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pkiGUSLtyFphXq0.exepid process 3412 pkiGUSLtyFphXq0.exe 3412 pkiGUSLtyFphXq0.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
aa2c4b678d0f042bebaa8c5e174bdbbf30d52ad3dc8e364fdafe1a6883971607.exepkiGUSLtyFphXq0.exedescription pid process target process PID 5116 wrote to memory of 3412 5116 aa2c4b678d0f042bebaa8c5e174bdbbf30d52ad3dc8e364fdafe1a6883971607.exe pkiGUSLtyFphXq0.exe PID 5116 wrote to memory of 3412 5116 aa2c4b678d0f042bebaa8c5e174bdbbf30d52ad3dc8e364fdafe1a6883971607.exe pkiGUSLtyFphXq0.exe PID 5116 wrote to memory of 3412 5116 aa2c4b678d0f042bebaa8c5e174bdbbf30d52ad3dc8e364fdafe1a6883971607.exe pkiGUSLtyFphXq0.exe PID 3412 wrote to memory of 5092 3412 pkiGUSLtyFphXq0.exe regsvr32.exe PID 3412 wrote to memory of 5092 3412 pkiGUSLtyFphXq0.exe regsvr32.exe PID 3412 wrote to memory of 5092 3412 pkiGUSLtyFphXq0.exe regsvr32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa2c4b678d0f042bebaa8c5e174bdbbf30d52ad3dc8e364fdafe1a6883971607.exe"C:\Users\Admin\AppData\Local\Temp\aa2c4b678d0f042bebaa8c5e174bdbbf30d52ad3dc8e364fdafe1a6883971607.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\7zS2363.tmp\pkiGUSLtyFphXq0.exe.\pkiGUSLtyFphXq0.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\PriceLess\o0tknTdr49wsTN.x64.dll"3⤵PID:5092
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
747KB
MD5075a34d90e4395f320b3266b2a6cc2c0
SHA1c04c7386f13b45f5cc8424109d369e1e2427e5ec
SHA25682550996793875d5d60d0479968dd63ff127ac705aca610110bc3f6ca127e8dc
SHA5122618fb83c62bfd2ea6925d15417a86144d0133c1db3d6020b93ff6bac19adf47c1d31a10fcc31010e0fd6c2bd6f0a4537763715c57b74ad094ce8d6aedbf896a
-
Filesize
5KB
MD52b35ebdbf8b5ae4fcfc712f5b6289f00
SHA1b4c4b79746308d34471cb83613112accf6bbea13
SHA256a01ed53154f903db625506cf11086b7f7d9a0a37963e417f69856495d8930e38
SHA51205c069bc38e9bb8d44b5311661c1719b892e2f349a3373b103a827df021c987e4d233a27dbcd2a2b7ad46a8dd69eb77a9f9ad5d3e99dba9c9e79d6b685a0ef9d
-
Filesize
139B
MD510a8150c2594331c51012995a405a3fb
SHA19db0372afe1cb4c35980bd78e23a49478e9c8b9b
SHA256b972db0453032ea7effd1128a5765bec90b46b48da59f67ae2d5134b91bb5d85
SHA512bf940a26dc8436c61c783eb1c810f50501c5fec5fae03e7eb7cdd28ae8e11caeb58da53ffe63b5972ae4be58c8e2b6c2b03fc116cbfecb9a0ccf97ec51941c86
-
Filesize
144B
MD5fca19198fd8af21016a8b1dec7980002
SHA1fd01a47d14004e17a625efe66cc46a06c786cf40
SHA256332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a
SHA51260f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47
-
Filesize
531B
MD536d98318ab2b3b2585a30984db328afb
SHA1f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5
SHA256ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7
SHA5126f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a
-
Filesize
501B
MD59d9d74bfa8e9ace025b834b96419d05e
SHA1f5e56a100b0208b88335859cec692d867ffb572b
SHA256a54dc66b61256c08f2bf60f507673814d263effe532fd8e6e1e1d662eca1d265
SHA5124c8b216a781da9d366d5ea49e66dda6313c1f12947e59119782d14fe07ffa2db9de5b4e818f6e58088dd90f167ac8168796887676e0eacf7a86d2c9f7c3c1512
-
Filesize
747KB
MD5075a34d90e4395f320b3266b2a6cc2c0
SHA1c04c7386f13b45f5cc8424109d369e1e2427e5ec
SHA25682550996793875d5d60d0479968dd63ff127ac705aca610110bc3f6ca127e8dc
SHA5122618fb83c62bfd2ea6925d15417a86144d0133c1db3d6020b93ff6bac19adf47c1d31a10fcc31010e0fd6c2bd6f0a4537763715c57b74ad094ce8d6aedbf896a
-
Filesize
3KB
MD580b66ebf00d9d7c1904175c81cf3b1e1
SHA125edfc73c30f45e1254ddec9bdc5854d0f5c3c1b
SHA2565691ef6a5460131e8fbebeed40d4f0fb81ff49e25a08d45df2178bb8d486672a
SHA512396db976a5a56df11be3f46e16908341b33be7b374c92674550a563885012c056b7213ab873745e98bf4681bf12882632260363c578105decda25a2d249fdb9d
-
Filesize
881KB
MD58cb4c5980306da615fd3a3c0b7124d95
SHA104c3ab5e547e3644e8627f9a548a56c112792499
SHA256ce12f2e485306ea9a8bd019ffd6a62d846259bac4ba0ec71d81b43ab32470d43
SHA5121852f4cf028c72869f215a8efff6c7244e2c67cde1230eb633a0d700fce957774dade7a50fcd7b760f395b3e242a5701ab88496e5551f778d208bcf182e0bedf
-
Filesize
6KB
MD5916f77b3b00667398f45a0d979761345
SHA1dd37dfa7f0874480ed3ba8b887e09a7ad74eaf0a
SHA256be823223cecb7a61199e18bb3cf5c7c7daebc8faf04f1cd3ea804c14bf90b0c8
SHA512c023a38a6dfc4cbe65fe1dcb3292697516a50f94af088fed6025920abbed84955f1c11c588c9072004ede2c44233c663b67b0235b071993f336a843ef87aa8e9
-
Filesize
787KB
MD57b2176326be202922b35e876bab7ff83
SHA1e7e8a0feb3fd78413b5c6d636a72bd28254bcea8
SHA256292a3ad5628c78a7956e3ff9e30e484453ca674ced5a37894415eef1055051c4
SHA512369d238f1118fe730bb49e44058999e0afca237d722ac68e3272c8e9ad27e97c368c8380f7d0c35a233ad44341e4f368fdb8a385f9b82789c1266a9b0024dd69
-
Filesize
787KB
MD57b2176326be202922b35e876bab7ff83
SHA1e7e8a0feb3fd78413b5c6d636a72bd28254bcea8
SHA256292a3ad5628c78a7956e3ff9e30e484453ca674ced5a37894415eef1055051c4
SHA512369d238f1118fe730bb49e44058999e0afca237d722ac68e3272c8e9ad27e97c368c8380f7d0c35a233ad44341e4f368fdb8a385f9b82789c1266a9b0024dd69
-
C:\Users\Admin\AppData\Local\Temp\7zS2363.tmp\[email protected]\bootstrap.js
Filesize2KB
MD5df13f711e20e9c80171846d4f2f7ae06
SHA156d29cda58427efe0e21d3880d39eb1b0ef60bee
SHA2566c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4
SHA5126c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e
-
C:\Users\Admin\AppData\Local\Temp\7zS2363.tmp\[email protected]\chrome.manifest
Filesize35B
MD530e90fdd9f3e008ed4103c75f477c85f
SHA1f99b54ad2422f865e90d15661992de7f2d6d1030
SHA256e5710362b476485c2ec343d62057081988af178ee307936139cc5bff430c57d5
SHA5129419332baef0088aad8760220ebe2415da7708947233d4a3d5a766e02bd319c5ae9549af81fd146ac5e33717978e3647beb953bb0405f2aa1c94e9f4594c946f
-
C:\Users\Admin\AppData\Local\Temp\7zS2363.tmp\[email protected]\content\bg.js
Filesize7KB
MD56b4f899aca826377546a1194ed27e21e
SHA17bcae43bf79207eaae3a090e2bb0bc2c6486588f
SHA256d8fbb42ee5334e100e01ae36b5f6ee7e5ccf9fa40c297a1ced1f9952ad846090
SHA512d40a4918184f57c6b34d320fb5263c32fe529413cbfa2efca218ad6ab9e77877cc0c1535ff08e093e404fbdb086f1071d91127609945af4d67e84600d4e626b9
-
C:\Users\Admin\AppData\Local\Temp\7zS2363.tmp\[email protected]\install.rdf
Filesize594B
MD50186c841c49af0e5091745fc496db1bf
SHA11d944dd8d3253ddc6b0f8b83222d83fc68683a28
SHA2567eea9c81984878b6e56a7c88925894172958a3530aa97cb0caedaf948ee99129
SHA5125a97369ac87ef95cc1cb05718749fa0a2eb05d2eaf5df4add76c0ee70b45e08c70c42513242af3f296940e02c6c66a7f463624f5d3e14eaaa0b7321b9a417de7