Analysis

  • max time kernel
    33s
  • max time network
    42s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 02:01

General

  • Target

    483da6729b8187e1e8b3348049d0947c949a51b67ac0e9dbd883d35671777e0b.exe

  • Size

    3.5MB

  • MD5

    3f9ba51bc38aa10851f0e9c38278ab6f

  • SHA1

    cb4c4a5c0f63fc13dafdbf8d195c3dedd3fd2854

  • SHA256

    483da6729b8187e1e8b3348049d0947c949a51b67ac0e9dbd883d35671777e0b

  • SHA512

    2a68e2550ae494ab35c60b2848e5732a16cb7b0aa5c335c8596bc8be71e4372db608fceb126b8ea0bab79b3be1944ad7cc7f85604d6db7244d2090fc4bb3c754

  • SSDEEP

    98304:NxsG2XEqY3veKmr1U+yoyGaCR0mWJ+bgZs9DQ44s0:NWhRUfCR0mWJsghs

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs 4 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 3 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 8 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Program Files directory 8 IoCs
  • Modifies Internet Explorer settings 1 TTPs 8 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\483da6729b8187e1e8b3348049d0947c949a51b67ac0e9dbd883d35671777e0b.exe
    "C:\Users\Admin\AppData\Local\Temp\483da6729b8187e1e8b3348049d0947c949a51b67ac0e9dbd883d35671777e0b.exe"
    1⤵
    • Loads dropped DLL
    • Drops Chrome extension
    • Installs/modifies Browser Helper Object
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1672
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32.exe /s "C:\Program Files (x86)\SmartOnes\WkUh1GNQgrFjwE.x64.dll"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1092
      • C:\Windows\system32\regsvr32.exe
        /s "C:\Program Files (x86)\SmartOnes\WkUh1GNQgrFjwE.x64.dll"
        3⤵
        • Registers COM server for autorun
        • Loads dropped DLL
        • Installs/modifies Browser Helper Object
        • Modifies Internet Explorer settings
        • Modifies registry class
        PID:1188

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\SmartOnes\WkUh1GNQgrFjwE.dat
    Filesize

    3KB

    MD5

    f68b243a1bc6a98e02eeb87d223b81ab

    SHA1

    d9ef54c2e780690c81ec37115b3342184abd7a4e

    SHA256

    de69ea4e0354342ee579bd177a999a9b1f1c32b128284dce117478540dd367fb

    SHA512

    779fcc469fa16f9dfd2cbbf8d52d08a3367d4ffc1d4b5d3bba48127731f69ae87b799dc28e5fe87ead1410c164da499d96b5e16601d36d23f29720155eb464ae

  • C:\Program Files (x86)\SmartOnes\WkUh1GNQgrFjwE.tlb
    Filesize

    3KB

    MD5

    d5c4233a6c3de331b459f5f6a35ae3dd

    SHA1

    b5f1bf145f4e0896d7ae500abecbfaca715c18ab

    SHA256

    f3fca93b2a2848af13dcd30cad6305d20319d0a96f622f96753c1aebb91c885c

    SHA512

    4af48daa80dcd76cf45018d7edef74f35c5917457dd598f5a2071bba8875d75280326e41f3f5885d5301a596c22a3833cb062e2f4c97e0d83a01ad2644056e76

  • C:\Program Files (x86)\SmartOnes\WkUh1GNQgrFjwE.x64.dll
    Filesize

    693KB

    MD5

    c59945c3f5074d51077f2d598680aa11

    SHA1

    7d2ab4599f476d9da677283bdfcff5164a30b2e7

    SHA256

    10658a9b7ad99f84d73c77bde58761c89f37b1318f90197710d63824ae894b5b

    SHA512

    d3ccea87caba7d10776c0d4726b26cad81e85562270a1c873a59ab59a0d73336bae0af6cb6a242fb8f1b4cb4278636ed9995bd03f4f0b32d84a705e19a7b7e61

  • \Program Files (x86)\SmartOnes\WkUh1GNQgrFjwE.dll
    Filesize

    611KB

    MD5

    123fde8f1a45be2f971b36a8ae5457ef

    SHA1

    78f77c976bec0b388407f986e7866818512eec97

    SHA256

    12869f73fb78fcbb8876e10772d081890b19fd1e228dd83ca012416cf26e931e

    SHA512

    4ae3708e45e15a49e7ba1d338a9186ed47f41abe57727d57833a33be887043dcb950d02bc52f79ee414df0df56c3e87f213995fa222a6f0e1c659393860231d9

  • \Program Files (x86)\SmartOnes\WkUh1GNQgrFjwE.x64.dll
    Filesize

    693KB

    MD5

    c59945c3f5074d51077f2d598680aa11

    SHA1

    7d2ab4599f476d9da677283bdfcff5164a30b2e7

    SHA256

    10658a9b7ad99f84d73c77bde58761c89f37b1318f90197710d63824ae894b5b

    SHA512

    d3ccea87caba7d10776c0d4726b26cad81e85562270a1c873a59ab59a0d73336bae0af6cb6a242fb8f1b4cb4278636ed9995bd03f4f0b32d84a705e19a7b7e61

  • \Program Files (x86)\SmartOnes\WkUh1GNQgrFjwE.x64.dll
    Filesize

    693KB

    MD5

    c59945c3f5074d51077f2d598680aa11

    SHA1

    7d2ab4599f476d9da677283bdfcff5164a30b2e7

    SHA256

    10658a9b7ad99f84d73c77bde58761c89f37b1318f90197710d63824ae894b5b

    SHA512

    d3ccea87caba7d10776c0d4726b26cad81e85562270a1c873a59ab59a0d73336bae0af6cb6a242fb8f1b4cb4278636ed9995bd03f4f0b32d84a705e19a7b7e61

  • memory/1092-61-0x0000000000000000-mapping.dmp
  • memory/1188-65-0x0000000000000000-mapping.dmp
  • memory/1188-66-0x000007FEFBC01000-0x000007FEFBC03000-memory.dmp
    Filesize

    8KB

  • memory/1672-54-0x0000000075BD1000-0x0000000075BD3000-memory.dmp
    Filesize

    8KB

  • memory/1672-55-0x0000000002670000-0x0000000002715000-memory.dmp
    Filesize

    660KB