Analysis

  • max time kernel
    42s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 07:24

General

  • Target

    994a3fb6384c2afe995dadf11d72bae354e7739aead0bcc60a1363764818e9e5.exe

  • Size

    4.0MB

  • MD5

    0c93c54fb32cac93599996495d5895d0

  • SHA1

    94e63e9104870793ced59d1155d43b54f906cb42

  • SHA256

    994a3fb6384c2afe995dadf11d72bae354e7739aead0bcc60a1363764818e9e5

  • SHA512

    b907a67c653a173b0ebb7bdb6d4c5cbd5bc19778753fa356cd3cd8b01e4cd3dc8edd2c0fe7629000e20e69e2b0b93c3158ed582752c9695c133ad1bcbe7a0c9b

  • SSDEEP

    98304:DupCXNupABoDEKISSCCG3Kpg9PPtfRzz+dA:DaCa/P

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs 4 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 3 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 8 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Program Files directory 8 IoCs
  • Modifies Internet Explorer settings 1 TTPs 8 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\994a3fb6384c2afe995dadf11d72bae354e7739aead0bcc60a1363764818e9e5.exe
    "C:\Users\Admin\AppData\Local\Temp\994a3fb6384c2afe995dadf11d72bae354e7739aead0bcc60a1363764818e9e5.exe"
    1⤵
    • Loads dropped DLL
    • Drops Chrome extension
    • Installs/modifies Browser Helper Object
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1080
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32.exe /s "C:\Program Files (x86)\TinyuWAllet\Tu2rCImMxqIX9B.x64.dll"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1464
      • C:\Windows\system32\regsvr32.exe
        /s "C:\Program Files (x86)\TinyuWAllet\Tu2rCImMxqIX9B.x64.dll"
        3⤵
        • Registers COM server for autorun
        • Loads dropped DLL
        • Installs/modifies Browser Helper Object
        • Modifies Internet Explorer settings
        • Modifies registry class
        PID:1280

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\TinyuWAllet\Tu2rCImMxqIX9B.dat
    Filesize

    4KB

    MD5

    651bbd6c254fda9af205c99dad782b39

    SHA1

    2f2b6027654b13845a0fe3ddb296d49315728ee3

    SHA256

    d2a0e35980b353c0e375a012d513d58ea4641f10caed8160c0fb290265360617

    SHA512

    e8129190b6749b36d8619ce4ab290879e7bef2feb4a25314291191def66062bf62b43d8fd895518bc4fe01e21a8cd1e9e89f3043b84511597e203c156f85d974

  • C:\Program Files (x86)\TinyuWAllet\Tu2rCImMxqIX9B.tlb
    Filesize

    3KB

    MD5

    f97b95a2c07b6c926106d4e9e110f93b

    SHA1

    6b76b71705374f84d81add54fad98b6fccd78c69

    SHA256

    3dca6f9ef4c0fa2d4511ee991298a97b5847720161efb3388b5dfe28694a0a97

    SHA512

    8d2b262861d126af9874c63e890b7f963a5823825ac4479e7ea917bf6ba1bbc49ec5d7da1c0cfa79deac6ae763be38799b99e76cbe744efd9d4cc018549f225c

  • C:\Program Files (x86)\TinyuWAllet\Tu2rCImMxqIX9B.x64.dll
    Filesize

    701KB

    MD5

    b30d08f15639c7642e6bba8187911fe9

    SHA1

    6f79350773fde83fef1b82607da0835d01a27e2a

    SHA256

    e13f07d2edc163c163511604bd7e94068839f8b39f1f14f2ed048b84a2a47954

    SHA512

    a1c350a84992d9d7ca245a0cb06150b4fddadcca3c4d9a80368c07454c35972a5beea5fb8fcecafbdf2ad9f694b68d85724c3b7476c2c52280832f35b06d852a

  • \Program Files (x86)\TinyuWAllet\Tu2rCImMxqIX9B.dll
    Filesize

    622KB

    MD5

    8a05c343e6e5fed3c750b3d9d0066ebb

    SHA1

    22d39fe1637510c4468e9c69081f288a107b8da1

    SHA256

    4acb52ac42bd0fd0e98752d4b0c24f1922f7baf7449b88c3c431958c374b8392

    SHA512

    35e3eecbb0dbc125e0dace43cba58151b5fbb6bc627075674195ca7fe2a577f3662fc969e9b1eb3aed1ca2028c16ef36b95dec27b4fe44e7f8ded1d3d78e12d1

  • \Program Files (x86)\TinyuWAllet\Tu2rCImMxqIX9B.x64.dll
    Filesize

    701KB

    MD5

    b30d08f15639c7642e6bba8187911fe9

    SHA1

    6f79350773fde83fef1b82607da0835d01a27e2a

    SHA256

    e13f07d2edc163c163511604bd7e94068839f8b39f1f14f2ed048b84a2a47954

    SHA512

    a1c350a84992d9d7ca245a0cb06150b4fddadcca3c4d9a80368c07454c35972a5beea5fb8fcecafbdf2ad9f694b68d85724c3b7476c2c52280832f35b06d852a

  • \Program Files (x86)\TinyuWAllet\Tu2rCImMxqIX9B.x64.dll
    Filesize

    701KB

    MD5

    b30d08f15639c7642e6bba8187911fe9

    SHA1

    6f79350773fde83fef1b82607da0835d01a27e2a

    SHA256

    e13f07d2edc163c163511604bd7e94068839f8b39f1f14f2ed048b84a2a47954

    SHA512

    a1c350a84992d9d7ca245a0cb06150b4fddadcca3c4d9a80368c07454c35972a5beea5fb8fcecafbdf2ad9f694b68d85724c3b7476c2c52280832f35b06d852a

  • memory/1080-54-0x0000000076411000-0x0000000076413000-memory.dmp
    Filesize

    8KB

  • memory/1080-55-0x00000000029F0000-0x0000000002A94000-memory.dmp
    Filesize

    656KB

  • memory/1280-65-0x0000000000000000-mapping.dmp
  • memory/1280-66-0x000007FEFBFE1000-0x000007FEFBFE3000-memory.dmp
    Filesize

    8KB

  • memory/1464-61-0x0000000000000000-mapping.dmp