Analysis
-
max time kernel
59s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 06:49
Static task
static1
Behavioral task
behavioral1
Sample
ef4bddcebf517563f2e0d1791557c3757950e79b3e33fa786a203c1182dca768.exe
Resource
win7-20221111-en
General
-
Target
ef4bddcebf517563f2e0d1791557c3757950e79b3e33fa786a203c1182dca768.exe
-
Size
2.3MB
-
MD5
700be8dd95ea48a80417ad96c6f5f8d6
-
SHA1
844d1f88844996fc3fc46cfa2e9806e5daf13326
-
SHA256
ef4bddcebf517563f2e0d1791557c3757950e79b3e33fa786a203c1182dca768
-
SHA512
777c50c142c57ed3eed0881607171bb03ca0eae329df17288af3d39ed6643e345b5e8c0544350aec9216143baf50e63b5dd49cae06399ff07e4e11340fde282a
-
SSDEEP
49152:BHp1bPiRwA0aPdc1kEvoe6txJ6Wf7XzoY2:16JahortxJlD
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 3 IoCs
Processes:
ef4bddcebf517563f2e0d1791557c3757950e79b3e33fa786a203c1182dca768.exedescription ioc process File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\lhbmojliagbancdcmookpmaaoipjifmc\124\manifest.json ef4bddcebf517563f2e0d1791557c3757950e79b3e33fa786a203c1182dca768.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\lhbmojliagbancdcmookpmaaoipjifmc\124\manifest.json ef4bddcebf517563f2e0d1791557c3757950e79b3e33fa786a203c1182dca768.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\lhbmojliagbancdcmookpmaaoipjifmc\124\manifest.json ef4bddcebf517563f2e0d1791557c3757950e79b3e33fa786a203c1182dca768.exe