Analysis

  • max time kernel
    105s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 07:27

General

  • Target

    917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe

  • Size

    3.0MB

  • MD5

    65f49288a70b3d7b69d82e1feeafb2f4

  • SHA1

    0ffef7e980331930c45d341a87c20705ea8a3360

  • SHA256

    917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3

  • SHA512

    981707c177f294b9270f42d72151940708381087b6b0d2fbacc8bb4955e1e2996f9463c9b8378f2c83af4c83f324ed3e0de64434dd971125e07af323c715dd27

  • SSDEEP

    49152:mjlv2h3YZUZeHDgzlcBwb9gs8cjdk2+AAi/TcWsNkLLfy/AHi6y:iv2FI+ecJcBwJgs8ca2aWZHy/A

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs 4 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 3 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 8 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Program Files directory 8 IoCs
  • Modifies Internet Explorer settings 1 TTPs 8 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe
    "C:\Users\Admin\AppData\Local\Temp\917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe"
    1⤵
    • Loads dropped DLL
    • Drops Chrome extension
    • Installs/modifies Browser Helper Object
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1284
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32.exe /s "C:\Program Files (x86)\cosstminn\04I.x64.dll"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1716
      • C:\Windows\system32\regsvr32.exe
        /s "C:\Program Files (x86)\cosstminn\04I.x64.dll"
        3⤵
        • Registers COM server for autorun
        • Loads dropped DLL
        • Installs/modifies Browser Helper Object
        • Modifies Internet Explorer settings
        • Modifies registry class
        PID:740

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\cosstminn\04I.dat
    Filesize

    4KB

    MD5

    de368bd34dc36ce41711a49001481fa7

    SHA1

    b91011d79f7ab077941ea70374f725389c981a7e

    SHA256

    48c1e087fb793d93a79d7e516aa9cdc6ff58d2fa393895a5c5f67820771c0d7f

    SHA512

    528d7235f80b2f52d476fca1db30933b098f416080511e4c436b58fca2f112c5216d237ca9c605c5be53d258c5bcb75a888dfb0698519669e5c4e3d52cf920a6

  • C:\Program Files (x86)\cosstminn\04I.tlb
    Filesize

    3KB

    MD5

    596b14afa3a4cf4a24f570f58c5bf9dc

    SHA1

    5283fef61f1129881eb5f49c8058381ef2205054

    SHA256

    f91335a2720866f56454e5121b50ec26c88fb2b7545c07a1090119cdf79d2e17

    SHA512

    81303f8baed9043e7a2cbeb891b9742e8db284e10a229fc6e46a99f4e239da616c5223f2d400b74c4bfd9b937a8c882b5cf98aa8b46943d8deb2a3e06b4c1c2d

  • C:\Program Files (x86)\cosstminn\04I.x64.dll
    Filesize

    684KB

    MD5

    5b557ca9bc92357eb76a8c576df86e6d

    SHA1

    a66eecc091839bd0b6617f8332c35924f75c768c

    SHA256

    29cd1cde949335d2d55629992320462479188f220e973dbf844d8ac47aef4bb5

    SHA512

    d5bea462fd63ccfe590713b591608a358f356539309194c215975b597e366ef42044f6481b7ca8cc748dc6552d63e1e838ac977e2c120851b20986c1115e0b2e

  • \Program Files (x86)\cosstminn\04I.dll
    Filesize

    606KB

    MD5

    d0a9fd704266fb372807507df74c4101

    SHA1

    ec68536756c4af9d1f272077641be746bcb45394

    SHA256

    c4488056716132ddbc950f968acc358dc0b0973e6b5d3afd4fe5f7dc037dde2d

    SHA512

    d78e6600a9711dc21a6e086b8db713eb12d671052e543c16a74f12daeb97e12ec7c5ed9d39813882bcba5c6131af943115bcc35e68b891d5f59349e085ef24f7

  • \Program Files (x86)\cosstminn\04I.x64.dll
    Filesize

    684KB

    MD5

    5b557ca9bc92357eb76a8c576df86e6d

    SHA1

    a66eecc091839bd0b6617f8332c35924f75c768c

    SHA256

    29cd1cde949335d2d55629992320462479188f220e973dbf844d8ac47aef4bb5

    SHA512

    d5bea462fd63ccfe590713b591608a358f356539309194c215975b597e366ef42044f6481b7ca8cc748dc6552d63e1e838ac977e2c120851b20986c1115e0b2e

  • \Program Files (x86)\cosstminn\04I.x64.dll
    Filesize

    684KB

    MD5

    5b557ca9bc92357eb76a8c576df86e6d

    SHA1

    a66eecc091839bd0b6617f8332c35924f75c768c

    SHA256

    29cd1cde949335d2d55629992320462479188f220e973dbf844d8ac47aef4bb5

    SHA512

    d5bea462fd63ccfe590713b591608a358f356539309194c215975b597e366ef42044f6481b7ca8cc748dc6552d63e1e838ac977e2c120851b20986c1115e0b2e

  • memory/740-81-0x000007FEFBB31000-0x000007FEFBB33000-memory.dmp
    Filesize

    8KB

  • memory/740-80-0x0000000000000000-mapping.dmp
  • memory/1284-70-0x00000000006D2000-0x00000000006D6000-memory.dmp
    Filesize

    16KB

  • memory/1284-66-0x00000000006D2000-0x00000000006D6000-memory.dmp
    Filesize

    16KB

  • memory/1284-68-0x00000000006D2000-0x00000000006D6000-memory.dmp
    Filesize

    16KB

  • memory/1284-69-0x00000000006D2000-0x00000000006D6000-memory.dmp
    Filesize

    16KB

  • memory/1284-54-0x0000000075F51000-0x0000000075F53000-memory.dmp
    Filesize

    8KB

  • memory/1284-71-0x00000000006D2000-0x00000000006D6000-memory.dmp
    Filesize

    16KB

  • memory/1284-72-0x00000000006D2000-0x00000000006D6000-memory.dmp
    Filesize

    16KB

  • memory/1284-73-0x00000000006D2000-0x00000000006D6000-memory.dmp
    Filesize

    16KB

  • memory/1284-74-0x00000000006D2000-0x00000000006D6000-memory.dmp
    Filesize

    16KB

  • memory/1284-67-0x00000000006D2000-0x00000000006D6000-memory.dmp
    Filesize

    16KB

  • memory/1284-55-0x0000000000400000-0x00000000004A1000-memory.dmp
    Filesize

    644KB

  • memory/1284-65-0x00000000006D2000-0x00000000006D6000-memory.dmp
    Filesize

    16KB

  • memory/1284-64-0x00000000006D2000-0x00000000006D6000-memory.dmp
    Filesize

    16KB

  • memory/1284-63-0x00000000006D2000-0x00000000006D6000-memory.dmp
    Filesize

    16KB

  • memory/1284-62-0x00000000006D2000-0x00000000006D6000-memory.dmp
    Filesize

    16KB

  • memory/1284-61-0x00000000006D2000-0x00000000006D6000-memory.dmp
    Filesize

    16KB

  • memory/1284-60-0x00000000006D2000-0x00000000006D6000-memory.dmp
    Filesize

    16KB

  • memory/1716-76-0x0000000000000000-mapping.dmp