Analysis

  • max time kernel
    44s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 13:47

General

  • Target

    45f33b8774b796142853a333a7b0dd4ba11164088b6083aa29503dcfce8784d8.exe

  • Size

    4.2MB

  • MD5

    92e77ecc8b3446cc5ceaa34570f8e22d

  • SHA1

    744a9134fa9193e3f147cb5bc3443127264a610e

  • SHA256

    45f33b8774b796142853a333a7b0dd4ba11164088b6083aa29503dcfce8784d8

  • SHA512

    f0246a1e9f0c83af91ac7daa67cbdb439c861d7a5c20dbe4f0627f3099d689f33a789090b96b16a325850f9c7a5368203ed25f683723746886b7ff22c1be61b4

  • SSDEEP

    49152:Ef9Psd6+ukjWM9VkhUKjElJKvdvad4mF6rgTUKz4IGy7Z3IXALUBz2Zkh5qd6zjR:Ef86+vjWOVkhjEPpLoWwz

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs 4 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 3 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 8 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Program Files directory 8 IoCs
  • Modifies Internet Explorer settings 1 TTPs 8 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\45f33b8774b796142853a333a7b0dd4ba11164088b6083aa29503dcfce8784d8.exe
    "C:\Users\Admin\AppData\Local\Temp\45f33b8774b796142853a333a7b0dd4ba11164088b6083aa29503dcfce8784d8.exe"
    1⤵
    • Loads dropped DLL
    • Drops Chrome extension
    • Installs/modifies Browser Helper Object
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1816
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32.exe /s "C:\Program Files (x86)\SmartOnes\zjhgDmkDyYZoOL.x64.dll"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1640
      • C:\Windows\system32\regsvr32.exe
        /s "C:\Program Files (x86)\SmartOnes\zjhgDmkDyYZoOL.x64.dll"
        3⤵
        • Registers COM server for autorun
        • Loads dropped DLL
        • Installs/modifies Browser Helper Object
        • Modifies Internet Explorer settings
        • Modifies registry class
        PID:1224

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Browser Extensions

1
T1176

Defense Evasion

Modify Registry

3
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\SmartOnes\zjhgDmkDyYZoOL.dat
    Filesize

    3KB

    MD5

    912a91e2819a75da7966c5e41d56b746

    SHA1

    afe3660cedeaef3d7199d551d908a4793729e30d

    SHA256

    8132d81446ba2c798c751929c7c1ac6e32f8a8012b68d78336d36e05e96250c9

    SHA512

    201bbf90ca51e881d5618d64beb4542ab434c712f7da2886f8718e0a76e78aa0fc78a3b260b91159c286f82fcf00d364a2d7a187edbaf191452d165a9824dd04

  • C:\Program Files (x86)\SmartOnes\zjhgDmkDyYZoOL.tlb
    Filesize

    3KB

    MD5

    ae9748c3367ea620c3a8dbe47d83dce9

    SHA1

    7bb97dc9888b97d54e6175f15ac7b048d2313300

    SHA256

    973b96b4136addcd6af0b6df96f2eddfcf17d1cadfbdbf8b367117663c6b567a

    SHA512

    ad991f84204ebba792e9f178530c279c2d552ec946d64d69f783ccc430575ca1d1c3a215a50a9fcd93a1fa757b1cd16b4816b117046ceb879402b2dcf93cb948

  • C:\Program Files (x86)\SmartOnes\zjhgDmkDyYZoOL.x64.dll
    Filesize

    877KB

    MD5

    776ed176b19d4327bd967d470355dbc3

    SHA1

    0fa9fc06857aa34a92693be3326e82f1a9cec96d

    SHA256

    136060eef1040c355b1d5bc16821e8457d7b48e59a17097481a802027b1f3f27

    SHA512

    b1333a2b7d42f9df66da338b65b01260efc4371f7747919f606fb3c8707ed526b5ebbae60d8227e75614a33e7a86a2bbb9ba9bfe61713c3b8f1624330765ede0

  • \Program Files (x86)\SmartOnes\zjhgDmkDyYZoOL.dll
    Filesize

    743KB

    MD5

    9ca2a4f7b1ecc189fe8a26637a44b129

    SHA1

    d9756a5ec485b8adfa5386d2996c6d244b0fa0d0

    SHA256

    9f84983285b6c3de4f9168707469509532c9dbe59270cc67f012b855fe7f9793

    SHA512

    340f817d6909e855ae42a264efbb65142f9f8b2e8424421f651c8e8ded9ae56847c4e2b12c46e71bd871f389909ab83f9f03ceed29d3d67555bd33b2bee95d31

  • \Program Files (x86)\SmartOnes\zjhgDmkDyYZoOL.x64.dll
    Filesize

    877KB

    MD5

    776ed176b19d4327bd967d470355dbc3

    SHA1

    0fa9fc06857aa34a92693be3326e82f1a9cec96d

    SHA256

    136060eef1040c355b1d5bc16821e8457d7b48e59a17097481a802027b1f3f27

    SHA512

    b1333a2b7d42f9df66da338b65b01260efc4371f7747919f606fb3c8707ed526b5ebbae60d8227e75614a33e7a86a2bbb9ba9bfe61713c3b8f1624330765ede0

  • \Program Files (x86)\SmartOnes\zjhgDmkDyYZoOL.x64.dll
    Filesize

    877KB

    MD5

    776ed176b19d4327bd967d470355dbc3

    SHA1

    0fa9fc06857aa34a92693be3326e82f1a9cec96d

    SHA256

    136060eef1040c355b1d5bc16821e8457d7b48e59a17097481a802027b1f3f27

    SHA512

    b1333a2b7d42f9df66da338b65b01260efc4371f7747919f606fb3c8707ed526b5ebbae60d8227e75614a33e7a86a2bbb9ba9bfe61713c3b8f1624330765ede0

  • memory/1224-69-0x000007FEFC001000-0x000007FEFC003000-memory.dmp
    Filesize

    8KB

  • memory/1224-68-0x0000000000000000-mapping.dmp
  • memory/1640-64-0x0000000000000000-mapping.dmp
  • memory/1816-54-0x0000000075AC1000-0x0000000075AC3000-memory.dmp
    Filesize

    8KB

  • memory/1816-55-0x0000000000E00000-0x0000000000ECA000-memory.dmp
    Filesize

    808KB