Analysis
-
max time kernel
41s -
max time network
66s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 19:46
Static task
static1
Behavioral task
behavioral1
Sample
1be96f03dd3949b6189a9b587be664b9cef82bf9244a1a6ca8733f4623f4480d.exe
Resource
win7-20220812-en
General
-
Target
1be96f03dd3949b6189a9b587be664b9cef82bf9244a1a6ca8733f4623f4480d.exe
-
Size
2.9MB
-
MD5
e23e613ac6a0de1c0a2ab36e73ef608a
-
SHA1
71547887582042230100df64ea1dad5fe4e0fc0d
-
SHA256
1be96f03dd3949b6189a9b587be664b9cef82bf9244a1a6ca8733f4623f4480d
-
SHA512
912298142de3d07a84d9400cdae96b689a68879dc1da5c0b7299bfc2213d391f625d9ad807cd6358c93fe427dbdb1741335ad38b28d6da951a7a0aeaf0870546
-
SSDEEP
49152:UIryXfY8QbwV8G9d6bOO0bZdKHkLWyCPOx6oC4G2:z8fLwGhO0bHuKNv
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 3 IoCs
Processes:
1be96f03dd3949b6189a9b587be664b9cef82bf9244a1a6ca8733f4623f4480d.exedescription ioc process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\njckhnpchabaemdgkamaijoeanimjopi\2.0\manifest.json 1be96f03dd3949b6189a9b587be664b9cef82bf9244a1a6ca8733f4623f4480d.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\njckhnpchabaemdgkamaijoeanimjopi\2.0\manifest.json 1be96f03dd3949b6189a9b587be664b9cef82bf9244a1a6ca8733f4623f4480d.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\njckhnpchabaemdgkamaijoeanimjopi\2.0\manifest.json 1be96f03dd3949b6189a9b587be664b9cef82bf9244a1a6ca8733f4623f4480d.exe -
Drops file in System32 directory 4 IoCs
Processes:
1be96f03dd3949b6189a9b587be664b9cef82bf9244a1a6ca8733f4623f4480d.exedescription ioc process File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI 1be96f03dd3949b6189a9b587be664b9cef82bf9244a1a6ca8733f4623f4480d.exe File opened for modification C:\Windows\System32\GroupPolicy 1be96f03dd3949b6189a9b587be664b9cef82bf9244a1a6ca8733f4623f4480d.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini 1be96f03dd3949b6189a9b587be664b9cef82bf9244a1a6ca8733f4623f4480d.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol 1be96f03dd3949b6189a9b587be664b9cef82bf9244a1a6ca8733f4623f4480d.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
1be96f03dd3949b6189a9b587be664b9cef82bf9244a1a6ca8733f4623f4480d.exepid process 1728 1be96f03dd3949b6189a9b587be664b9cef82bf9244a1a6ca8733f4623f4480d.exe 1728 1be96f03dd3949b6189a9b587be664b9cef82bf9244a1a6ca8733f4623f4480d.exe 1728 1be96f03dd3949b6189a9b587be664b9cef82bf9244a1a6ca8733f4623f4480d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1be96f03dd3949b6189a9b587be664b9cef82bf9244a1a6ca8733f4623f4480d.exe"C:\Users\Admin\AppData\Local\Temp\1be96f03dd3949b6189a9b587be664b9cef82bf9244a1a6ca8733f4623f4480d.exe"1⤵
- Drops Chrome extension
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1728