Analysis

  • max time kernel
    152s
  • max time network
    179s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 16:14

General

  • Target

    ca7ad640d99d356891074ec5c612c45a5b8c3f5b3b63022b042bcb79c61905e2.exe

  • Size

    793KB

  • MD5

    284f93d74b5b234dfd959ac373604ce0

  • SHA1

    0f6617e512e4cc0a0582ccc5e4f65a75c0a755b1

  • SHA256

    ca7ad640d99d356891074ec5c612c45a5b8c3f5b3b63022b042bcb79c61905e2

  • SHA512

    c661cf07bee3996422d52d042c03aec31cebbf1984440ad4bf5a1ade5eee37f3613f3bd479a58b5038b071474b9a1e3af88840682dc5c99d031123b7eeeb18b4

  • SSDEEP

    24576:hLAt3ieGOGoNOcfLtAz2QFPlePWBoyVIj:te/VNLFIAPx2Y

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ca7ad640d99d356891074ec5c612c45a5b8c3f5b3b63022b042bcb79c61905e2.exe
    "C:\Users\Admin\AppData\Local\Temp\ca7ad640d99d356891074ec5c612c45a5b8c3f5b3b63022b042bcb79c61905e2.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1716
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1716 -s 1404
      2⤵
      • Program crash
      PID:840

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\freebl3.dll

    Filesize

    669KB

    MD5

    ed6249f72ba742802b2fa3ef20900d18

    SHA1

    6e50eec3f0b13ff71f86ffc46cf7a1d079381bf3

    SHA256

    a5396eba9d0564f4bcbafd5a8c4a4019b4b50a5c70a42aef5491a230d21f2922

    SHA512

    6da4cd5642becef120dbde2d070332d08bf5779bc0ffe66bf3cc51ca13db5619ee0b4f8fe3bc897c1876614a2512b2598f5d1c372764dd18b474081004d87c98

  • \Users\Admin\AppData\Local\Temp\mozglue.dll

    Filesize

    627KB

    MD5

    5d59e053d45049ffb8c6c08d8944e30c

    SHA1

    292f748d5e326143c3233e9d290087337700d606

    SHA256

    bcbf8c8ba4386b7716d5481ef9d089b9448990736d3eebdcfa611a09045c3ec3

    SHA512

    0f8b1c9c30d7b71fb7560377e5895c7bd15d71928c34465b1dde31ae770b6d38d5bac4d34ef4add9e08b72f2b9ea53958f167b0690fa0731af205528512a987b

  • \Users\Admin\AppData\Local\Temp\nss3.dll

    Filesize

    2.0MB

    MD5

    05ed4ffbf6b785750d2cdacca9287f10

    SHA1

    579c656536ce9cd076fc790cf443caf3a8db5b8f

    SHA256

    0bce97e8f6cc435250fb6aea0441e4146c7c8f8d90a9b1e76dfabd8701bfd882

    SHA512

    dddabf3ab629ec5b15e879f90d5f9bb69d6a8b47222989d3e683cbc8a6d4072740a5c5db05952d236529dfdde645990d21a4a9b32c4419ace9e2fe409fce4f01

  • \Users\Admin\AppData\Local\Temp\softokn3.dll

    Filesize

    251KB

    MD5

    3a59b504f6c41324b0d6cb6edbe3ad61

    SHA1

    2b3aff110badd913d221605d2f01638473dc5756

    SHA256

    c10801dba6c50237dba700fe2be920f091792e45c32e00db7c63c2c19a35f3a5

    SHA512

    56c9b7d4afcf8666aedaf55f819b799f2d84bc0736e0c431973114ae760da57209041785b7894f8b6d8d3e70bf040db68f7a95fcbb419fb6c44b70266eecc02d

  • memory/1716-54-0x00000000757E1000-0x00000000757E3000-memory.dmp

    Filesize

    8KB

  • memory/1716-55-0x0000000061E00000-0x0000000061EF3000-memory.dmp

    Filesize

    972KB

  • memory/1716-69-0x0000000061E00000-0x0000000061EF3000-memory.dmp

    Filesize

    972KB

  • memory/1716-71-0x0000000061E00000-0x0000000061EF3000-memory.dmp

    Filesize

    972KB