Analysis

  • max time kernel
    15s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2022 16:14

General

  • Target

    415249faf38a84e4b180beafc0818a06fe43cb5a4c2843e37791235bdcd8f5eb.exe

  • Size

    4.6MB

  • MD5

    dfb31f14a706185d829b9ee0b66791d9

  • SHA1

    af12e57d25cf6e242e2a0e66f94ae36dac991a61

  • SHA256

    415249faf38a84e4b180beafc0818a06fe43cb5a4c2843e37791235bdcd8f5eb

  • SHA512

    ad1eadc24676cf56978233298f7dbc84d01f56df687fae90cfe2d615cb2681abcab3852efa9e14e6ff50adde8df3ba931a69c97119516700a0c1291e36a7b6f8

  • SSDEEP

    98304:sdhBzl2TVTwymbvw1tf37IGTad+ESjS2Lkyj:sdETVTwymbUsGTfnjB4y

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs 4 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 3 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 8 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Program Files directory 8 IoCs
  • Modifies Internet Explorer settings 1 TTPs 8 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\415249faf38a84e4b180beafc0818a06fe43cb5a4c2843e37791235bdcd8f5eb.exe
    "C:\Users\Admin\AppData\Local\Temp\415249faf38a84e4b180beafc0818a06fe43cb5a4c2843e37791235bdcd8f5eb.exe"
    1⤵
    • Loads dropped DLL
    • Drops Chrome extension
    • Installs/modifies Browser Helper Object
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:964
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32.exe /s "C:\Program Files (x86)\PriceLess\5iytD1cKiiq6yH.x64.dll"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:588
      • C:\Windows\system32\regsvr32.exe
        /s "C:\Program Files (x86)\PriceLess\5iytD1cKiiq6yH.x64.dll"
        3⤵
        • Registers COM server for autorun
        • Loads dropped DLL
        • Installs/modifies Browser Helper Object
        • Modifies Internet Explorer settings
        • Modifies registry class
        PID:1280

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\PriceLess\5iytD1cKiiq6yH.dat
    Filesize

    3KB

    MD5

    59bc62149d1222331426a7585315e67c

    SHA1

    8ef629a3885e1a2be20cfb780f8f6d77a3eb2930

    SHA256

    8b16d514ac788a67bc6d1feff804660501e9ffe176c25d7e1850db0fcb285f09

    SHA512

    af41e93bd876d60be96ca61179a69a88c3e6c1d0049164c5b1492b0aa0a1c6e959741e1fffdfdf83224cd9de3fd37d67f51e32378b8948c08fc3a122596d1c49

  • C:\Program Files (x86)\PriceLess\5iytD1cKiiq6yH.tlb
    Filesize

    3KB

    MD5

    a605ae2858a95cc2ce9bb1e9d9304674

    SHA1

    6d921d39e97d8fa34c010b4045e45ba776565ac9

    SHA256

    3074c890173c5cfefa194ea54ad1fd95801384893476628823481fe071576d45

    SHA512

    95335e817be4486e8e949ac701f4ffa22c579a3509d62278f05ce5b5e369bd3949ebf90e1ac8f3aa4ee59525e2c59a906666633c594d264fbbb76146216e7725

  • C:\Program Files (x86)\PriceLess\5iytD1cKiiq6yH.x64.dll
    Filesize

    889KB

    MD5

    042040d8e80233e425b5c9e39da669a3

    SHA1

    f4d544cc6f6979cdab77b0072642edb4824aac04

    SHA256

    d5adc62ab4e22acf8f91d165bde2e398cec14e4424542e355bd07e54f6b2aed2

    SHA512

    d127946ea1b7d08f184646a44ef6f8f59daa70c46b6e54638fa15b9c8a4dfcf62ed384c7961447070fbfb3875cecffc85c963752e0ac8b5cba430826a0b7bac5

  • \Program Files (x86)\PriceLess\5iytD1cKiiq6yH.dll
    Filesize

    751KB

    MD5

    68b0c82a53fdfe07ab206ee2078ec984

    SHA1

    dc0bc38f5219340b309e53841f562499bf517568

    SHA256

    6c37c9e2af50feb15f2cd2ac1e85a03c1cab2d997bea12da8beea59bc0099c21

    SHA512

    e194eed7704e793e36a0e8d130d672c5788b3d41adde92b5876ba32f52a1c8065952243666ca804736f567e5af316ac80d2f7d5612bc90f6a92b9269f6678330

  • \Program Files (x86)\PriceLess\5iytD1cKiiq6yH.x64.dll
    Filesize

    889KB

    MD5

    042040d8e80233e425b5c9e39da669a3

    SHA1

    f4d544cc6f6979cdab77b0072642edb4824aac04

    SHA256

    d5adc62ab4e22acf8f91d165bde2e398cec14e4424542e355bd07e54f6b2aed2

    SHA512

    d127946ea1b7d08f184646a44ef6f8f59daa70c46b6e54638fa15b9c8a4dfcf62ed384c7961447070fbfb3875cecffc85c963752e0ac8b5cba430826a0b7bac5

  • \Program Files (x86)\PriceLess\5iytD1cKiiq6yH.x64.dll
    Filesize

    889KB

    MD5

    042040d8e80233e425b5c9e39da669a3

    SHA1

    f4d544cc6f6979cdab77b0072642edb4824aac04

    SHA256

    d5adc62ab4e22acf8f91d165bde2e398cec14e4424542e355bd07e54f6b2aed2

    SHA512

    d127946ea1b7d08f184646a44ef6f8f59daa70c46b6e54638fa15b9c8a4dfcf62ed384c7961447070fbfb3875cecffc85c963752e0ac8b5cba430826a0b7bac5

  • memory/588-61-0x0000000000000000-mapping.dmp
  • memory/964-54-0x0000000075DA1000-0x0000000075DA3000-memory.dmp
    Filesize

    8KB

  • memory/964-55-0x0000000000DC0000-0x0000000000E8A000-memory.dmp
    Filesize

    808KB

  • memory/1280-65-0x0000000000000000-mapping.dmp
  • memory/1280-66-0x000007FEFC631000-0x000007FEFC633000-memory.dmp
    Filesize

    8KB