Analysis

  • max time kernel
    113s
  • max time network
    198s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 18:30

General

  • Target

    4646eb037b498918f7e4558680557879cbf91f28d9668083ee2f25180c4ae834.exe

  • Size

    793KB

  • MD5

    8f8a9fa78aa61839e20a968ff65eb0db

  • SHA1

    c132428636b92b7829cd70ecd004fb1d77f9646d

  • SHA256

    4646eb037b498918f7e4558680557879cbf91f28d9668083ee2f25180c4ae834

  • SHA512

    4642db8d8f5b5b299dcd3db3b6741e65804602bf6ef9982a660e14c43dc666103586d2855b549c4e6c39706750a6579a7b6628812872f5a09ad80960d6e0fb8d

  • SSDEEP

    24576:hLAt3ieGOGoNOcfLtAz2QFPlePWBoyhIj:te/VNLFIAPxCY

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4646eb037b498918f7e4558680557879cbf91f28d9668083ee2f25180c4ae834.exe
    "C:\Users\Admin\AppData\Local\Temp\4646eb037b498918f7e4558680557879cbf91f28d9668083ee2f25180c4ae834.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1364
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1364 -s 304
      2⤵
      • Program crash
      PID:1512

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\freebl3.dll

          Filesize

          669KB

          MD5

          ed6249f72ba742802b2fa3ef20900d18

          SHA1

          6e50eec3f0b13ff71f86ffc46cf7a1d079381bf3

          SHA256

          a5396eba9d0564f4bcbafd5a8c4a4019b4b50a5c70a42aef5491a230d21f2922

          SHA512

          6da4cd5642becef120dbde2d070332d08bf5779bc0ffe66bf3cc51ca13db5619ee0b4f8fe3bc897c1876614a2512b2598f5d1c372764dd18b474081004d87c98

        • \Users\Admin\AppData\Local\Temp\mozglue.dll

          Filesize

          627KB

          MD5

          5d59e053d45049ffb8c6c08d8944e30c

          SHA1

          292f748d5e326143c3233e9d290087337700d606

          SHA256

          bcbf8c8ba4386b7716d5481ef9d089b9448990736d3eebdcfa611a09045c3ec3

          SHA512

          0f8b1c9c30d7b71fb7560377e5895c7bd15d71928c34465b1dde31ae770b6d38d5bac4d34ef4add9e08b72f2b9ea53958f167b0690fa0731af205528512a987b

        • \Users\Admin\AppData\Local\Temp\nss3.dll

          Filesize

          2.0MB

          MD5

          05ed4ffbf6b785750d2cdacca9287f10

          SHA1

          579c656536ce9cd076fc790cf443caf3a8db5b8f

          SHA256

          0bce97e8f6cc435250fb6aea0441e4146c7c8f8d90a9b1e76dfabd8701bfd882

          SHA512

          dddabf3ab629ec5b15e879f90d5f9bb69d6a8b47222989d3e683cbc8a6d4072740a5c5db05952d236529dfdde645990d21a4a9b32c4419ace9e2fe409fce4f01

        • \Users\Admin\AppData\Local\Temp\softokn3.dll

          Filesize

          251KB

          MD5

          3a59b504f6c41324b0d6cb6edbe3ad61

          SHA1

          2b3aff110badd913d221605d2f01638473dc5756

          SHA256

          c10801dba6c50237dba700fe2be920f091792e45c32e00db7c63c2c19a35f3a5

          SHA512

          56c9b7d4afcf8666aedaf55f819b799f2d84bc0736e0c431973114ae760da57209041785b7894f8b6d8d3e70bf040db68f7a95fcbb419fb6c44b70266eecc02d

        • memory/1364-54-0x00000000763F1000-0x00000000763F3000-memory.dmp

          Filesize

          8KB

        • memory/1364-55-0x0000000061E00000-0x0000000061EF3000-memory.dmp

          Filesize

          972KB

        • memory/1364-69-0x0000000061E00000-0x0000000061EF3000-memory.dmp

          Filesize

          972KB

        • memory/1364-71-0x0000000061E00000-0x0000000061EF3000-memory.dmp

          Filesize

          972KB