Analysis
-
max time kernel
31s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 11:28
Static task
static1
Behavioral task
behavioral1
Sample
f4736280eb7981e104c050e0eb72314b51f6a4af10acff1aa57fe6a6ba49cca3.exe
Resource
win7-20220812-en
General
-
Target
f4736280eb7981e104c050e0eb72314b51f6a4af10acff1aa57fe6a6ba49cca3.exe
-
Size
188KB
-
MD5
2f6594e1fc382b9ebe3e1d568d6877aa
-
SHA1
4fea452e8ce11128c1a185ceaedb46446d59c5d7
-
SHA256
f4736280eb7981e104c050e0eb72314b51f6a4af10acff1aa57fe6a6ba49cca3
-
SHA512
af03f4c1f6e1f3c803e1fbffcc61a368e3226f75c0f3589738eaa170e639572a33be26c1b7487169484f11bd257adcaf82c1b8587a29bca7b2845d8dc81e0c31
-
SSDEEP
3072:hn1/uEAgDPdkBlyFZ+ScjaiKWbETBquAEXlqsUU2oOVSZl6QdegikWk:h1OgDPdkBAFZWjadD4s52pVSZQQYKWk
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1696 5079539fc5411.exe -
Loads dropped DLL 3 IoCs
pid Process 1880 f4736280eb7981e104c050e0eb72314b51f6a4af10acff1aa57fe6a6ba49cca3.exe 1696 5079539fc5411.exe 1696 5079539fc5411.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 8 IoCs
resource yara_rule behavioral1/files/0x00060000000142d6-55.dat nsis_installer_1 behavioral1/files/0x00060000000142d6-55.dat nsis_installer_2 behavioral1/files/0x00060000000142d6-57.dat nsis_installer_1 behavioral1/files/0x00060000000142d6-57.dat nsis_installer_2 behavioral1/files/0x00060000000142d6-59.dat nsis_installer_1 behavioral1/files/0x00060000000142d6-59.dat nsis_installer_2 behavioral1/files/0x0006000000014c4a-68.dat nsis_installer_1 behavioral1/files/0x0006000000014c4a-68.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1880 wrote to memory of 1696 1880 f4736280eb7981e104c050e0eb72314b51f6a4af10acff1aa57fe6a6ba49cca3.exe 27 PID 1880 wrote to memory of 1696 1880 f4736280eb7981e104c050e0eb72314b51f6a4af10acff1aa57fe6a6ba49cca3.exe 27 PID 1880 wrote to memory of 1696 1880 f4736280eb7981e104c050e0eb72314b51f6a4af10acff1aa57fe6a6ba49cca3.exe 27 PID 1880 wrote to memory of 1696 1880 f4736280eb7981e104c050e0eb72314b51f6a4af10acff1aa57fe6a6ba49cca3.exe 27 PID 1880 wrote to memory of 1696 1880 f4736280eb7981e104c050e0eb72314b51f6a4af10acff1aa57fe6a6ba49cca3.exe 27 PID 1880 wrote to memory of 1696 1880 f4736280eb7981e104c050e0eb72314b51f6a4af10acff1aa57fe6a6ba49cca3.exe 27 PID 1880 wrote to memory of 1696 1880 f4736280eb7981e104c050e0eb72314b51f6a4af10acff1aa57fe6a6ba49cca3.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4736280eb7981e104c050e0eb72314b51f6a4af10acff1aa57fe6a6ba49cca3.exe"C:\Users\Admin\AppData\Local\Temp\f4736280eb7981e104c050e0eb72314b51f6a4af10acff1aa57fe6a6ba49cca3.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\7zS37B4.tmp\5079539fc5411.exe.\5079539fc5411.exe /s2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1696
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\7zS37B4.tmp\[email protected]\bootstrap.js
Filesize2KB
MD5512ab564af2ac978e1183b6c98a2672d
SHA194e4c8f9da7b63d3221ae4ab129912aeb3f23b7e
SHA256c091810e4b468049005e950f265b528b52acbeecb5611468ecceff04711b8b87
SHA5128ceb7a0407f76d63bb5791cf07fe43bcf8b559e8aeaf4dea42e207b4f843b72afbaf7710057b7810ab9bd5ebbd4e8da71cc13b5168356eacc0a66d4541973af2
-
C:\Users\Admin\AppData\Local\Temp\7zS37B4.tmp\[email protected]\chrome.manifest
Filesize116B
MD56a1f274063bb2fd947146616f7bd579f
SHA11b87b0935e863480084687170d684b25f19873c8
SHA2562aeffbd283609530f195541bbe608f05043a7a3d74a00b79f90c48d0a2af423b
SHA512566e0c8f2f9b938f0aa78d7f85a44f84c7641e95452e28d9559883063dae8030d601bbbfa03a5837fa118c0b9ebddd8e5f08a89f6006e01eb89e802633606a58
-
C:\Users\Admin\AppData\Local\Temp\7zS37B4.tmp\[email protected]\content\bg.js
Filesize8KB
MD58622e2074772c55d1001b828b370dd68
SHA1420177887fd20d2e9c9ad0ac6ea6da45c62aecdd
SHA2561108832fd0d957cabf4f70ecd32d846301f468a8b9f210a0c4157674a54fb8ee
SHA5126041b917d9963adc13770c875a78e58790b1e9494d1efb85eb881eb66db462fe67dca0b131675d14167ab06e9c398e1a16689a9ed26ef86e3f91f37c1ef440dc
-
C:\Users\Admin\AppData\Local\Temp\7zS37B4.tmp\[email protected]\content\zy.xul
Filesize225B
MD5cd40caa10ff79164c1c97160bac70172
SHA1a40bd6d7dea4ccad6c1ee80ccf83c9f043013d59
SHA256b3c846b4420fd89fe9306aca1c83bf70a313525a95202a2cccc1f71fd6ddc234
SHA512e579c9f71c6e43b49da7f43418554c635684b5739c897050ae511b798df6d44544a97b5a425fce85277347da27c37717ddc5964826184d592d83bf2bce607fdc
-
C:\Users\Admin\AppData\Local\Temp\7zS37B4.tmp\[email protected]\install.rdf
Filesize717B
MD5f82ebcf9c349dc37fa92b8de878751a8
SHA1076b05127437db799accffba42a1d9ec9c592725
SHA25645b2f5fb8dc103b377a587958acf08e600e45eac3e5e27e6c460d41681cfce42
SHA5124a12451336756b3a36889c339f4e1248b8f63b0a1c3bfbc4db078372717956f87cc5a571019f4457f02490d42b6f800be7d05014537f8bbccbf6b3af92662cf8
-
Filesize
65KB
MD56fce522ef2543f1cd8812f45c8718ba6
SHA1270c89c05963c0f24f976f6b75aa4d12ade4c837
SHA256d75c34545066eb787ed671c6d4ce4f4c6267637518ca683dfefb79f95f14226b
SHA512a0a486b95aeb9c059f23e639e16abdbfe94b041f33309b44e95743bf5a82f92d3c444c025b6c36a0dc296add3c2bc4f6affcf130014f16968be0afa8e0007880
-
Filesize
65KB
MD56fce522ef2543f1cd8812f45c8718ba6
SHA1270c89c05963c0f24f976f6b75aa4d12ade4c837
SHA256d75c34545066eb787ed671c6d4ce4f4c6267637518ca683dfefb79f95f14226b
SHA512a0a486b95aeb9c059f23e639e16abdbfe94b041f33309b44e95743bf5a82f92d3c444c025b6c36a0dc296add3c2bc4f6affcf130014f16968be0afa8e0007880
-
Filesize
7KB
MD5e7d1486078c2e35e155d8f7b480ef0d7
SHA1549b0151becca4db14c65e8fc2a1bc9ae072c6d3
SHA256ec00b95b9f26adce489383e683359514c287d7c85b74ae7b85cfc24353344dbb
SHA5126062dbf69cc7abf404730345f09e0143185f0f28ff7aac7642bd0bcd5e8a843958500e30225de0589649fc79bda36059bc0e82625095484932e5e813a9796ffe
-
Filesize
636B
MD57ff0a002c7267672dd4df3bd8605073f
SHA13c5bc5fd4d023525e5e6ed9b73e8ebf83d7f6002
SHA256bc975888000a71f8c23cdc3deadc22080fd9f4075e82a966aa3b88d4496a62a4
SHA512430d132fe656387f4ae581bec120a626505667da7ea51df0ff2d6ed7d42435f2c63e31878e8cf02e04307ea0ccc1457be4ab237b2b08bdf539a3330881c82e99
-
Filesize
48KB
MD5602aa39f9ab3b6685bee71c67dc485c5
SHA169cd0d6f9ce55a5e5d3d3559d31422303dc6def1
SHA256d8fb9c21b350a06449c7e6934a3c2d971d20851ce73938bbc5f79349f970721c
SHA5123bb5a0bf89da8993ae2801b41f7644ec39fc418ac0553bc67ed4f36ad413f3c2237ff9bcdd4a1ca64ad546b30e6445d3f6f1fa3af0f34faf1841da306e81ea94
-
Filesize
65KB
MD56fce522ef2543f1cd8812f45c8718ba6
SHA1270c89c05963c0f24f976f6b75aa4d12ade4c837
SHA256d75c34545066eb787ed671c6d4ce4f4c6267637518ca683dfefb79f95f14226b
SHA512a0a486b95aeb9c059f23e639e16abdbfe94b041f33309b44e95743bf5a82f92d3c444c025b6c36a0dc296add3c2bc4f6affcf130014f16968be0afa8e0007880
-
Filesize
4KB
MD57579ade7ae1747a31960a228ce02e666
SHA18ec8571a296737e819dcf86353a43fcf8ec63351
SHA256564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5
SHA512a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b