Analysis

  • max time kernel
    323s
  • max time network
    394s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/11/2022, 11:32

General

  • Target

    9d86fe3ce8330d30fe25662e6460642ff8badf19acc7a41fb22af6f8d59529fe.exe

  • Size

    245KB

  • MD5

    908156bbf80e0518f5bd86248a63c74a

  • SHA1

    639bfc73dc18f4dafacdca28cd8007e5ff3eba5a

  • SHA256

    9d86fe3ce8330d30fe25662e6460642ff8badf19acc7a41fb22af6f8d59529fe

  • SHA512

    b56bb367a1b68bc408dc407e5843938859188c65d07270758f0eab8a1265c0769225803272ffecebe6a4e80e8da5294c2dd3083cbe7c1d4715b4af908d012a66

  • SSDEEP

    6144:h1OgDPdkBAFZWjadD4s5QGijHG9spGDP/AErdWhniqOm:h1OgLdaOQHmTDyniqX

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 4 IoCs
  • Modifies registry class 63 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9d86fe3ce8330d30fe25662e6460642ff8badf19acc7a41fb22af6f8d59529fe.exe
    "C:\Users\Admin\AppData\Local\Temp\9d86fe3ce8330d30fe25662e6460642ff8badf19acc7a41fb22af6f8d59529fe.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4868
    • C:\Users\Admin\AppData\Local\Temp\7zS1260.tmp\50785f7e4842e.exe
      .\50785f7e4842e.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      • System policy modification
      PID:1940

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\wxDownload\50785f7e48467.ocx

          Filesize

          126KB

          MD5

          d637295a8426c7c4a8e9ef3e584839a2

          SHA1

          55b64f53328498d22d269de2e65be2feeba7da00

          SHA256

          5cbd7f4b8f991ccab51cfc1fd0a5437013c5196f3c636632d691103aa3708adb

          SHA512

          f60f908b9f0efd4762255c9c71559bbd554714170262dd556353ddda55789d21cc3a8ade239cdf51da38dfa4e92714749c217095bccac19590ef8347ca501c8c

        • C:\Users\Admin\AppData\Local\Temp\7zS1260.tmp\[email protected]\bootstrap.js

          Filesize

          2KB

          MD5

          c16a75a8b2ee902934c8daa8652c9ca7

          SHA1

          60a945727793d3260ba42d7195973bfa8022a1cc

          SHA256

          eb2d8a3cf1c9a3f91d2a8d8d5ec78b7429e6ee92c4613632a02e3c210a66aaaa

          SHA512

          89df69ce2f686a078bfb239926a7e29d0cb93b7639cb1ab75cba8a72926aeee8dc3405206fbb70317ae3cffcedd4b66e2c2252fb4ecd3c541f9d52e71b94e5fb

        • C:\Users\Admin\AppData\Local\Temp\7zS1260.tmp\[email protected]\chrome.manifest

          Filesize

          116B

          MD5

          c3c9960fabc7e1d9e604131a2fdba8a2

          SHA1

          35792b09836c7cad159b77ed1feaf166d0f07fff

          SHA256

          d2fda60d39b8008fcefbb8f9ba29407d56be1db11dff63e20a688c62458f10e5

          SHA512

          9b841f2f6deb1fd642417a40e7d31d1901690655c02baf5ee69292c3a39548f09980a6882be81a5eb5f17d83f3e1176c5a369e9dd93b4a22ca1dbfbda2652502

        • C:\Users\Admin\AppData\Local\Temp\7zS1260.tmp\[email protected]\content\bg.js

          Filesize

          8KB

          MD5

          8b08d77f657bdc291deb8d3b859b7a3d

          SHA1

          302d07b6273d97a6ef3acd00857221c12a0949f3

          SHA256

          0444d9405d159dcece5ce410e6bd77d2232e061892512fb456d2052f3c88757f

          SHA512

          189a9c1c3b73711c61a68b5f2e4ace1f3b596c2765756f45fdbea25beb82c6aacd7aa6f43863675391cef5675be44ebb05f6a4ae6e23b6a5d0ac24833d754c08

        • C:\Users\Admin\AppData\Local\Temp\7zS1260.tmp\[email protected]\content\zy.xul

          Filesize

          225B

          MD5

          63b8dc38b3d532b87541c9519c0ec96b

          SHA1

          460b5f7894a1e5f63586a8c3a8a53ef5aaf33908

          SHA256

          492784aea9e052da4c168dd87878c5c01e3a2b44fbbe0fe993435a2078ceac9c

          SHA512

          13b1ee511ea6d106af7f95c2293f3f5e6a21c910af04fc8c98f702a00466c4f6234c02113b510e6908eb36d99b9efd1fa20b032a9e1c23578342901017274bc1

        • C:\Users\Admin\AppData\Local\Temp\7zS1260.tmp\[email protected]\install.rdf

          Filesize

          717B

          MD5

          02e9070d2ec9799951a9a98218423c18

          SHA1

          78a65f4ddb712df58da3c7bc90c949b23ef616b7

          SHA256

          c6428e354f73ef5428595f31aa7e5780cde8b83c111743c8dabc10802934ba77

          SHA512

          43b3f1d15ab7bc25a1e906921bcc526fa85fd5507ecdb3f1e31a3f0e47cf3b2f8aa69b2aa294cb6ae5df5fb44b4fb5c09b5688b9692a4c88acbc504f38daf412

        • C:\Users\Admin\AppData\Local\Temp\7zS1260.tmp\50785f7e4842e.exe

          Filesize

          65KB

          MD5

          6fce522ef2543f1cd8812f45c8718ba6

          SHA1

          270c89c05963c0f24f976f6b75aa4d12ade4c837

          SHA256

          d75c34545066eb787ed671c6d4ce4f4c6267637518ca683dfefb79f95f14226b

          SHA512

          a0a486b95aeb9c059f23e639e16abdbfe94b041f33309b44e95743bf5a82f92d3c444c025b6c36a0dc296add3c2bc4f6affcf130014f16968be0afa8e0007880

        • C:\Users\Admin\AppData\Local\Temp\7zS1260.tmp\50785f7e4842e.exe

          Filesize

          65KB

          MD5

          6fce522ef2543f1cd8812f45c8718ba6

          SHA1

          270c89c05963c0f24f976f6b75aa4d12ade4c837

          SHA256

          d75c34545066eb787ed671c6d4ce4f4c6267637518ca683dfefb79f95f14226b

          SHA512

          a0a486b95aeb9c059f23e639e16abdbfe94b041f33309b44e95743bf5a82f92d3c444c025b6c36a0dc296add3c2bc4f6affcf130014f16968be0afa8e0007880

        • C:\Users\Admin\AppData\Local\Temp\7zS1260.tmp\50785f7e48467.ocx

          Filesize

          126KB

          MD5

          d637295a8426c7c4a8e9ef3e584839a2

          SHA1

          55b64f53328498d22d269de2e65be2feeba7da00

          SHA256

          5cbd7f4b8f991ccab51cfc1fd0a5437013c5196f3c636632d691103aa3708adb

          SHA512

          f60f908b9f0efd4762255c9c71559bbd554714170262dd556353ddda55789d21cc3a8ade239cdf51da38dfa4e92714749c217095bccac19590ef8347ca501c8c

        • C:\Users\Admin\AppData\Local\Temp\7zS1260.tmp\50785f7e484a0.html

          Filesize

          4KB

          MD5

          c6491e607063221478056c28eb426cdb

          SHA1

          97d40e7c41a00e1602849f02411c3fcd1ae5ab31

          SHA256

          3d190501c90e5b485f9f08ec1f418f241f3dcdd50af2a9bf6757519810a2176f

          SHA512

          c1453308af50f70d891f1c0aca2495e9ba63a1a7ea49c827ccfdc4299b69366567996b7ee80bbc2d26fa6fad9dcc248eab886571e835523c28e14e4ffae3a7c9

        • C:\Users\Admin\AppData\Local\Temp\7zS1260.tmp\50785f7e484d8.js

          Filesize

          9B

          MD5

          99fa5d714d971a49b67de27e0d8871be

          SHA1

          d0621e846ea60fa8d0b2c8e622e495af49cd7359

          SHA256

          f560d76474380da948a0c5ab8682dc026822d9685268c592f315224b1b968bf6

          SHA512

          2fec19e4f2a974227922a7e057890141523ae73fbfa127f9e8cd00dff71b29abb93cb865c6d74ecf3df8bca440c558d4fbf2f80e82cc9636320ab5edb95ebad5

        • C:\Users\Admin\AppData\Local\Temp\7zS1260.tmp\pfnbjiedndbdmepiiicaloconjifbajl.crx

          Filesize

          7KB

          MD5

          2a09770d0b5ad49e76e61bcf12d9c204

          SHA1

          d61715b4b9bc04b1e8bb691e7b8b5b7942c47920

          SHA256

          8a8e4d5bdf99155f4bda7f3015787da0622bda7ff330d3283cb8e92b24e24021

          SHA512

          3ff10e02ec05b02a6237fd83ffce5d1258942d3e685f870ee653bf18174950c2e5583934aaf21201d2442e27e2253d7025ca9b98e4522a07edc6860983a451b6

        • C:\Users\Admin\AppData\Local\Temp\7zS1260.tmp\settings.ini

          Filesize

          903B

          MD5

          bac8ca447e81e141344d6de585c98f03

          SHA1

          f9dd760daf351027462f5d311e4bf9fca8b8a5f1

          SHA256

          0e4b8e65a4f481bcbca34399e6eada9620d5fa0486dc97443525b75b71f57849

          SHA512

          9053fcb1bd3cd806e5ea1b9089cd15f71d5d0cb5e4a9ff3c5e2c1f323ef45596193fb919a18d6a76ed5102a8056b0010a58e61372b87417f601299f817a3ae33

        • C:\Users\Admin\AppData\Local\Temp\nsj7012.tmp\UserInfo.dll

          Filesize

          4KB

          MD5

          7579ade7ae1747a31960a228ce02e666

          SHA1

          8ec8571a296737e819dcf86353a43fcf8ec63351

          SHA256

          564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5

          SHA512

          a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b