Analysis

  • max time kernel
    133s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-11-2022 11:38

General

  • Target

    a859bcef82f297d1a42c5f35bd6e1a520815a58e8220ef92b3bbc44e805e73ea.exe

  • Size

    257KB

  • MD5

    a4e34ca0e8c59503cdab4e39adb58f55

  • SHA1

    c6023096401925db6d17354e67a7e96924b84635

  • SHA256

    a859bcef82f297d1a42c5f35bd6e1a520815a58e8220ef92b3bbc44e805e73ea

  • SHA512

    7b89b62bfba5233850ba666e4d952e65d58dfff49378ace90234e1d85e21266e11f920a7346c21381f7c4e4003a1904c6b8322c80e1726efbcfcfecbbaea1a66

  • SSDEEP

    3072:9n1/uEAgDPdkBlyFZ+ScjaiKWbETBquAEXlqsWFKqcUm8l0vV6BK7bsh4K5HyBoN:91OgDPdkBAFZWjadD4sf5eb4KFP9c8

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 4 IoCs
  • Modifies registry class 63 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a859bcef82f297d1a42c5f35bd6e1a520815a58e8220ef92b3bbc44e805e73ea.exe
    "C:\Users\Admin\AppData\Local\Temp\a859bcef82f297d1a42c5f35bd6e1a520815a58e8220ef92b3bbc44e805e73ea.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4204
    • C:\Users\Admin\AppData\Local\Temp\7zS884F.tmp\setup.exe
      .\setup.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      • System policy modification
      PID:1196

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\DownloadnSave\bhoclass.dll

    Filesize

    164KB

    MD5

    474a025909c75c607905b9e2cae8a56f

    SHA1

    83ed7383c8aa53c6134a2b0a701b7b272c5c7c1e

    SHA256

    25ab733f417a9def519ff2443f38cff31baa02743cac803f53f662c875b9be5f

    SHA512

    29d14b6143a45c76904beb6d7ba2d8020f13cd407c66d6eed8825b9e722138f11945a3747988beda0f5bf33acbcb3fcdf8a411a2fc9b07fe501938dc590d03f1

  • C:\Users\Admin\AppData\Local\Temp\7zS884F.tmp\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    e16c50c73ad0c26bbd7593f325288ea8

    SHA1

    283626b095dbfd2fa285cc8ddcc104ce994a5a62

    SHA256

    bba9d13c3738ea9a3541dc9cd59950f0ebac4e73380a7ef0e9a42228346c3d62

    SHA512

    ac53acc63bdd53ee79648029fde8f00ce982d591de6d98a92303da495af797e9ea8818e2d5e9aed695bc72cd7741366ae992550b1b12db809252acd1729a6b8a

  • C:\Users\Admin\AppData\Local\Temp\7zS884F.tmp\[email protected]\chrome.manifest

    Filesize

    116B

    MD5

    9bba8a117c67c71b94279522eaaf9de6

    SHA1

    c7e7695f0a5a45a3d87215daa4161b9fd7c3a3b2

    SHA256

    9a3977f914a54ab6cf1b2ba5858b72bd6a8fc93a0d9edab63864ea17452d46c2

    SHA512

    a77c9ef20e2e0d3499f6d0ff457e7fd153c9aaccfad2560c07dfa309031974a2a7e72f773054fdd0ae41bae549d50717589f9a7c67851551682087b59458786d

  • C:\Users\Admin\AppData\Local\Temp\7zS884F.tmp\[email protected]\content\bg.js

    Filesize

    8KB

    MD5

    a54e06798aacd809dedcd8ccf76e1432

    SHA1

    a17ded2434329e61cfc40a1f9d1aa9d66aaa3b80

    SHA256

    57c28bacb7e66d177af0cf7c8c99cb1a479ac21e2975a7d4c752bb4ad69e536f

    SHA512

    4b71b0b25b3f43de30ce44eca6ccad3ff7e772bed530333cf3738b18e531246dae2509cf01932438ad5c47687a71181ab11511881ad52648384f1bc507ec850f

  • C:\Users\Admin\AppData\Local\Temp\7zS884F.tmp\[email protected]\content\zy.xul

    Filesize

    225B

    MD5

    9e9c02328502a69963f091e75365cfe1

    SHA1

    2d8a74fdc07d882c4d0603d8cd7a77d2a6a36980

    SHA256

    cea573340875dd200d740c5f86dad03d8ba56af29540cdc37b5355ea34db2c9e

    SHA512

    be74bcc27333f4bfc38e2ad9af74206bdd229460c1aedefe939bf1c41787c8b005ae8fe1f1314a9e8edb81b4aca6ded99e20a67fd51f2e3b02a0bbd031fafe42

  • C:\Users\Admin\AppData\Local\Temp\7zS884F.tmp\[email protected]\install.rdf

    Filesize

    720B

    MD5

    892168759ffa366f6415136f5283c596

    SHA1

    fbd715b708b805626f03c936585c6204f733e748

    SHA256

    06dcdf8bd96d872d156de81db6eadd32b38bbb5319359e490ddc913d63257100

    SHA512

    36cb36a783b641fd14edf01dfd9b18acccda9023234337c1f15ac2c226aa860bbd3bc41a932060da2c52ef21ce19b1d8537f7999c18c21d267eaadd17ffae852

  • C:\Users\Admin\AppData\Local\Temp\7zS884F.tmp\background.html

    Filesize

    4KB

    MD5

    ef6cf50e6bec7c240599de5bb15c9f88

    SHA1

    c06cefa8350dd38359b74363a7fc00d4fdd7e384

    SHA256

    c77902063e40fc7effd541cc332a0fc4e51f8557e8a771923e2d0d484a43b9f2

    SHA512

    d653f011af53c03bb662f46690849288005475de4238051f8e94401f4d9145a6a4c1afc8a5f4b2d036f7365479e1628dce0f20ce3fd2b9d604bc63a3165da3c0

  • C:\Users\Admin\AppData\Local\Temp\7zS884F.tmp\bhoclass.dll

    Filesize

    164KB

    MD5

    474a025909c75c607905b9e2cae8a56f

    SHA1

    83ed7383c8aa53c6134a2b0a701b7b272c5c7c1e

    SHA256

    25ab733f417a9def519ff2443f38cff31baa02743cac803f53f662c875b9be5f

    SHA512

    29d14b6143a45c76904beb6d7ba2d8020f13cd407c66d6eed8825b9e722138f11945a3747988beda0f5bf33acbcb3fcdf8a411a2fc9b07fe501938dc590d03f1

  • C:\Users\Admin\AppData\Local\Temp\7zS884F.tmp\content.js

    Filesize

    388B

    MD5

    54386b7b37ccdac33a3e50127f2f7fb2

    SHA1

    3f05cbde29a6f241ce9dae7653d68eba8190c67f

    SHA256

    535ac1af154120e150f8780eea46df002b85589069fb00261fc2cc5f2edcef1d

    SHA512

    e0b9ecab2ddf0cd29b4f2521293adae55d79172ff2201a245684260831bede12a0482cac2824d75d7ca223dd50cd5429cbbcfae0571d43cb37652a80dd0cb780

  • C:\Users\Admin\AppData\Local\Temp\7zS884F.tmp\pdkblgcifgkgiodmidebpmenpcaalmlc.crx

    Filesize

    3KB

    MD5

    23c9cdea7846fd786d22edf00c36ae9a

    SHA1

    2e24702336a77a0b43f1f556387ea071e51f036e

    SHA256

    6ac8c3d0063810b35c9c29e0304f4342dbbef9d166f3aba28843ce7f760c0732

    SHA512

    b7f141e0c43a7cc31b60987fae27dead7cf516158859c8d84b264b089e9ba217672f76b5613e021b3e9547873ff96a90e417a88f4756ded10b98bd2e95ccd983

  • C:\Users\Admin\AppData\Local\Temp\7zS884F.tmp\settings.ini

    Filesize

    926B

    MD5

    447337b790871dfc56070d403f31f946

    SHA1

    816d8f130cad58e2014818590866a0ff3320757a

    SHA256

    0bebb817fc1d36e8c229e1ce782bc08d58764ad91758451054eed6b6326ad37e

    SHA512

    e57e0c3438228a4067159fb20542e39d3baf3b1cb0bed5fa05173c47b5111d531d5dde4ada59bdf519957d5159f9a3d30c91b2fd6c4ea901e1f59aab86c44cdd

  • C:\Users\Admin\AppData\Local\Temp\7zS884F.tmp\setup.exe

    Filesize

    65KB

    MD5

    4ccf1a317aa8539c857835e4ebe9c806

    SHA1

    223b73d09d7398f40aff3ccc569e66cae3886ee9

    SHA256

    4529889c5575cd4e28b3691f0489c806442840292a9e459ada4dab3e024cc242

    SHA512

    ecab68799b5a51c7d2a3735a9b3c17ba20a315618aa9575a5b02d5d4535716966031a26982012669f069dbfd8a6ab62f95737b7c402bf680f3a498900f627312

  • C:\Users\Admin\AppData\Local\Temp\7zS884F.tmp\setup.exe

    Filesize

    65KB

    MD5

    4ccf1a317aa8539c857835e4ebe9c806

    SHA1

    223b73d09d7398f40aff3ccc569e66cae3886ee9

    SHA256

    4529889c5575cd4e28b3691f0489c806442840292a9e459ada4dab3e024cc242

    SHA512

    ecab68799b5a51c7d2a3735a9b3c17ba20a315618aa9575a5b02d5d4535716966031a26982012669f069dbfd8a6ab62f95737b7c402bf680f3a498900f627312

  • C:\Users\Admin\AppData\Local\Temp\nsb8B9C.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    7579ade7ae1747a31960a228ce02e666

    SHA1

    8ec8571a296737e819dcf86353a43fcf8ec63351

    SHA256

    564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5

    SHA512

    a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b

  • memory/1196-132-0x0000000000000000-mapping.dmp