Analysis

  • max time kernel
    155s
  • max time network
    195s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-12-2022 07:19

General

  • Target

    59557979411dead54c308a59ba1dcfdb3bc2181381f1f6556791cd876f1ef9e4.exe

  • Size

    251KB

  • MD5

    b9f2e7a7e6a867757164f836a5e5a230

  • SHA1

    fbab04077d094903ffb081f9a88c8c9bec649e80

  • SHA256

    59557979411dead54c308a59ba1dcfdb3bc2181381f1f6556791cd876f1ef9e4

  • SHA512

    6dd427941860f1ee4cae0acf5c45501f3f3e5c62191052c34ac8ededbdc7beb1b26b13f6701f4d515d82416b7d058619971c21764b2cf5adbf7c480d869f360b

  • SSDEEP

    6144:91OgDPdkBAFZWjadD4se5RffD22GuekBh9lqelar:91OgLda3Xj4uNBh9lqeli

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 4 IoCs
  • Modifies registry class 63 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\59557979411dead54c308a59ba1dcfdb3bc2181381f1f6556791cd876f1ef9e4.exe
    "C:\Users\Admin\AppData\Local\Temp\59557979411dead54c308a59ba1dcfdb3bc2181381f1f6556791cd876f1ef9e4.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5036
    • C:\Users\Admin\AppData\Local\Temp\7zS5F66.tmp\setup.exe
      .\setup.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      • System policy modification
      PID:3712

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\wxDfast\bhoclass.dll

    Filesize

    139KB

    MD5

    4b35f6c1f932f52fa9901fbc47b432df

    SHA1

    8e842bf068b04f36475a3bf86c5ea6a9839bbb5e

    SHA256

    2b4d643a8a14f060bf3885f872b36e5e1fe1e777ad94783ba9593487c8e1f196

    SHA512

    8716b9a8e46933bf29348254a68d1a21392bdbbe3b4d5010e55fe638d02cc04eb685e424d440f7c5b58ffbca82e5772dd95bef73fa831595c2ae9599f3b05a99

  • C:\Users\Admin\AppData\Local\Temp\7zS5F66.tmp\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    b9165e81934c746e3a33afc6bde86143

    SHA1

    ce38f37d26d5fa6309f4d42cbf470bc4a884b100

    SHA256

    3edbe3448cc74e7862db06fb08a8250c044a6aadbbea35a365560080eaaa3624

    SHA512

    fab8731e561554bf3ac4a32950a4111d3bca7d9223727ed6eccca598777bd697606a11f658eae3d28f6dae16faf40fda7387d0e25cd8f3cb750c871f77178bc8

  • C:\Users\Admin\AppData\Local\Temp\7zS5F66.tmp\[email protected]\chrome.manifest

    Filesize

    116B

    MD5

    d40c31f3679f3ade20a8c428f7ab8916

    SHA1

    c1dab3a5bd2b6d7b34ed95b33d693c1c616abb3d

    SHA256

    143001c20e0b7993bf45b0d420554c799e58a20976c395fa9894418bd8355547

    SHA512

    ff0ef7195452ac2c99ff96caac383af9dc70e33d7315f577c7a995c88b827fedb85dda2327f5ffe76dd49313c6905e4277a6e309b86699eb8192e2f9f1f6fde9

  • C:\Users\Admin\AppData\Local\Temp\7zS5F66.tmp\[email protected]\content\bg.js

    Filesize

    8KB

    MD5

    b66b3389382acb463bdc87349e64f79d

    SHA1

    822660e8d8ca2d960160f959d48353ab41765b24

    SHA256

    931e2e6daba95d315f9b7f5f918e24597ac3f80e974ed09c0b30acdda16e0752

    SHA512

    f5632a9978ff013aa0a78d75b346cd5669e943c9978b6b35555dede42fdb60c3a2c9ae31494210dbcd420ea5f4f5ff97e919ae381f9e1838884e2cb3844bb965

  • C:\Users\Admin\AppData\Local\Temp\7zS5F66.tmp\[email protected]\content\zy.xul

    Filesize

    225B

    MD5

    4813c6fbe39a12f8df1b8f04336811f1

    SHA1

    c611a442639d9aa5a042f6519a2d3804d68efcd0

    SHA256

    03d0d09551a2f87711da9761e9504921f52627fd6de887a987193a04766192be

    SHA512

    4bd62350ac721addf065ddff89bc8cf22753a6d2e072cb8bce1931cc9e475589fbd2b5b6812dd031ac3b1eb0f2aa0eb95d0829836006a2f11ef67324cdd79f27

  • C:\Users\Admin\AppData\Local\Temp\7zS5F66.tmp\[email protected]\install.rdf

    Filesize

    714B

    MD5

    51be6a16f6a31c18ececdd1484d994ad

    SHA1

    746542de5c61b121fe7a766b27b4bc344f6726dd

    SHA256

    e8010805ba5b73e8464aeeef052d524f36964ab7bb34a4da2f9fbf3025fb43e8

    SHA512

    2fc09e4061781dd480e092f15241065e4008c4517e0cec89ecc41ebe2ca2223d85307a42bd636f89bfdbe05fa887845c2e79bb604bc9f73e67b15bcb527a3fbb

  • C:\Users\Admin\AppData\Local\Temp\7zS5F66.tmp\background.html

    Filesize

    4KB

    MD5

    d1eb59bea069436c4736726feda0c62b

    SHA1

    839122a275fc5b785990f042006e1a8703a90ebe

    SHA256

    2cf6a61de20d140753f2f901b39d68431a4d20c3f2abb961edf34dee6886c8fb

    SHA512

    4e28a9037415c058bf4b6ea00db367b11c12d30b0096da4c995d48a148bb95124da1b0934f8011b1240a4231f26d5afd4d42c74ba93f91bfcb325c92b0fcd150

  • C:\Users\Admin\AppData\Local\Temp\7zS5F66.tmp\bhoclass.dll

    Filesize

    139KB

    MD5

    4b35f6c1f932f52fa9901fbc47b432df

    SHA1

    8e842bf068b04f36475a3bf86c5ea6a9839bbb5e

    SHA256

    2b4d643a8a14f060bf3885f872b36e5e1fe1e777ad94783ba9593487c8e1f196

    SHA512

    8716b9a8e46933bf29348254a68d1a21392bdbbe3b4d5010e55fe638d02cc04eb685e424d440f7c5b58ffbca82e5772dd95bef73fa831595c2ae9599f3b05a99

  • C:\Users\Admin\AppData\Local\Temp\7zS5F66.tmp\content.js

    Filesize

    386B

    MD5

    bcad3c3dacf7998830604623d449405c

    SHA1

    edc4346b8ec92901bf326e4c914adca4ec9d0cdd

    SHA256

    9c9d5120126b91be88d7da7ae847ac8d209eef0bb7998da02269f7fe4addbc49

    SHA512

    8dd38365e3cd4832ecdb55d61902ccd370827deb843c659ef95d81df9fd9743d3750b9d52cc7bbc391abb581f94bc3710acc306eca17dc9947aeefb5fa1dc415

  • C:\Users\Admin\AppData\Local\Temp\7zS5F66.tmp\daibmclalcocecielanbaajipkjmofbn.crx

    Filesize

    3KB

    MD5

    eb40f5e15b5a510c8bff065f5fb3f35a

    SHA1

    7984659db96a518aedf74af36721cf3e731da357

    SHA256

    55a53cb37ca67fbf25dc7425d774130b8c0622433c2b47fc6e17b53560fd00cb

    SHA512

    2a0509bc1c92c110d5bab9fb34bfedca0102730e75384b1c1d8cdf1da9f9e31d9b0ad198ef1aafaf26bab33375f36e32cb912d74a73cf232cfe7053d7aecce79

  • C:\Users\Admin\AppData\Local\Temp\7zS5F66.tmp\settings.ini

    Filesize

    656B

    MD5

    0b775bfe86e2aa3dada2244f334baa24

    SHA1

    4ee9afd25c7f89cbdcd0ceeabbd3b4a655b2ef8d

    SHA256

    ec575f96419e53ff853d2fba4b85588d9308be175ae154494ca83cb5d2729c02

    SHA512

    7bfac21b91b7dbffc781ff39320d2401d09647981ed85243861fcab45d5392bcd17c5ba3463ef0371a17310399415b5bbabb8c0fe15c733feeac65300bfea8b2

  • C:\Users\Admin\AppData\Local\Temp\7zS5F66.tmp\setup.exe

    Filesize

    61KB

    MD5

    16ef6e914973925977cdc5ef6b8b2565

    SHA1

    4815da2815975b33f5dc94d482e6dbc02588afa6

    SHA256

    6b9a2b64b90799f1d50458dc38fb4e9e13a8abb37210c8f5d9eeedae84c6912f

    SHA512

    c74f0e17878c4598b626edb5e75e7ee098b71c0c26454ba709e2ea438517670ce11abf7d909470e6c935a21d0413c0d14b29960af9bd6a423e3261789a35b059

  • C:\Users\Admin\AppData\Local\Temp\7zS5F66.tmp\setup.exe

    Filesize

    61KB

    MD5

    16ef6e914973925977cdc5ef6b8b2565

    SHA1

    4815da2815975b33f5dc94d482e6dbc02588afa6

    SHA256

    6b9a2b64b90799f1d50458dc38fb4e9e13a8abb37210c8f5d9eeedae84c6912f

    SHA512

    c74f0e17878c4598b626edb5e75e7ee098b71c0c26454ba709e2ea438517670ce11abf7d909470e6c935a21d0413c0d14b29960af9bd6a423e3261789a35b059

  • memory/3712-132-0x0000000000000000-mapping.dmp