Analysis

  • max time kernel
    90s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/12/2022, 06:38

General

  • Target

    ed3f76a1e716971403874f13787d3ab5eefc678fab44cfbb38f3c44502164b2e.exe

  • Size

    252KB

  • MD5

    931e7035de2d8952d928e99689485c2d

  • SHA1

    d70198ac366f4c917193ff546699510f1941aacf

  • SHA256

    ed3f76a1e716971403874f13787d3ab5eefc678fab44cfbb38f3c44502164b2e

  • SHA512

    732c6cb2b579df5e7216ce2b039692b9836e2c2b35f81e4ff39e3825065cfd1a53c8076ecf46a20742c17561d430691fd3a3902202dc778d1696db397bddf2ad

  • SSDEEP

    6144:h1OgDPdkBAFZWjadD4s5v7IIZmE8ttQNG7VHvwicc:h1OgLdaOFZz8tt+IHYs

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 4 IoCs
  • Modifies registry class 63 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed3f76a1e716971403874f13787d3ab5eefc678fab44cfbb38f3c44502164b2e.exe
    "C:\Users\Admin\AppData\Local\Temp\ed3f76a1e716971403874f13787d3ab5eefc678fab44cfbb38f3c44502164b2e.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1656
    • C:\Users\Admin\AppData\Local\Temp\7zSCDE4.tmp\50620b608d837.exe
      .\50620b608d837.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      • System policy modification
      PID:4504

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\wxDownload\50620b608d875.ocx

    Filesize

    142KB

    MD5

    633e7480df2a82ffb537684d1c4b5be1

    SHA1

    6534c6f3342819ec7ad126fcae46aa70e8a277e7

    SHA256

    de1c043cd39c887c12ab24581903cd242287afeb46c7c02e9b52a659ae2945a7

    SHA512

    f77d7a0b1bb2bbbfb8eab7fa2d50a13f4f75c7a56bcdc26d026981940bcb1c30cbf8c27e07a0f828dc214616759dc9ecddf184f672f437df8606e76693f3270c

  • C:\Users\Admin\AppData\Local\Temp\7zSCDE4.tmp\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    1c17828e9e10ae7c718244aad35e8a29

    SHA1

    0ad1e7c1909bd7e2fafc4fddc2fac0bf5c2fbec9

    SHA256

    44b4edaec65c8455bc6edca9ed1b4a285d484f52271418f25d130b6a43c5dd63

    SHA512

    11e3683be8e27985d17b93f39a0cfe268435ab8ded5e1ea5266d2950da290476eab8c874541b462fd45b8a38afbd654c3fee222cf7aae17f2e3e5056b28cadf8

  • C:\Users\Admin\AppData\Local\Temp\7zSCDE4.tmp\[email protected]\chrome.manifest

    Filesize

    116B

    MD5

    b23dc47e791ec18fee22ceb71cfba3f9

    SHA1

    82b1622eca2eb182dee23eb6cc9be3c77cd8b927

    SHA256

    2d42b8d64e814820bbb8a702ac7c813796bff117fda8431b37c466c1b23a6ebc

    SHA512

    be3a7a4cad42cb0f8936fb9d7419ed03ccea6fcef7417ccccda78e9ef9e8659593a57bbd3df1b60fb1455d56faf26292e487ca8064a339abab165bbcff43099c

  • C:\Users\Admin\AppData\Local\Temp\7zSCDE4.tmp\[email protected]\content\bg.js

    Filesize

    8KB

    MD5

    ea8896255e48f0a43d13d914ea85784a

    SHA1

    1b1feb19b9e425aec44fb5ff167e9ebe82a3858c

    SHA256

    af3e1bbed96e1ad2d839bf5d214c4f43cb192385dff381836db8c1027fc9556f

    SHA512

    9cc47974e4ae03192cd13deb54ea3af73eb471d8772601b97c8c25db31a40e3d6383c61a926937e2ff69ebabeb30500d6ddb35ec8137ad94125891cd7eae77ad

  • C:\Users\Admin\AppData\Local\Temp\7zSCDE4.tmp\[email protected]\content\zy.xul

    Filesize

    225B

    MD5

    6e978c471256ffe3d7719733c3129eac

    SHA1

    e32a98c88bc6af6cc17965de6907e7cbcadea896

    SHA256

    bcd33391170609bb0924cf6c430e3a7b1916d7f48f2cd824a6e323bb8303649b

    SHA512

    8172b26ec308d06a7c598f1be2b3d2adf239a92f655962b9030edec5d238f8b9194b9203a4812aa87902a21843febb86037b408f1abfa126f349898b86eb9ae9

  • C:\Users\Admin\AppData\Local\Temp\7zSCDE4.tmp\[email protected]\install.rdf

    Filesize

    717B

    MD5

    0be7b9b1b42384c75052d1c4933ebb65

    SHA1

    91bfffa93287a7616fc36f9cf0877d6c2caf8794

    SHA256

    1c6616dcb9a1578a918b351e592ebd75a33994bb1fc9fb8d87ec00e321671cde

    SHA512

    bed7d11895a84cae4c046e695d7ec0ee48291a67ba738e4a2abb2c389af8fc5b2f3eec2b8514bebff0c287f26b57278b8a417875e817a0b97db28479b7efd763

  • C:\Users\Admin\AppData\Local\Temp\7zSCDE4.tmp\50620b608d837.exe

    Filesize

    65KB

    MD5

    4ccf1a317aa8539c857835e4ebe9c806

    SHA1

    223b73d09d7398f40aff3ccc569e66cae3886ee9

    SHA256

    4529889c5575cd4e28b3691f0489c806442840292a9e459ada4dab3e024cc242

    SHA512

    ecab68799b5a51c7d2a3735a9b3c17ba20a315618aa9575a5b02d5d4535716966031a26982012669f069dbfd8a6ab62f95737b7c402bf680f3a498900f627312

  • C:\Users\Admin\AppData\Local\Temp\7zSCDE4.tmp\50620b608d837.exe

    Filesize

    65KB

    MD5

    4ccf1a317aa8539c857835e4ebe9c806

    SHA1

    223b73d09d7398f40aff3ccc569e66cae3886ee9

    SHA256

    4529889c5575cd4e28b3691f0489c806442840292a9e459ada4dab3e024cc242

    SHA512

    ecab68799b5a51c7d2a3735a9b3c17ba20a315618aa9575a5b02d5d4535716966031a26982012669f069dbfd8a6ab62f95737b7c402bf680f3a498900f627312

  • C:\Users\Admin\AppData\Local\Temp\7zSCDE4.tmp\50620b608d875.ocx

    Filesize

    142KB

    MD5

    633e7480df2a82ffb537684d1c4b5be1

    SHA1

    6534c6f3342819ec7ad126fcae46aa70e8a277e7

    SHA256

    de1c043cd39c887c12ab24581903cd242287afeb46c7c02e9b52a659ae2945a7

    SHA512

    f77d7a0b1bb2bbbfb8eab7fa2d50a13f4f75c7a56bcdc26d026981940bcb1c30cbf8c27e07a0f828dc214616759dc9ecddf184f672f437df8606e76693f3270c

  • C:\Users\Admin\AppData\Local\Temp\7zSCDE4.tmp\50620b608d8c5.html

    Filesize

    4KB

    MD5

    780cb54e08173b01bd078515cdbbfb86

    SHA1

    5f2a0b1b2d7544b489349de596838e592d38c0bc

    SHA256

    080f45eeca5d832f544cb06c4c0eb0bebed0aabb2a422d7f92c6e95fc7fe8b0a

    SHA512

    e53e0a3c3eec09c217c5ea1475296154a6246ccf72a510d61b0655995b8302708fa387022391df98d51cac0920c097606e2f4434a3ecb2585e87e191f53347d1

  • C:\Users\Admin\AppData\Local\Temp\7zSCDE4.tmp\50620b608d906.js

    Filesize

    9B

    MD5

    99fa5d714d971a49b67de27e0d8871be

    SHA1

    d0621e846ea60fa8d0b2c8e622e495af49cd7359

    SHA256

    f560d76474380da948a0c5ab8682dc026822d9685268c592f315224b1b968bf6

    SHA512

    2fec19e4f2a974227922a7e057890141523ae73fbfa127f9e8cd00dff71b29abb93cb865c6d74ecf3df8bca440c558d4fbf2f80e82cc9636320ab5edb95ebad5

  • C:\Users\Admin\AppData\Local\Temp\7zSCDE4.tmp\ggialjbhadfeecgkgediallbpgffogha.crx

    Filesize

    7KB

    MD5

    abb9130cf5b5ce8f7ca188a84e51ba22

    SHA1

    626a7ec9bfce265f8e699a4364a4e38fbbf9034f

    SHA256

    7c7d3d1958831524bb0bded7601933de019fbd3dd50c649585b6e1ddd3bb8a97

    SHA512

    feabc0f7f18295bc35e4e61904f8a9ffcf0aced5860750279fc1536169c5b72eb4df56fc296c7bce4ff2bc103609c0dc0a5eb008b8ab3a3aafc0b509b71554d2

  • C:\Users\Admin\AppData\Local\Temp\7zSCDE4.tmp\settings.ini

    Filesize

    903B

    MD5

    017284b87c2f461431f62fc0b0350038

    SHA1

    6819405a6ce34a90c9a41bef85a32325492283d2

    SHA256

    a77068fb2c38c9a42556d8c537a9e10f1e7ed3e1f4c5a2353748cc58de51b840

    SHA512

    99d44b7893d25d6c79c3ee4a577020ffa97a9bb5aa330afe9987ee37c1f1bf4cd5f28cc9391ef7865e567ad126e397609504ae3f36b322be497b20d55fb61b5a

  • C:\Users\Admin\AppData\Local\Temp\nskE1F9.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    7579ade7ae1747a31960a228ce02e666

    SHA1

    8ec8571a296737e819dcf86353a43fcf8ec63351

    SHA256

    564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5

    SHA512

    a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b