Analysis

  • max time kernel
    21s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    01-12-2022 06:40

General

  • Target

    b2448935a43065d0b2fbe556750eb4a5204a0da8a6dc61e20ec4bc4123dc4f7b.exe

  • Size

    252KB

  • MD5

    b0b89975ae9e27a090c4444cf60c5e6d

  • SHA1

    e3d1efb3936547d2bea0bdaab55beab23f57c8a5

  • SHA256

    b2448935a43065d0b2fbe556750eb4a5204a0da8a6dc61e20ec4bc4123dc4f7b

  • SHA512

    247fb4088232d0f75bde1b4989fd2006ab18bdc163ec714e748f60ab09babd47fde20386f380ecb9255f5a2a0e52db11712c4031484aaf560ba71afffd4d4fed

  • SSDEEP

    6144:h1OgDPdkBAFZWjadD4s547I2kUrwOl1fipn:h1OgLdaO4sOwZn

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 8 IoCs
  • Modifies registry class 63 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b2448935a43065d0b2fbe556750eb4a5204a0da8a6dc61e20ec4bc4123dc4f7b.exe
    "C:\Users\Admin\AppData\Local\Temp\b2448935a43065d0b2fbe556750eb4a5204a0da8a6dc61e20ec4bc4123dc4f7b.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Users\Admin\AppData\Local\Temp\7zSAD02.tmp\505dfd267d52e.exe
      .\505dfd267d52e.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      • System policy modification
      PID:832

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7zSAD02.tmp\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    f436e44189936842d18cac628118da81

    SHA1

    5e7915bc06ab1dfb765dd640687de4e23bddc7ad

    SHA256

    8cda199fc33c8de48a370ac056046c0bfd36013ea407e9bea590d22a682fe6b1

    SHA512

    287c210a29bced8a942cc2ad9781ad2994a3c5b68c96a9032b373fa7506dee8da525f761f570c4a9e52cc8d60bac54d7774cd544cd8967fcb0e059e87570c0a7

  • C:\Users\Admin\AppData\Local\Temp\7zSAD02.tmp\[email protected]\chrome.manifest

    Filesize

    116B

    MD5

    f51b2a704bd6ab4f142f7d53dea256e0

    SHA1

    e46a38368198a5460120229e2c8ed51d0a1a1a3b

    SHA256

    7e2ccb15449b44a12a08436467a96faf45667521db2d38559c34e6766d663162

    SHA512

    8dea92d199e9191b2af77bb97625f56a618132a8c35b5fd3bae37f4a107b176df316cb9b89fd6b394715c763504eee6ae46d9a87277d7f7436394ddb2c1b1eeb

  • C:\Users\Admin\AppData\Local\Temp\7zSAD02.tmp\[email protected]\content\bg.js

    Filesize

    8KB

    MD5

    1ec1d28bb29953dbbdfdc76be0a3061b

    SHA1

    696bb329c43928f43e42d799dc18afb1551b38ed

    SHA256

    c76b3b143396be009531bf4cc3791893f0580d3547f8d8299f48b0673e4fb1be

    SHA512

    d64fe31c0de374cfe518df6866522c5b0bc314dba8537f3311b0dadd59457575ce97077ac796098c4e05efa518058cfb8c2844b96da62d80b22ce7bd123ce638

  • C:\Users\Admin\AppData\Local\Temp\7zSAD02.tmp\[email protected]\content\zy.xul

    Filesize

    225B

    MD5

    e9dae07d26f62674a18411dc5c82128a

    SHA1

    a076066e2017134f14855ce0938c3510b5cb3cd7

    SHA256

    9e7d56a5958eac1197d7bbc38f1251765c13ef002bfa08dfa58e682980998fb8

    SHA512

    722d324fec863ebba93a651194024345c1d7ad5c0d1d307280cb010f901322d7c6fecbbeefbd057c613b2d09f12a82bd9e324ed9f13e16278b1ba74bca777fc6

  • C:\Users\Admin\AppData\Local\Temp\7zSAD02.tmp\[email protected]\install.rdf

    Filesize

    717B

    MD5

    4cff463a1fc4595817941225ca8c0622

    SHA1

    7abe8fd3081bbe9c7bf4324388e956f3f974e218

    SHA256

    8084e4043b41d092f833dbcd8839f6f344168819c14a247617fd5d04158a94d4

    SHA512

    be6ce71264a13f74b78242d99fb7a156aaa4a7269b365adcc3b49b394cf30ac34a1a91148cd6526ff08b47467aea3e77e8775505e9094d4895f30a993f210820

  • C:\Users\Admin\AppData\Local\Temp\7zSAD02.tmp\505dfd267d52e.exe

    Filesize

    65KB

    MD5

    4ccf1a317aa8539c857835e4ebe9c806

    SHA1

    223b73d09d7398f40aff3ccc569e66cae3886ee9

    SHA256

    4529889c5575cd4e28b3691f0489c806442840292a9e459ada4dab3e024cc242

    SHA512

    ecab68799b5a51c7d2a3735a9b3c17ba20a315618aa9575a5b02d5d4535716966031a26982012669f069dbfd8a6ab62f95737b7c402bf680f3a498900f627312

  • C:\Users\Admin\AppData\Local\Temp\7zSAD02.tmp\505dfd267d52e.exe

    Filesize

    65KB

    MD5

    4ccf1a317aa8539c857835e4ebe9c806

    SHA1

    223b73d09d7398f40aff3ccc569e66cae3886ee9

    SHA256

    4529889c5575cd4e28b3691f0489c806442840292a9e459ada4dab3e024cc242

    SHA512

    ecab68799b5a51c7d2a3735a9b3c17ba20a315618aa9575a5b02d5d4535716966031a26982012669f069dbfd8a6ab62f95737b7c402bf680f3a498900f627312

  • C:\Users\Admin\AppData\Local\Temp\7zSAD02.tmp\505dfd267d566.dll

    Filesize

    142KB

    MD5

    633e7480df2a82ffb537684d1c4b5be1

    SHA1

    6534c6f3342819ec7ad126fcae46aa70e8a277e7

    SHA256

    de1c043cd39c887c12ab24581903cd242287afeb46c7c02e9b52a659ae2945a7

    SHA512

    f77d7a0b1bb2bbbfb8eab7fa2d50a13f4f75c7a56bcdc26d026981940bcb1c30cbf8c27e07a0f828dc214616759dc9ecddf184f672f437df8606e76693f3270c

  • C:\Users\Admin\AppData\Local\Temp\7zSAD02.tmp\505dfd267d59f.html

    Filesize

    4KB

    MD5

    06aab9c5e7d607dfa3fd65ea2036347f

    SHA1

    7efef5fe49fbda14cef77857fa7c50efc55ebf41

    SHA256

    6706d89d6d867417860c8b4df8d0eeeb5ae385218068f2152d547695d234fb7c

    SHA512

    de02bae82c99e05e95bc227c2837014104da62a5e67793289688bd802999854f19ba8bb8007d55a8482f24dd0c8060e4ce8a7c93fd746a95125570d697edd8e1

  • C:\Users\Admin\AppData\Local\Temp\7zSAD02.tmp\505dfd267d5d8.js

    Filesize

    9B

    MD5

    99fa5d714d971a49b67de27e0d8871be

    SHA1

    d0621e846ea60fa8d0b2c8e622e495af49cd7359

    SHA256

    f560d76474380da948a0c5ab8682dc026822d9685268c592f315224b1b968bf6

    SHA512

    2fec19e4f2a974227922a7e057890141523ae73fbfa127f9e8cd00dff71b29abb93cb865c6d74ecf3df8bca440c558d4fbf2f80e82cc9636320ab5edb95ebad5

  • C:\Users\Admin\AppData\Local\Temp\7zSAD02.tmp\hcecjpigopnpgckgjfbhlehaemkebkbg.crx

    Filesize

    7KB

    MD5

    6fdfa17e3c419b25b77503c0cc707433

    SHA1

    a659e8bb99bab572917f3f306a1101256ebcb71b

    SHA256

    d9d27e45b469f860e3d74cb18d5c6d179af4b6649077228229a217394e31ed74

    SHA512

    bd7e9362427404873a711dd656355a80f061b8e47db6dd871f6700ad9363581e639cbc28d0d192499c71150365e4762518f3f5804a4cd87252a12c88abfa9ce5

  • C:\Users\Admin\AppData\Local\Temp\7zSAD02.tmp\settings.ini

    Filesize

    905B

    MD5

    c5147d563e26b2dfeb246042a5c0cd7b

    SHA1

    5b3d0606d977d0891a79e73281c20c6653862cc5

    SHA256

    0cd5a06e0dd946c028fe5e527f82ef2de68dd805501c834fa821af10656ac8e2

    SHA512

    3ac9540d80ad3344440e605bc7a7658fce519e578571685d2e5f479119209a4e644cdfa7bf4082f7c2f72546c71bce0857d84237f181109da27945ca4f1e4ac3

  • \ProgramData\wxDownload\505dfd267d566.dll

    Filesize

    142KB

    MD5

    633e7480df2a82ffb537684d1c4b5be1

    SHA1

    6534c6f3342819ec7ad126fcae46aa70e8a277e7

    SHA256

    de1c043cd39c887c12ab24581903cd242287afeb46c7c02e9b52a659ae2945a7

    SHA512

    f77d7a0b1bb2bbbfb8eab7fa2d50a13f4f75c7a56bcdc26d026981940bcb1c30cbf8c27e07a0f828dc214616759dc9ecddf184f672f437df8606e76693f3270c

  • \ProgramData\wxDownload\uninstall.exe

    Filesize

    48KB

    MD5

    a724dac649142fef71fe4b529684e969

    SHA1

    e2878e84886ec53a1332ad969a825062526b5cd4

    SHA256

    b58c58b5073034d74c5d93902bbb9d402be063e907bdf77115b55bbb99af21dc

    SHA512

    9f475ad52fa2b7f82e74df87c02e42f937b5e3b62773b7d51cb53facfcc8b4934ad3c2fc21496cfabaa4dd103a309ed5cccad1ad3d6037f6c4f3a540e3e9d5b3

  • \Users\Admin\AppData\Local\Temp\7zSAD02.tmp\505dfd267d52e.exe

    Filesize

    65KB

    MD5

    4ccf1a317aa8539c857835e4ebe9c806

    SHA1

    223b73d09d7398f40aff3ccc569e66cae3886ee9

    SHA256

    4529889c5575cd4e28b3691f0489c806442840292a9e459ada4dab3e024cc242

    SHA512

    ecab68799b5a51c7d2a3735a9b3c17ba20a315618aa9575a5b02d5d4535716966031a26982012669f069dbfd8a6ab62f95737b7c402bf680f3a498900f627312

  • \Users\Admin\AppData\Local\Temp\nseAE5B.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    7579ade7ae1747a31960a228ce02e666

    SHA1

    8ec8571a296737e819dcf86353a43fcf8ec63351

    SHA256

    564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5

    SHA512

    a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b

  • memory/832-56-0x0000000000000000-mapping.dmp

  • memory/2020-54-0x0000000074FD1000-0x0000000074FD3000-memory.dmp

    Filesize

    8KB