Analysis

  • max time kernel
    169s
  • max time network
    188s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/12/2022, 01:25

General

  • Target

    c8984a359ec64c373b0a15d2868b96f4ba8804fb9e1a9397398de9389533abd4.exe

  • Size

    252KB

  • MD5

    762307b496457c4e7a14ccf6dc4cfe44

  • SHA1

    3b9abd62ba947eff11b97055c1a03994734338eb

  • SHA256

    c8984a359ec64c373b0a15d2868b96f4ba8804fb9e1a9397398de9389533abd4

  • SHA512

    231f0127f0761c2c7f83086b8506f50e08938f279398177de07fe9484b1a23959cf9a8c038c5ec14d592947f61faabf85d718833a2bc51c68d6180544ec6dc30

  • SSDEEP

    6144:91OgDPdkBAFZWjadD4s/LO9IB/ozMxpQDkafXlYQrcAxSpH9yY:91OgLdaQi9IFxm4kJrcP9t

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 4 IoCs
  • Modifies registry class 63 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c8984a359ec64c373b0a15d2868b96f4ba8804fb9e1a9397398de9389533abd4.exe
    "C:\Users\Admin\AppData\Local\Temp\c8984a359ec64c373b0a15d2868b96f4ba8804fb9e1a9397398de9389533abd4.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1672
    • C:\Users\Admin\AppData\Local\Temp\7zS1220.tmp\setup.exe
      .\setup.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      • System policy modification
      PID:4664

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\ADDICT-THING\bhoclass.dll

    Filesize

    139KB

    MD5

    4b35f6c1f932f52fa9901fbc47b432df

    SHA1

    8e842bf068b04f36475a3bf86c5ea6a9839bbb5e

    SHA256

    2b4d643a8a14f060bf3885f872b36e5e1fe1e777ad94783ba9593487c8e1f196

    SHA512

    8716b9a8e46933bf29348254a68d1a21392bdbbe3b4d5010e55fe638d02cc04eb685e424d440f7c5b58ffbca82e5772dd95bef73fa831595c2ae9599f3b05a99

  • C:\Users\Admin\AppData\Local\Temp\7zS1220.tmp\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    f0ded83c97e0190109bc35e59c3a86a3

    SHA1

    8ba0d099b3ae07ed479f45000f422f78a579254f

    SHA256

    9301e5cd5c9018835f5656cdbc01e62968d2cdc305f4230fdd2b12e256463484

    SHA512

    6a437fc06c2db07568606e8a9561f51e6d038d8afb2c05608167e42c5c134290d96a8be80851b01175e579f07685dc49ac1921f497f2f384670ccb24a1cbbb52

  • C:\Users\Admin\AppData\Local\Temp\7zS1220.tmp\[email protected]\chrome.manifest

    Filesize

    116B

    MD5

    eb16bd86382db16407cfe416d78e87bb

    SHA1

    1483fbe1ef1812e177a47f582cc0cc9486391927

    SHA256

    2ad1cde30bfae4c250a4ae7cd30ccd5fcd5ebc9f782c1cc797a75bc7bc794778

    SHA512

    21c322fd7dc1e2cb44caf1a534c752bc6d27ac5e8b81d2becac24cffb74ad9b379390a3490415ba74b5d54e07d1c3f45dead0288ccca2ae34fa8c18776d48c9d

  • C:\Users\Admin\AppData\Local\Temp\7zS1220.tmp\[email protected]\content\bg.js

    Filesize

    8KB

    MD5

    3d7529bad18daced3104db61a7213847

    SHA1

    ca0820883b67df4c7db734d13c1a110ddf4da437

    SHA256

    fe203d7b5f8e6b36d8967661d0a08dc7a208684047b94bbc66118c7258ab33a6

    SHA512

    9de596a1b26f0c3576e79ed21a94d9ebadc3fdd26edf3680b975db9158f8df428edaf83f96b8be732cadf1570ff2bcd946376ea01fe2f575d0d8655adeaf029e

  • C:\Users\Admin\AppData\Local\Temp\7zS1220.tmp\[email protected]\content\zy.xul

    Filesize

    225B

    MD5

    a134a94fa9f60153c95a96d48938515e

    SHA1

    5f4835347a74c9d5e34d212e02e7acbb8a13aedd

    SHA256

    8afa9b15a3e3975343db1a7282ce01198962096b5c90a1d6e0993873dd50fa01

    SHA512

    c064c1b22131e86406a39608e563cecfdfbe61f46e9f7b405306387e81170a77a38980d48c2f5d1b274fa81f6b26bac9f1b6ed2e7773ea813c5e04f23690fce5

  • C:\Users\Admin\AppData\Local\Temp\7zS1220.tmp\[email protected]\install.rdf

    Filesize

    714B

    MD5

    4173b242a1eb6ea67d35d2a9f380dcdf

    SHA1

    e41eec5002adb161d3497739caaeccfbd0470ac1

    SHA256

    0e3f1960884a3d8ce7486e95a5e89fd73b26528dd9ccce2688085002b2d2458e

    SHA512

    f7d94ca39a08e952d75197d777095ebe386392a133f05777872e850fcbfad68da347a118ccd7b7c1f20c261206e7afd5705ca18ee10dcd0be36051a3711af71e

  • C:\Users\Admin\AppData\Local\Temp\7zS1220.tmp\background.html

    Filesize

    4KB

    MD5

    31cd20018be353829ac256c7159a543e

    SHA1

    de7049d1b652222659c1dc9709ab7c43c1c5575a

    SHA256

    64a995fb5ed659d206fea7c4a56475d2d6f218a2de87e9bdb89d0ef6044817db

    SHA512

    29e82635a9da9f118a36d86eddd3a68f02b7ea04420e58f446581a2eadb09141f056ec9ca03e43c83919f33678cfddb7115bbafbfb21763b0b81f88f943b1afa

  • C:\Users\Admin\AppData\Local\Temp\7zS1220.tmp\bhoclass.dll

    Filesize

    139KB

    MD5

    4b35f6c1f932f52fa9901fbc47b432df

    SHA1

    8e842bf068b04f36475a3bf86c5ea6a9839bbb5e

    SHA256

    2b4d643a8a14f060bf3885f872b36e5e1fe1e777ad94783ba9593487c8e1f196

    SHA512

    8716b9a8e46933bf29348254a68d1a21392bdbbe3b4d5010e55fe638d02cc04eb685e424d440f7c5b58ffbca82e5772dd95bef73fa831595c2ae9599f3b05a99

  • C:\Users\Admin\AppData\Local\Temp\7zS1220.tmp\bkpnljhhfalneikmgldlipbfmineioko.crx

    Filesize

    3KB

    MD5

    7f1a6996fb87b13a0a9fbe5991bf0e20

    SHA1

    acc8d71e327ca269d4a10fc3d11fc2c5c29e1d4d

    SHA256

    eaba180b41be7aaa38aa12f85697296290f8a3da21c0aa27e346a88f0c108ec0

    SHA512

    ee70604af33a3b83ec8d62be40fc98b391ce291b47d75c1abff89cd7dd50c0b7b05c234f78368b77f810b42aedd9a29e815d7a82a62e3d2d12032dbda60de06b

  • C:\Users\Admin\AppData\Local\Temp\7zS1220.tmp\content.js

    Filesize

    387B

    MD5

    21d6d28879dee37993cb1b1e472d7c1e

    SHA1

    6939a0f19ba1efbe653a41fcc1613f81aa6f8177

    SHA256

    e3ed518f05bb06d374c2fa624ccefb49f903e8090d4644e5f12f1f2c6659f97d

    SHA512

    128b6452f12809e074e34ab7a2f628ac8856e5423f72519ab7ebd28623935d0a3a8d73d367cdf4ab15e0d94e297d992e3ac6133a5c8bfbb1e61883d556d88f19

  • C:\Users\Admin\AppData\Local\Temp\7zS1220.tmp\settings.ini

    Filesize

    667B

    MD5

    06d55b71304a29395b69ba37315bbdf1

    SHA1

    c8d0fc44d5f0dbbc2df487c2b19e088d250e1eaa

    SHA256

    23f99d86336f55fbc514daad2e7414609818ace25c6234ba79e2f42f32d598ac

    SHA512

    f1782a0b88b4010cfc86404aa7f1a3ac3b96ed74c0dc83682468b3e56577d762c3c1272423e2ad60b376b3f8f32ce7656f961fa923b0f3b0a1bcd58eb8b9e87a

  • C:\Users\Admin\AppData\Local\Temp\7zS1220.tmp\setup.exe

    Filesize

    61KB

    MD5

    16ef6e914973925977cdc5ef6b8b2565

    SHA1

    4815da2815975b33f5dc94d482e6dbc02588afa6

    SHA256

    6b9a2b64b90799f1d50458dc38fb4e9e13a8abb37210c8f5d9eeedae84c6912f

    SHA512

    c74f0e17878c4598b626edb5e75e7ee098b71c0c26454ba709e2ea438517670ce11abf7d909470e6c935a21d0413c0d14b29960af9bd6a423e3261789a35b059

  • C:\Users\Admin\AppData\Local\Temp\7zS1220.tmp\setup.exe

    Filesize

    61KB

    MD5

    16ef6e914973925977cdc5ef6b8b2565

    SHA1

    4815da2815975b33f5dc94d482e6dbc02588afa6

    SHA256

    6b9a2b64b90799f1d50458dc38fb4e9e13a8abb37210c8f5d9eeedae84c6912f

    SHA512

    c74f0e17878c4598b626edb5e75e7ee098b71c0c26454ba709e2ea438517670ce11abf7d909470e6c935a21d0413c0d14b29960af9bd6a423e3261789a35b059