Analysis

  • max time kernel
    138s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-12-2022 01:24

General

  • Target

    eecc17d931828ac598f9d56e9eb0e56b46a054cd3d2a27e956483ccce0e99bff.exe

  • Size

    250KB

  • MD5

    ce5d1c6d0e025bcb91db97e3e26c3a50

  • SHA1

    5cd811445a372101de5bfe49dd3d445241eb15ec

  • SHA256

    eecc17d931828ac598f9d56e9eb0e56b46a054cd3d2a27e956483ccce0e99bff

  • SHA512

    b13e00b7d6a4dd879900d9b5a486e9029ccbd877538850c0b5f42125cafa3d0dd6d44ed5d24f7b897f075d16226b7a1423a00f01edff0f8bce85ac98f32657e5

  • SSDEEP

    6144:h1OgDPdkBAFZWjadD4s5Q5jH/mpu3uebbHts:h1OgLdaOQ5jH/au3pbJs

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 4 IoCs
  • Modifies registry class 63 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eecc17d931828ac598f9d56e9eb0e56b46a054cd3d2a27e956483ccce0e99bff.exe
    "C:\Users\Admin\AppData\Local\Temp\eecc17d931828ac598f9d56e9eb0e56b46a054cd3d2a27e956483ccce0e99bff.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4648
    • C:\Users\Admin\AppData\Local\Temp\7zS74E6.tmp\506896cbaf7df.exe
      .\506896cbaf7df.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      • System policy modification
      PID:4988

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Download and Sa\506896cbaf817.ocx

    Filesize

    151KB

    MD5

    c78c6140cb88ef4dc94f999291bb5ab1

    SHA1

    65b47ed5ec889e0e558c79a13a81193fc59b8ce9

    SHA256

    6cfc7fb43715fb13c53ab2a29b68f3a0a0f285c85d1b1443f2c5e73526646851

    SHA512

    ac8865cb1bec889ba493cad3f4c4bac87bfb2fdb15c518626ffa5f8ac6799a6f5c84f358d3e7d35824d6aba29af46c1078acdf30c3bd93981be61312baf6bd26

  • C:\Users\Admin\AppData\Local\Temp\7zS74E6.tmp\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    0ddd51a28d86ca073b40550e0e2600fa

    SHA1

    63891845698c50848cd2830baa45b9fc2cfccf9e

    SHA256

    8f3732a9062e1323097dec6d629dc06957ff3fd22808a8230174571bb11bfed4

    SHA512

    50899378bca8f75fcc2519c65bbfcd771b239edc05be4a8311c75d0b9557f2cb98ece0b7dee4c65bf2026a1fa2e5c8fa3feda21794f53c9ff664467500f27149

  • C:\Users\Admin\AppData\Local\Temp\7zS74E6.tmp\[email protected]\chrome.manifest

    Filesize

    116B

    MD5

    63cec26c1f0bc64898c480fe7c4a54f0

    SHA1

    450fa2875e4482aa94f15234f11a0787beb5cd34

    SHA256

    e18c9dbccbcb2e6d650e40046ddb99f6961d942f04fe2c4d581a4bcb04c03f78

    SHA512

    07b499550406ca918a0e71893519989433f37aaafaa7af404a3fc7effe2720a2fbce8b9411255d57afa27ab8347d19a037437611978dfc636521123252dcef8b

  • C:\Users\Admin\AppData\Local\Temp\7zS74E6.tmp\[email protected]\content\bg.js

    Filesize

    8KB

    MD5

    e53a8631d4ac135ef9b351637d660c01

    SHA1

    2425d0787449ad859170fdca0c77963a52360bc2

    SHA256

    3d781e9c609725c697fa38b6da0fa8bcdf960861ce0ab2b05889be661406faf1

    SHA512

    e491d9b28fa6311d2bdb10e73ef524a2487a60315886493d22a9652e0fda20dfa2f735bac9da94582f8b27b87d28759f8937ebcb53ecd30393162f501b046dbe

  • C:\Users\Admin\AppData\Local\Temp\7zS74E6.tmp\[email protected]\content\zy.xul

    Filesize

    225B

    MD5

    8cc5500e2cc0c23c6cfc02b27cdaf110

    SHA1

    11d7b17319ed810ebe53d29bbe25841f0bf9aefd

    SHA256

    086d4b55da5e1225f349cbf419ba0e57bc1fb8fc147c71b24c80e06c5643c997

    SHA512

    153d8effda90a73e1d7eff0e1738e4a7491e37a59699d711ed423790aab6f1d22b6496b5adb89e3642dbacd9d71824ed5b32de7e8575a8dfef1ace73b2d47392

  • C:\Users\Admin\AppData\Local\Temp\7zS74E6.tmp\[email protected]\install.rdf

    Filesize

    718B

    MD5

    020a85e417332531805c22862234e6f1

    SHA1

    e3a9711ebb341d0d83b7b327dd5a156520eacccf

    SHA256

    7d0ea285057647c62c667ba10af0b15c612f6b13b1dbbc154d20b2f79a193869

    SHA512

    849f4d387ad68f4c6f0a24bb783a52be4166210dfb8894e192709497958f348f560f559481debf492cc320bfa41134c6a9899916e9b3c8f34d5308abcb08c8b6

  • C:\Users\Admin\AppData\Local\Temp\7zS74E6.tmp\506896cbaf7df.exe

    Filesize

    65KB

    MD5

    4ccf1a317aa8539c857835e4ebe9c806

    SHA1

    223b73d09d7398f40aff3ccc569e66cae3886ee9

    SHA256

    4529889c5575cd4e28b3691f0489c806442840292a9e459ada4dab3e024cc242

    SHA512

    ecab68799b5a51c7d2a3735a9b3c17ba20a315618aa9575a5b02d5d4535716966031a26982012669f069dbfd8a6ab62f95737b7c402bf680f3a498900f627312

  • C:\Users\Admin\AppData\Local\Temp\7zS74E6.tmp\506896cbaf7df.exe

    Filesize

    65KB

    MD5

    4ccf1a317aa8539c857835e4ebe9c806

    SHA1

    223b73d09d7398f40aff3ccc569e66cae3886ee9

    SHA256

    4529889c5575cd4e28b3691f0489c806442840292a9e459ada4dab3e024cc242

    SHA512

    ecab68799b5a51c7d2a3735a9b3c17ba20a315618aa9575a5b02d5d4535716966031a26982012669f069dbfd8a6ab62f95737b7c402bf680f3a498900f627312

  • C:\Users\Admin\AppData\Local\Temp\7zS74E6.tmp\506896cbaf817.ocx

    Filesize

    151KB

    MD5

    c78c6140cb88ef4dc94f999291bb5ab1

    SHA1

    65b47ed5ec889e0e558c79a13a81193fc59b8ce9

    SHA256

    6cfc7fb43715fb13c53ab2a29b68f3a0a0f285c85d1b1443f2c5e73526646851

    SHA512

    ac8865cb1bec889ba493cad3f4c4bac87bfb2fdb15c518626ffa5f8ac6799a6f5c84f358d3e7d35824d6aba29af46c1078acdf30c3bd93981be61312baf6bd26

  • C:\Users\Admin\AppData\Local\Temp\7zS74E6.tmp\506896cbaf854.html

    Filesize

    4KB

    MD5

    ae306cf8f3925fadf5d0c5c71bf7e2d2

    SHA1

    47cfadc26913c324e27d2592d5b1cd66d4e5c57e

    SHA256

    e710e8bef217a5f9da6366ce27f0f7691e531f7daec47ad62b3e0a2c87065e8b

    SHA512

    49a15cf974a5712075c45c5e60bb2f7a2a9935529455d4d2f024d19d47fa11669ad931c82e7b2e36895e5918cb51b961c026882c179ca2f45b43497df660c571

  • C:\Users\Admin\AppData\Local\Temp\7zS74E6.tmp\506896cbaf88e.js

    Filesize

    9B

    MD5

    99fa5d714d971a49b67de27e0d8871be

    SHA1

    d0621e846ea60fa8d0b2c8e622e495af49cd7359

    SHA256

    f560d76474380da948a0c5ab8682dc026822d9685268c592f315224b1b968bf6

    SHA512

    2fec19e4f2a974227922a7e057890141523ae73fbfa127f9e8cd00dff71b29abb93cb865c6d74ecf3df8bca440c558d4fbf2f80e82cc9636320ab5edb95ebad5

  • C:\Users\Admin\AppData\Local\Temp\7zS74E6.tmp\bgjehcajjedlgdoghnmgphnekldiamdb.crx

    Filesize

    7KB

    MD5

    2fbd0b2dfd5d43f55922c8e7319d4316

    SHA1

    4649e501ab3588510c6edc3bb59a7be6ead46009

    SHA256

    14bcb6022a2c7d6cda78a2b37cedd5d01a58f8e7758431b08cef9163e8cec592

    SHA512

    30b88ca2feb389c53286f1d5b335f723c1718217f9e73b7b4f3e3889dbcf6da716d3039905da1efb8119412ac36d44da94f9572769853cbe6574a8f24888840f

  • C:\Users\Admin\AppData\Local\Temp\7zS74E6.tmp\settings.ini

    Filesize

    924B

    MD5

    a729843c966bc0c48029feb92533eedc

    SHA1

    67eb44119f085bae63026bce394e6d9717633c12

    SHA256

    994cc71edf542cdf28a7481940ea4801b9c53145c4965a40ef85069981b75d66

    SHA512

    bf76d5f91ade3f67caf3390834fe20a4538d793e9249995fec1ea3aedb9dffee8edce29c25afdf48ded65602e9610346b77ca8bf45ce3d831f37610eda78ef23

  • C:\Users\Admin\AppData\Local\Temp\nsx7610.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    7579ade7ae1747a31960a228ce02e666

    SHA1

    8ec8571a296737e819dcf86353a43fcf8ec63351

    SHA256

    564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5

    SHA512

    a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b

  • memory/4988-132-0x0000000000000000-mapping.dmp