Analysis

  • max time kernel
    19s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    02/12/2022, 01:24

General

  • Target

    cbfbf882287f77e19c7a6db5aff23b7000d394c5770fc7500f16c9eb418835f2.exe

  • Size

    252KB

  • MD5

    db790d970def4296bcb7d6c92ebd0be8

  • SHA1

    9897d2f61290f1f7caf827093f7ed8bc673fb679

  • SHA256

    cbfbf882287f77e19c7a6db5aff23b7000d394c5770fc7500f16c9eb418835f2

  • SHA512

    56ad83e59735360b109c69a4372a350456fb53a9d3ad9e011e34254dc410407ed7c614142f1baaa8245c821d25a86de213fe523598608f0fa751f6e232e17d63

  • SSDEEP

    6144:h1OgDPdkBAFZWjadD4s5Zwm6siz1tE9nQ0VUujYvJ9zr:h1OgLdaOZ6tz7ExQAUucvJ9n

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 8 IoCs
  • Modifies registry class 63 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cbfbf882287f77e19c7a6db5aff23b7000d394c5770fc7500f16c9eb418835f2.exe
    "C:\Users\Admin\AppData\Local\Temp\cbfbf882287f77e19c7a6db5aff23b7000d394c5770fc7500f16c9eb418835f2.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1748
    • C:\Users\Admin\AppData\Local\Temp\7zS32B5.tmp\50530ba282b31.exe
      .\50530ba282b31.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      • System policy modification
      PID:1116

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\7zS32B5.tmp\[email protected]\bootstrap.js

          Filesize

          2KB

          MD5

          1a177676374a93168b68132f83216a79

          SHA1

          3f6ac1c14f36828600112a879867671b2acfc389

          SHA256

          5ea684651ad7915178b718aa3b6c6a79ccd571a3d088b7ca1d1787879d9b98d6

          SHA512

          4ba8c8fafe17327ee972d8034ace001e05af3a8af46f677dfa927ce62694903f8521ca3f7bf6185a0f2958f7c5e619a26819e75a566c8c4b7ce42af048e5980f

        • C:\Users\Admin\AppData\Local\Temp\7zS32B5.tmp\[email protected]\chrome.manifest

          Filesize

          116B

          MD5

          9d6d56223f84d130dc11f4213b9b1ae6

          SHA1

          5259769607ba26d57536bd5bc296cbb16c0d3650

          SHA256

          6976df75320963dd5eeb2f888378e7faff38a7b75411f3152b116746360773b9

          SHA512

          2ed421f434b66ac51efecd68df882e3cbefd068fc5f7eee84aa659021dfa8229f7c24965bca8415aa7d032f7787087619a3c005cd611915cd0fb2f24a54c1e41

        • C:\Users\Admin\AppData\Local\Temp\7zS32B5.tmp\[email protected]\content\bg.js

          Filesize

          8KB

          MD5

          01afcd57d6d81ab21ece3d39eb6d0bb8

          SHA1

          d013c18e3ae9acfc47c1dd8d9876196a3fe2aa9c

          SHA256

          9e8dece3859e6fbf4bd87ad11af0ece93f22e0cea8f34ba8ea56409cafbda338

          SHA512

          82debb80eff6a426bcfe8a18a1bdbb733f43b36e5a366b1732e46ac34ef815bb351827c66407921728ff7b1d8fad6779b5e279dfdbac98c495f1c848a257e3f4

        • C:\Users\Admin\AppData\Local\Temp\7zS32B5.tmp\[email protected]\content\zy.xul

          Filesize

          225B

          MD5

          3d8b4c8fdef47722f1a3ce6920f9bf23

          SHA1

          492d5b963f7803ffc01b9943c78362248bf1379d

          SHA256

          4fb21007a78a1e4652ca21c7a279165081da51ef6cd959471b092a61400c0e2e

          SHA512

          78ef3b42cdf328f08c52f3bfce5347360a5cdb8c0c0159906fd9ff9a60240624a2bdf8146080452efb68f69344a4020eef2adbfa2773f68c92ab8088eb06bfd6

        • C:\Users\Admin\AppData\Local\Temp\7zS32B5.tmp\[email protected]\install.rdf

          Filesize

          717B

          MD5

          af5e1032ad357543f6db9e44b226b8d1

          SHA1

          c20ac031d7a324f7419d4cf47b930c4fede7f225

          SHA256

          1b9616726e91aa8ee84bcc2e499223bcc02f5cfce64f69243871ac385f6eb72e

          SHA512

          2c7aa31810a32146928049f41b49b46cf3dc3611c12e4462483b5c223682e1934a2d7c9a6f3bb7191467e1b3f704bbd9039392d132614dee42609143cb6c4c56

        • C:\Users\Admin\AppData\Local\Temp\7zS32B5.tmp\50530ba282b31.exe

          Filesize

          65KB

          MD5

          4ccf1a317aa8539c857835e4ebe9c806

          SHA1

          223b73d09d7398f40aff3ccc569e66cae3886ee9

          SHA256

          4529889c5575cd4e28b3691f0489c806442840292a9e459ada4dab3e024cc242

          SHA512

          ecab68799b5a51c7d2a3735a9b3c17ba20a315618aa9575a5b02d5d4535716966031a26982012669f069dbfd8a6ab62f95737b7c402bf680f3a498900f627312

        • C:\Users\Admin\AppData\Local\Temp\7zS32B5.tmp\50530ba282b31.exe

          Filesize

          65KB

          MD5

          4ccf1a317aa8539c857835e4ebe9c806

          SHA1

          223b73d09d7398f40aff3ccc569e66cae3886ee9

          SHA256

          4529889c5575cd4e28b3691f0489c806442840292a9e459ada4dab3e024cc242

          SHA512

          ecab68799b5a51c7d2a3735a9b3c17ba20a315618aa9575a5b02d5d4535716966031a26982012669f069dbfd8a6ab62f95737b7c402bf680f3a498900f627312

        • C:\Users\Admin\AppData\Local\Temp\7zS32B5.tmp\50530ba282b69.dll

          Filesize

          142KB

          MD5

          633e7480df2a82ffb537684d1c4b5be1

          SHA1

          6534c6f3342819ec7ad126fcae46aa70e8a277e7

          SHA256

          de1c043cd39c887c12ab24581903cd242287afeb46c7c02e9b52a659ae2945a7

          SHA512

          f77d7a0b1bb2bbbfb8eab7fa2d50a13f4f75c7a56bcdc26d026981940bcb1c30cbf8c27e07a0f828dc214616759dc9ecddf184f672f437df8606e76693f3270c

        • C:\Users\Admin\AppData\Local\Temp\7zS32B5.tmp\50530ba282ba2.html

          Filesize

          4KB

          MD5

          6d92ae0d5a0ab6c0d760a0117e181522

          SHA1

          981f3bc66c6dc521376b357e8c7b7242d9615e9f

          SHA256

          41028dc753bf4315cac074e8d95a10b1c725057ede81900f7b94f2cd557db7be

          SHA512

          8df85c6978882f440d12c424b065a80e707bd96bf9e6a913ecb13597cc331359cb1b08490e58e2c1efff16eb2d813060fd5e48da5e35fc9238b076cfc0755e91

        • C:\Users\Admin\AppData\Local\Temp\7zS32B5.tmp\50530ba282bdb.js

          Filesize

          9B

          MD5

          99fa5d714d971a49b67de27e0d8871be

          SHA1

          d0621e846ea60fa8d0b2c8e622e495af49cd7359

          SHA256

          f560d76474380da948a0c5ab8682dc026822d9685268c592f315224b1b968bf6

          SHA512

          2fec19e4f2a974227922a7e057890141523ae73fbfa127f9e8cd00dff71b29abb93cb865c6d74ecf3df8bca440c558d4fbf2f80e82cc9636320ab5edb95ebad5

        • C:\Users\Admin\AppData\Local\Temp\7zS32B5.tmp\laoallkllklhdopinfmbghahaakbajnc.crx

          Filesize

          7KB

          MD5

          a55cd2b7c54a2d931ca66004f78c883e

          SHA1

          e3635aaca41d3f0e183155286bea4642e7f991fc

          SHA256

          bae12381a6d29a7400f5ec06d7dfc5ad34d04b10b4d15a00273dc427e90e47bb

          SHA512

          c7ea7759553262b49e4a70d2c9926b314d1b9838d5d16d2720bf4fae16ff29a05b8055d9f3ec7eb9b7298194910ee0efb25144ad936010b5342e22dddb575bb2

        • C:\Users\Admin\AppData\Local\Temp\7zS32B5.tmp\settings.ini

          Filesize

          994B

          MD5

          1dffcae6aea8cc7bf09036e933635f09

          SHA1

          1d40e0795eb8be2c86c41d1663552cb2836d7eaf

          SHA256

          760d542f53af9acd70cab57dbedf16b595a2a6c8866f6fdae2a5fbec85a47db3

          SHA512

          1afc22fcca16276009c3b17fe0caa7f710156e673c6089ca1e40f150211190333b8a0194a37eadff1d3da3ed5574a7c1aac014cef0efcf05ceb488db18736286

        • \ProgramData\wxDownload\50530ba282b69.dll

          Filesize

          142KB

          MD5

          633e7480df2a82ffb537684d1c4b5be1

          SHA1

          6534c6f3342819ec7ad126fcae46aa70e8a277e7

          SHA256

          de1c043cd39c887c12ab24581903cd242287afeb46c7c02e9b52a659ae2945a7

          SHA512

          f77d7a0b1bb2bbbfb8eab7fa2d50a13f4f75c7a56bcdc26d026981940bcb1c30cbf8c27e07a0f828dc214616759dc9ecddf184f672f437df8606e76693f3270c

        • \ProgramData\wxDownload\uninstall.exe

          Filesize

          48KB

          MD5

          a724dac649142fef71fe4b529684e969

          SHA1

          e2878e84886ec53a1332ad969a825062526b5cd4

          SHA256

          b58c58b5073034d74c5d93902bbb9d402be063e907bdf77115b55bbb99af21dc

          SHA512

          9f475ad52fa2b7f82e74df87c02e42f937b5e3b62773b7d51cb53facfcc8b4934ad3c2fc21496cfabaa4dd103a309ed5cccad1ad3d6037f6c4f3a540e3e9d5b3

        • \Users\Admin\AppData\Local\Temp\7zS32B5.tmp\50530ba282b31.exe

          Filesize

          65KB

          MD5

          4ccf1a317aa8539c857835e4ebe9c806

          SHA1

          223b73d09d7398f40aff3ccc569e66cae3886ee9

          SHA256

          4529889c5575cd4e28b3691f0489c806442840292a9e459ada4dab3e024cc242

          SHA512

          ecab68799b5a51c7d2a3735a9b3c17ba20a315618aa9575a5b02d5d4535716966031a26982012669f069dbfd8a6ab62f95737b7c402bf680f3a498900f627312

        • \Users\Admin\AppData\Local\Temp\nsj33B0.tmp\UserInfo.dll

          Filesize

          4KB

          MD5

          7579ade7ae1747a31960a228ce02e666

          SHA1

          8ec8571a296737e819dcf86353a43fcf8ec63351

          SHA256

          564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5

          SHA512

          a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b

        • memory/1748-54-0x0000000076381000-0x0000000076383000-memory.dmp

          Filesize

          8KB