Analysis

  • max time kernel
    164s
  • max time network
    192s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/12/2022, 16:21

General

  • Target

    f505c360144d4c251140f2cc1172c2c135322456dd81965d6203f0cc3a64b5a3.exe

  • Size

    245KB

  • MD5

    9521ebd4957667abe4cffc41b57f85e0

  • SHA1

    a3d9ef1d00623ed14456df2b86d7f2a3bdcd2651

  • SHA256

    f505c360144d4c251140f2cc1172c2c135322456dd81965d6203f0cc3a64b5a3

  • SHA512

    307d5f14457f28018d5c89ba66e737a81b79a03017767653e16b7296e3f4b068a9a205476a711b1521b57933a5e2340e4e3d5ef9a00a4121dc39292d98c7ccda

  • SSDEEP

    6144:h1OgDPdkBAFZWjadD4s5zvfIAm0JihzQQy:h1OgLdaOz5ZiVQQy

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 4 IoCs
  • Modifies registry class 63 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f505c360144d4c251140f2cc1172c2c135322456dd81965d6203f0cc3a64b5a3.exe
    "C:\Users\Admin\AppData\Local\Temp\f505c360144d4c251140f2cc1172c2c135322456dd81965d6203f0cc3a64b5a3.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3876
    • C:\Users\Admin\AppData\Local\Temp\7zS64E4.tmp\50b80b25db9e2.exe
      .\50b80b25db9e2.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      • System policy modification
      PID:3844

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\wxDownload\50b80b25dba1a.ocx

    Filesize

    126KB

    MD5

    d637295a8426c7c4a8e9ef3e584839a2

    SHA1

    55b64f53328498d22d269de2e65be2feeba7da00

    SHA256

    5cbd7f4b8f991ccab51cfc1fd0a5437013c5196f3c636632d691103aa3708adb

    SHA512

    f60f908b9f0efd4762255c9c71559bbd554714170262dd556353ddda55789d21cc3a8ade239cdf51da38dfa4e92714749c217095bccac19590ef8347ca501c8c

  • C:\Users\Admin\AppData\Local\Temp\7zS64E4.tmp\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    3ffc020e328eb42b04b221f696e7f309

    SHA1

    6a41d6e2e5159dfe32a61af55ff57901eaa1a407

    SHA256

    3c628828dc697ebae5e69a289e7f6f5b5b4be6b1411dd9c858462d2e7bd8444b

    SHA512

    649642b068c855d24f5634d1fa026164d6525c668f91955484158034c5c75adb35c3a5432b0b1e2cbdf117a99feb2da64d2b4acbc68f505bcc2f3430e86b2b28

  • C:\Users\Admin\AppData\Local\Temp\7zS64E4.tmp\[email protected]\chrome.manifest

    Filesize

    116B

    MD5

    99615c57fcab0e44a4222fa437cb2a20

    SHA1

    45771cce47cf43736608966579f713f57fb5ed7e

    SHA256

    44f7b720f233a62109e9e14e8541b2139a2505a20025dba331433e1f681c3efe

    SHA512

    a0c756add8e58670b59d4ed69dd1e85b8051cc7b297de6f0f19157b604553dbc285d3e9c923ca51043e1863afa672619bc0c838af3c77dfa2141393be9433437

  • C:\Users\Admin\AppData\Local\Temp\7zS64E4.tmp\[email protected]\content\bg.js

    Filesize

    8KB

    MD5

    a4744446824713c04ff7593c582e08a1

    SHA1

    bd9e150601c89f722e8daf94dbfdee968d3f9723

    SHA256

    c9413fa528da9c7e8d7f93e77e3490a44f30969be01520f3c46befcbedc0e1ac

    SHA512

    8ce7bff046280f16500cc5bd04766eda08ee02accedc77b7e588692171e5f5e73f0fd82d74f9f8cc63df3025fc4cbda61bc905521f755cecb96e86811bbf98af

  • C:\Users\Admin\AppData\Local\Temp\7zS64E4.tmp\[email protected]\content\zy.xul

    Filesize

    225B

    MD5

    e2c36bf56d373cc142a16b2f0355b15d

    SHA1

    81add3ce36707798cd3ff652eae07c1f6ad7dc22

    SHA256

    7830724533a5f85dde7a8f4892a24979bf98edecfb675145d8e7edc45f5a4fc6

    SHA512

    de1d1c615d7335101ab91c04196d22748b421d8d83cfffab006858ac9da59884231afd4017eaa31bf45a98b4a787f3915797783a6d574f32173dbe77d4e488bc

  • C:\Users\Admin\AppData\Local\Temp\7zS64E4.tmp\[email protected]\install.rdf

    Filesize

    717B

    MD5

    441b9ed838c7eedc43a123150b681bcd

    SHA1

    12c6bb8a3a5c9f3fded5cb808b63ae4a4b0dc189

    SHA256

    06c026c8be6e1a64010255a9bdc33daa1ae6294633e4eafc90a438700514d29f

    SHA512

    ce58eeaf25783e3a4927565a54b8848136648f7cf1988e51233a02cc5a8df1274aa451b18035bf874802c540aedb97141495cbd95b6dab6159562c827d3d91d5

  • C:\Users\Admin\AppData\Local\Temp\7zS64E4.tmp\50b80b25db9e2.exe

    Filesize

    65KB

    MD5

    6fce522ef2543f1cd8812f45c8718ba6

    SHA1

    270c89c05963c0f24f976f6b75aa4d12ade4c837

    SHA256

    d75c34545066eb787ed671c6d4ce4f4c6267637518ca683dfefb79f95f14226b

    SHA512

    a0a486b95aeb9c059f23e639e16abdbfe94b041f33309b44e95743bf5a82f92d3c444c025b6c36a0dc296add3c2bc4f6affcf130014f16968be0afa8e0007880

  • C:\Users\Admin\AppData\Local\Temp\7zS64E4.tmp\50b80b25db9e2.exe

    Filesize

    65KB

    MD5

    6fce522ef2543f1cd8812f45c8718ba6

    SHA1

    270c89c05963c0f24f976f6b75aa4d12ade4c837

    SHA256

    d75c34545066eb787ed671c6d4ce4f4c6267637518ca683dfefb79f95f14226b

    SHA512

    a0a486b95aeb9c059f23e639e16abdbfe94b041f33309b44e95743bf5a82f92d3c444c025b6c36a0dc296add3c2bc4f6affcf130014f16968be0afa8e0007880

  • C:\Users\Admin\AppData\Local\Temp\7zS64E4.tmp\50b80b25dba1a.ocx

    Filesize

    126KB

    MD5

    d637295a8426c7c4a8e9ef3e584839a2

    SHA1

    55b64f53328498d22d269de2e65be2feeba7da00

    SHA256

    5cbd7f4b8f991ccab51cfc1fd0a5437013c5196f3c636632d691103aa3708adb

    SHA512

    f60f908b9f0efd4762255c9c71559bbd554714170262dd556353ddda55789d21cc3a8ade239cdf51da38dfa4e92714749c217095bccac19590ef8347ca501c8c

  • C:\Users\Admin\AppData\Local\Temp\7zS64E4.tmp\50b80b25dba53.html

    Filesize

    4KB

    MD5

    0a838ada925f49c70298cc99bac41a39

    SHA1

    e355e4dbb070a18bef1f10a3b56f4079cd36ff3e

    SHA256

    cf81ab9d4d9d9f97b180e2f1b2870aaee11bd83995b07d3f0f2ec077f4cb7324

    SHA512

    792c53d6a39be594c8ca79a765cfc1c72969665611fe0913620ca7114c5da32b0fa53fa756de65bf9e561efea80895c06b3b569f29415ead503379ee80f45f3a

  • C:\Users\Admin\AppData\Local\Temp\7zS64E4.tmp\50b80b25dba8c.js

    Filesize

    9B

    MD5

    99fa5d714d971a49b67de27e0d8871be

    SHA1

    d0621e846ea60fa8d0b2c8e622e495af49cd7359

    SHA256

    f560d76474380da948a0c5ab8682dc026822d9685268c592f315224b1b968bf6

    SHA512

    2fec19e4f2a974227922a7e057890141523ae73fbfa127f9e8cd00dff71b29abb93cb865c6d74ecf3df8bca440c558d4fbf2f80e82cc9636320ab5edb95ebad5

  • C:\Users\Admin\AppData\Local\Temp\7zS64E4.tmp\hfbjelcofmljfafhkbkocaebioenflic.crx

    Filesize

    8KB

    MD5

    8a97c69f022d13ced37e6269b2318d80

    SHA1

    fa3664549bd589225a26e3f6b49f3c977618b32c

    SHA256

    d7c8f742f0acbecf6bf9baef595bf513ece7182b7641531bcb6318b7c738cd79

    SHA512

    7617216cb33b21099c86782e080d2ae48a14550646d2b1f3c3fa414cb8406fdb6204d460756b9ba00baa56ee555dcef8a7e9938f8b257a838934a59eda843151

  • C:\Users\Admin\AppData\Local\Temp\7zS64E4.tmp\settings.ini

    Filesize

    929B

    MD5

    605f4d541f23e729e5c33e26edbcfc8d

    SHA1

    9343e77e0d6e7ac7a161431b24a431c32be25080

    SHA256

    a83a4ce40986f07982e8161987a9b76282ebbc7bf11e0b233b2cb2aabfe57d33

    SHA512

    faa864f72ac093062a2ef9de36f1e9c47f016560610241d468f7622521adea1ac482f2db913a383c4cb19e9c9d2c17001316414a918e57adbc3143815ce7965c

  • C:\Users\Admin\AppData\Local\Temp\nse6BF9.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    7579ade7ae1747a31960a228ce02e666

    SHA1

    8ec8571a296737e819dcf86353a43fcf8ec63351

    SHA256

    564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5

    SHA512

    a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b