Analysis

  • max time kernel
    120s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 08:34

General

  • Target

    EdgeGuard_Stealer.exe

  • Size

    4.8MB

  • MD5

    36e6920adf89e5f1b25b5fb0c97257ed

  • SHA1

    8763ca48aadcc609d9041a4c730e47b7bafd650c

  • SHA256

    ae34953160fc00c0b415e3e8d9acccf7d03287da2ad7ea9428fe776f1ca8fc76

  • SHA512

    bf81047b48c7078845b1f3525fccf4eeb1a60f3f0b29cda7ef6df34a94b5a343769d9af8ee02ac5437b6dadac30fee08ac91d96d75130cc4a8ee3614f6c4ed77

  • SSDEEP

    49152:ahUiSRv3UJOrb/TkvO90d7HjmAFd4A64nsfJMES/OoK6OCLmMWNa5lpEZe8Rcs5D:p3UJLbRyWfwEHKM8b

Malware Config

Signatures

  • Nirsoft 2 IoCs
  • ACProtect 1.3x - 1.4x DLL software 2 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 17 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Kills process with taskkill 1 IoCs
  • Modifies system certificate store 2 TTPs 7 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\EdgeGuard_Stealer.exe
    "C:\Users\Admin\AppData\Local\Temp\EdgeGuard_Stealer.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1676
    • C:\Windows\system32\cmd.exe
      cmd /C "taskkill /F /IM thunderbird.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2648
      • C:\Windows\system32\taskkill.exe
        taskkill /F /IM thunderbird.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2768
    • C:\Users\Admin\AppData\myapp.exe
      C:\Users\Admin\AppData\myapp.exe passwords.json
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Accesses Microsoft Outlook accounts
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2552
    • C:\Windows\system32\cmd.exe
      cmd /C "mzcv.exe /scookiestxt firefoxcookies.txt"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2556
      • C:\Users\Admin\AppData\mzcv.exe
        mzcv.exe /scookiestxt firefoxcookies.txt
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: CmdExeWriteProcessMemorySpam
        PID:1368
    • C:\Windows\system32\cmd.exe
      cmd /C "ChromeCookiesView.exe /scookiestxt ChromeCookies.txt"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2040
      • C:\Users\Admin\AppData\ChromeCookiesView.exe
        ChromeCookiesView.exe /scookiestxt ChromeCookies.txt
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: CmdExeWriteProcessMemorySpam
        PID:2808
    • C:\Windows\system32\cmd.exe
      cmd /C "WebBrowserBookmarksView.exe /stext Bookmarks.txt"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1468
      • C:\Users\Admin\AppData\WebBrowserBookmarksView.exe
        WebBrowserBookmarksView.exe /stext Bookmarks.txt
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: CmdExeWriteProcessMemorySpam
        PID:1648

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\ChromeCookiesView.exe

    Filesize

    221KB

    MD5

    b9f7fbe36aeeeb647258376d7e020d4d

    SHA1

    b3dd62c120e96dfd2146b77f4d2b09789f907071

    SHA256

    16d01afe6470143e90aecfe39b1e8bea5fc8caf5f73e11422404a899bb36d616

    SHA512

    1e24a87adc5107811aacf13275f2ebbb63e2c8357ecfecaa0cc2284a07c20c1f971a0524ca5c7c77a8efd5ea3276fdafec51ae3502d306592c3da2cd75f3e894

  • C:\Users\Admin\AppData\ChromeCookiesView.exe

    Filesize

    221KB

    MD5

    b9f7fbe36aeeeb647258376d7e020d4d

    SHA1

    b3dd62c120e96dfd2146b77f4d2b09789f907071

    SHA256

    16d01afe6470143e90aecfe39b1e8bea5fc8caf5f73e11422404a899bb36d616

    SHA512

    1e24a87adc5107811aacf13275f2ebbb63e2c8357ecfecaa0cc2284a07c20c1f971a0524ca5c7c77a8efd5ea3276fdafec51ae3502d306592c3da2cd75f3e894

  • C:\Users\Admin\AppData\License.XenArmor

    Filesize

    104B

    MD5

    c9856e4aa6da989786db955602846b41

    SHA1

    f1b04a932e1d979e11bc58623ad3e7a972b21b89

    SHA256

    ea905276db64e16ce3d867d5d4bb7a276083d9e0b07e0781fbdd32b9d352603f

    SHA512

    7d151687a6149cdb150c8d6971066c955a5d8e898be1e22dbc0062971dd9438cb1427ac9141b7d7967212714536bb8dba057dbe91a333e24ec122555fa96410a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A

    Filesize

    893B

    MD5

    d4ae187b4574036c2d76b6df8a8c1a30

    SHA1

    b06f409fa14bab33cbaf4a37811b8740b624d9e5

    SHA256

    a2ce3a0fa7d2a833d1801e01ec48e35b70d84f3467cc9f8fab370386e13879c7

    SHA512

    1f44a360e8bb8ada22bc5bfe001f1babb4e72005a46bc2a94c33c4bd149ff256cce6f35d65ca4f7fc2a5b9e15494155449830d2809c8cf218d0b9196ec646b0c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    891951deaf661ad74b0c413f347f46c0

    SHA1

    331f2c03c209723f4820892330c4571db586abd2

    SHA256

    5589f6aa8dbe62ef0cba22791a501efd8b6af8881af1cf04dc4d2f7d19bb732d

    SHA512

    6a2b7c4d6140ff6ed90c8830dea8e022a466204b06e4307d3b1f66a01c7bc540bb39cee1403b629fa386ef266073660357152c6e8135a6a739d645438035b263

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4b0c79724cf7ad5b4dcccb94c74c18d1

    SHA1

    5294da086f9d4dff32f35c6b4614707a6b2c1616

    SHA256

    985aef94ff85625449896c1872ae0782ecad9cfa6842bd6299a8ccc3805e768f

    SHA512

    a4b6c4a4386ed58ead9953bfff98ac2f228e48268ce99919e3b22edf1415f9a09adf41de1fce6eb517424193caa68c55df323244ba700577ace51718aa9b79d1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a7fbdf295b948d3cb2e35901708d5270

    SHA1

    22211fd0b66da3533a2c715cde7820cc25866891

    SHA256

    08516829956aa44ab44ac67ac51d285c138bf03338dfce5739726d73600a2fd1

    SHA512

    1e4521aa9a0d585f013470ad326e37bf0a0314e1216ea41aaf4d8bebeebe2bd4dba8af912f2a0183796b070105f481c111f6f7d7efbad42f343848d40874a774

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    749948ed7fe89c3c2e8b8799c126bb9e

    SHA1

    23164eb353e130a6277cca2cacf550d4881382c5

    SHA256

    ffa067d64ca12ce1e9228374d5287e951fa3c9fb267cbd019b3c7a48d05bd711

    SHA512

    41b38fe6e92bbac0c21a5a37ae793a683e7cdf6ebaa5669c74b37ee8d3507f4382aadd34ca5a86e60bf7864671dd756435d1722bbed4bdd0a7bb47c0bd290ba0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b973cbd3c21cd2982e541179af04cc10

    SHA1

    24bf8c6fcd30b4ffa43ad610e2c1bfcf398329c0

    SHA256

    37bdfd1d6ad3b8abb3286ca301028ec5a939f44eb3e502e6e7f3c6f8a664d221

    SHA512

    aae89b0378dedf95c44c52c72939df41d5ff9c40d9d61c18e277a3473b0a04f6e102c340b0528061ffc970ff8f2be5c1a2ba31dc41b77a9855e828dd30cf150f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d45e59fae201ddfe570d7a6c65722fcc

    SHA1

    39f5fdafca2a43dab6332d5afbaad09647ba7382

    SHA256

    0426dd68f1b01546c3d4ece9ad274ca4a69dd37ac701e76d34943d305b77cbd3

    SHA512

    aeefa76dad00c18bb92bf80332daee8a5de7050490628a954d281791a61f07baeab040586514a6525223044588ad1f31721ac3c165eff4b75de2597b77be74fd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e27d5ad05f883d5e5b01e8c7a64c7166

    SHA1

    e2e95ef9d22604e59b1b5a993925ef06d5024bb2

    SHA256

    623b941672724b63fe69b764093e371fad560017cf7b4336bdf15f68d2716e08

    SHA512

    7bbd529d7b3ac9838ad1972b2a71c1a20d4f4b905c819d45df6b2e2ba29830decc2e3b987a9431cf4f89296b07b958e5b11ae8670d6ddca189da1a9bc695e3f5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e15c36705ef2683548de775c8007d21b

    SHA1

    d6f7319b91bcf199bcc0bbdddf98c813d1e016b4

    SHA256

    ae31ae52142a83c2b3e69c92692c698d13b58b5500f46b3a291f1242a0f40768

    SHA512

    c240de2be2cfe799ff7589890bfb76997dff7e22e8dfebba5047814bb1959e8c07dd887fc4ba8ab8971904d19ce9eaabd9915603e994c2c6f4a4f9bed1dd97d9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    20e548537ead5a5e1090b8fa35c8919c

    SHA1

    b45c09fcbd4119b5c2cf920a4902bf548e225896

    SHA256

    4aac0402e521cb100cf081ea8b286b13c6180a2e9204aed915605e507c271906

    SHA512

    5c1674166af51c03012f5c174ab526a5e4e0d12795507d5225f6ab9b11a6d5e87164a555d0143c4cdd772d023ace5399d6fd3fb4e5fd56d10af558e76159d35a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f99f62533b9a79fb460b35a0a375499a

    SHA1

    defb6c40d9f67da8c1265ae09f3ca96784fd8352

    SHA256

    4dc846ec2880c5a65b3691b9c74066429d3a9d1cb3500c3fc7aae7a8e1e98147

    SHA512

    3b2666e65c1271f766fef43e4a3b1ec67a04c8bbc17fd3978aea09504f63190b2241a53c7099ead9c0151d5c7cf8106b2f118d0069ca24136f9138a5cddbcf68

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    61f4883335d9409caed08b9a409d1668

    SHA1

    d92aba26434c448044d13e603ca548c6ed01f858

    SHA256

    f0c991ecc9fa31394df7ca7750b20404368a72f827aee6af3ec24eec65615b8e

    SHA512

    38e4f550a6a313f53dec63ba4bf001fcd0ab8c8127f1e1596e8e9bba9e6193b56347c3aea4be1d04cb014c8ab4aa2b4f5161757d1aaed2e675f7fe8f41bdd5e7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A

    Filesize

    252B

    MD5

    e987ab3294c0c711a870db0df12de1ae

    SHA1

    0ce58df4457061e7c3c43f2d909ca7002363e8dc

    SHA256

    3beb99e1416dbad9b401d8af909fc1d3fc9c801f86c432d7537a39af659d1e5e

    SHA512

    ce82e884dc95e2590d27ac30a37f8b678311685ee638fabca6a1c8131da2fb30b236eed9c3ca3bdbf8f15e56021eb309c58b02c83c58308d391f525a02e7d4b0

  • C:\Users\Admin\AppData\Local\Temp\Cab5266.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\Tar55A4.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

  • C:\Users\Admin\AppData\WebBrowserBookmarksView.exe

    Filesize

    350KB

    MD5

    adb672eac3bbf16ebed56be75b86806c

    SHA1

    e972132de2710799ebac3732696608346d1811e4

    SHA256

    d335d0e7759b9b66923c90de78d011af384b0b187913f41ffa892a4d7ef41d69

    SHA512

    9118dda64e8f7e7055005320371cf23cc8a3cc17d2bdcc63fb025c1541b3babc14e4fd4f3310f3ac88bcaba978b27de7190aeb1dd5b1e245f59cc552377bf89b

  • C:\Users\Admin\AppData\WebBrowserBookmarksView.exe

    Filesize

    350KB

    MD5

    adb672eac3bbf16ebed56be75b86806c

    SHA1

    e972132de2710799ebac3732696608346d1811e4

    SHA256

    d335d0e7759b9b66923c90de78d011af384b0b187913f41ffa892a4d7ef41d69

    SHA512

    9118dda64e8f7e7055005320371cf23cc8a3cc17d2bdcc63fb025c1541b3babc14e4fd4f3310f3ac88bcaba978b27de7190aeb1dd5b1e245f59cc552377bf89b

  • C:\Users\Admin\AppData\XenManager.dll

    Filesize

    696KB

    MD5

    3d5e1b42e41f2e39b77db350329643dd

    SHA1

    6900e0b10b97768c4e7659bf0f3c7f3db1abe77b

    SHA256

    ae5f98da2face8f7c050a562cb3640280790db6c0601e78aa57b2799820dafff

    SHA512

    2a28f6a62b025471b6613c96ef7e49a0dcd7789a6dd74bddc40483ab821570c147182f256e018e330df1e08c80744d31a87e34878013cd874e4d5913dad73a29

  • C:\Users\Admin\AppData\myapp.exe

    Filesize

    1.3MB

    MD5

    f66df7e53df23979743957d5695fba69

    SHA1

    60e1c99bc1390b065ed5d0f20f51a64832eda842

    SHA256

    940f0a6101217af4ab76f0d2e76451e3f20dcf343f6a3dad3de76748078581ab

    SHA512

    bc01bc616c55290df3261da2e389265ac97c5a4f53d64c74bc42ab2ecc8e1a423b27b39b4e2b26d431157fcc67770c9e404299031dea7175ae13f31fb49c1b90

  • C:\Users\Admin\AppData\mzcv.exe

    Filesize

    50KB

    MD5

    976112f26cfa4f84393c9767bc15d8e9

    SHA1

    971a190e569c687bfeb85338cd8838953d160a88

    SHA256

    72101fa019e4e1299c6170c466e6006875e46205dab07144c9c35f41f60b0be6

    SHA512

    672eb51b71c6930046b2b6beb75b31dfb1a37ccda109a7eed8c0d0accf56ed66d0b30a9af24ffdcbf2aa232ec83ba6d5fc873821c792466c684a4714fec5f0e3

  • C:\Users\Admin\AppData\mzcv.exe

    Filesize

    50KB

    MD5

    976112f26cfa4f84393c9767bc15d8e9

    SHA1

    971a190e569c687bfeb85338cd8838953d160a88

    SHA256

    72101fa019e4e1299c6170c466e6006875e46205dab07144c9c35f41f60b0be6

    SHA512

    672eb51b71c6930046b2b6beb75b31dfb1a37ccda109a7eed8c0d0accf56ed66d0b30a9af24ffdcbf2aa232ec83ba6d5fc873821c792466c684a4714fec5f0e3

  • C:\Users\Admin\AppData\outlooks\License.XenArmor

    Filesize

    1KB

    MD5

    30a9aa3e2018df9e4d5a7dea65c283f6

    SHA1

    6abb0707a87dd0140ae3488c3f2a378726e2ca53

    SHA256

    230d91b44ffd4de6a3cfe521b2560e5ed59763df51a5de76fc01513787fb1682

    SHA512

    8f81262c4a373aac14e4bb31bcd26fc4e706d7a2d8b2f71b7822444307d2d3ffa44f6602b6902a2d471bc2ecb96f48a43a4901b3c63e940f68c949a3b9f18e7f

  • C:\Users\Admin\AppData\settings.db

    Filesize

    28KB

    MD5

    f72060de3dbbe0db1683245754da72df

    SHA1

    341f0a17c7c73b59741bfaacfda0f2404df4365f

    SHA256

    f56e06652b0fad4220732450508ba069634f895bfcada8e12de7a689e8b3a78d

    SHA512

    f820d59b1c8aa0ed23baa1b9f6682c2cda5baac85b74ec6911f612530bda0f70abc4cd8f4b7d6676a007fcc7d3c57906dc84f8408759cd3bceb1074aa9198f82

  • \Users\Admin\AppData\XenManager.dll

    Filesize

    696KB

    MD5

    3d5e1b42e41f2e39b77db350329643dd

    SHA1

    6900e0b10b97768c4e7659bf0f3c7f3db1abe77b

    SHA256

    ae5f98da2face8f7c050a562cb3640280790db6c0601e78aa57b2799820dafff

    SHA512

    2a28f6a62b025471b6613c96ef7e49a0dcd7789a6dd74bddc40483ab821570c147182f256e018e330df1e08c80744d31a87e34878013cd874e4d5913dad73a29

  • memory/1368-707-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1368-711-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2552-704-0x0000000074300000-0x0000000074529000-memory.dmp

    Filesize

    2.2MB

  • memory/2552-703-0x0000000000400000-0x0000000000939000-memory.dmp

    Filesize

    5.2MB

  • memory/2552-690-0x0000000000400000-0x0000000000939000-memory.dmp

    Filesize

    5.2MB

  • memory/2552-689-0x0000000000400000-0x0000000000939000-memory.dmp

    Filesize

    5.2MB

  • memory/2552-688-0x0000000000400000-0x0000000000939000-memory.dmp

    Filesize

    5.2MB

  • memory/2552-694-0x0000000074300000-0x0000000074529000-memory.dmp

    Filesize

    2.2MB

  • memory/2808-714-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2808-716-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB