Analysis

  • max time kernel
    121s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231130-en
  • resource tags

    arch:x64arch:x86image:win7-20231130-enlocale:en-usos:windows7-x64system
  • submitted
    03-12-2023 02:42

General

  • Target

    a1a204279d3cdcf73ce14a62268795170aece0aa178c9f18c489d83530b14da5.exe

  • Size

    158.0MB

  • MD5

    cc2c8d512857a17adb73a8766a8c6919

  • SHA1

    e5ee90693b92785f14bb6063f92f46b9bff561f0

  • SHA256

    a1a204279d3cdcf73ce14a62268795170aece0aa178c9f18c489d83530b14da5

  • SHA512

    2b9a2280e813a929866588374178e9f9fed48f337b5c97719a6391192f55f1db61d94136916fed8eb8be1c46345d5ef4bb4df078131d5b0aec862a4dade364dc

  • SSDEEP

    1572864:IWaH/Eoq13lOsygFXvraqpQwvKeh0ew1988ae7XRuiRU2A:nxlDZF/raqpQwiyiR8

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a1a204279d3cdcf73ce14a62268795170aece0aa178c9f18c489d83530b14da5.exe
    "C:\Users\Admin\AppData\Local\Temp\a1a204279d3cdcf73ce14a62268795170aece0aa178c9f18c489d83530b14da5.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3024
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Stop-Process -Name "firefox"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1320
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Stop-Process -Name "firefox"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2788
    • C:\Users\Admin\AppData\Local\Public Program\Chrome Service.exe
      "C:\Users\Admin\AppData\Local\Public Program\Chrome Service.exe"
      2⤵
      • Executes dropped EXE
      PID:1196

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Public Program\Chrome Service.exe

    Filesize

    58.2MB

    MD5

    41c7c46cfdcccaed611db23a96bd2c99

    SHA1

    80f685cd297e68655301107eff8ae85b3574183d

    SHA256

    6ff06b54677d32a26d7230adc14fca1d2e007ae483a156eb801e9d5d82fd5402

    SHA512

    ca714d462b57443958a31b061a8154aff3e2a8003ce6e4e6995536b93954ac32ead0b7a7b6d0385dd95d8a49d75aa4347d2901b2acef466bb5687cef50661615

  • C:\Users\Admin\AppData\Local\Public Program\Chrome Service.exe

    Filesize

    58.2MB

    MD5

    41c7c46cfdcccaed611db23a96bd2c99

    SHA1

    80f685cd297e68655301107eff8ae85b3574183d

    SHA256

    6ff06b54677d32a26d7230adc14fca1d2e007ae483a156eb801e9d5d82fd5402

    SHA512

    ca714d462b57443958a31b061a8154aff3e2a8003ce6e4e6995536b93954ac32ead0b7a7b6d0385dd95d8a49d75aa4347d2901b2acef466bb5687cef50661615

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\S0X9871ZA39WJC2DDGO4.temp

    Filesize

    7KB

    MD5

    01a27b20a6355334844b25f2cda189c6

    SHA1

    74b90298a46435d03da6581f803d49a3bda49c5b

    SHA256

    7f3a0e248cd4941eafff223787c30b88984dd40d9a438af1a94eca6d0534a896

    SHA512

    9feacddb0c97d628d1aaeb01281cba40eb95b35bc65f88330ed02d78aabf2b62b6fbca5051a2404129c7aaec3336b49c5cba431f762ba5b66963560035ab5752

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    01a27b20a6355334844b25f2cda189c6

    SHA1

    74b90298a46435d03da6581f803d49a3bda49c5b

    SHA256

    7f3a0e248cd4941eafff223787c30b88984dd40d9a438af1a94eca6d0534a896

    SHA512

    9feacddb0c97d628d1aaeb01281cba40eb95b35bc65f88330ed02d78aabf2b62b6fbca5051a2404129c7aaec3336b49c5cba431f762ba5b66963560035ab5752

  • \Users\Admin\AppData\Local\Public Program\Chrome Service.exe

    Filesize

    58.2MB

    MD5

    41c7c46cfdcccaed611db23a96bd2c99

    SHA1

    80f685cd297e68655301107eff8ae85b3574183d

    SHA256

    6ff06b54677d32a26d7230adc14fca1d2e007ae483a156eb801e9d5d82fd5402

    SHA512

    ca714d462b57443958a31b061a8154aff3e2a8003ce6e4e6995536b93954ac32ead0b7a7b6d0385dd95d8a49d75aa4347d2901b2acef466bb5687cef50661615

  • memory/1196-198-0x0000000000260000-0x0000000000AA3000-memory.dmp

    Filesize

    8.3MB

  • memory/1196-201-0x0000000000260000-0x0000000000AA3000-memory.dmp

    Filesize

    8.3MB

  • memory/1320-120-0x0000000073050000-0x00000000735FB000-memory.dmp

    Filesize

    5.7MB

  • memory/1320-122-0x0000000001EA0000-0x0000000001EE0000-memory.dmp

    Filesize

    256KB

  • memory/1320-123-0x0000000001EA0000-0x0000000001EE0000-memory.dmp

    Filesize

    256KB

  • memory/1320-121-0x0000000073050000-0x00000000735FB000-memory.dmp

    Filesize

    5.7MB

  • memory/1320-124-0x0000000073050000-0x00000000735FB000-memory.dmp

    Filesize

    5.7MB

  • memory/2788-135-0x0000000002AE0000-0x0000000002B20000-memory.dmp

    Filesize

    256KB

  • memory/2788-131-0x0000000072AA0000-0x000000007304B000-memory.dmp

    Filesize

    5.7MB

  • memory/2788-132-0x0000000072AA0000-0x000000007304B000-memory.dmp

    Filesize

    5.7MB

  • memory/2788-134-0x0000000002AE0000-0x0000000002B20000-memory.dmp

    Filesize

    256KB

  • memory/2788-136-0x0000000072AA0000-0x000000007304B000-memory.dmp

    Filesize

    5.7MB

  • memory/3024-24-0x00000000028B0000-0x00000000028E0000-memory.dmp

    Filesize

    192KB

  • memory/3024-33-0x0000000002900000-0x0000000002915000-memory.dmp

    Filesize

    84KB

  • memory/3024-45-0x0000000009100000-0x000000000917A000-memory.dmp

    Filesize

    488KB

  • memory/3024-49-0x0000000005C70000-0x0000000005CAC000-memory.dmp

    Filesize

    240KB

  • memory/3024-52-0x0000000005C70000-0x0000000005CAC000-memory.dmp

    Filesize

    240KB

  • memory/3024-48-0x0000000009100000-0x000000000917A000-memory.dmp

    Filesize

    488KB

  • memory/3024-44-0x00000000066F0000-0x0000000006786000-memory.dmp

    Filesize

    600KB

  • memory/3024-40-0x0000000005E30000-0x0000000005E84000-memory.dmp

    Filesize

    336KB

  • memory/3024-36-0x0000000002900000-0x0000000002915000-memory.dmp

    Filesize

    84KB

  • memory/3024-32-0x0000000006640000-0x00000000066E5000-memory.dmp

    Filesize

    660KB

  • memory/3024-60-0x0000000006590000-0x0000000006596000-memory.dmp

    Filesize

    24KB

  • memory/3024-57-0x0000000006590000-0x0000000006596000-memory.dmp

    Filesize

    24KB

  • memory/3024-56-0x0000000002A90000-0x0000000002AA2000-memory.dmp

    Filesize

    72KB

  • memory/3024-53-0x0000000002A90000-0x0000000002AA2000-memory.dmp

    Filesize

    72KB

  • memory/3024-64-0x0000000002A80000-0x0000000002A8C000-memory.dmp

    Filesize

    48KB

  • memory/3024-61-0x0000000002A80000-0x0000000002A8C000-memory.dmp

    Filesize

    48KB

  • memory/3024-37-0x0000000005E30000-0x0000000005E84000-memory.dmp

    Filesize

    336KB

  • memory/3024-41-0x00000000066F0000-0x0000000006786000-memory.dmp

    Filesize

    600KB

  • memory/3024-29-0x0000000006640000-0x00000000066E5000-memory.dmp

    Filesize

    660KB

  • memory/3024-28-0x0000000009460000-0x00000000097B6000-memory.dmp

    Filesize

    3.3MB

  • memory/3024-0-0x00000000067C0000-0x0000000007149000-memory.dmp

    Filesize

    9.5MB

  • memory/3024-25-0x0000000009460000-0x00000000097B6000-memory.dmp

    Filesize

    3.3MB

  • memory/3024-20-0x0000000008F70000-0x00000000090FE000-memory.dmp

    Filesize

    1.6MB

  • memory/3024-21-0x00000000028B0000-0x00000000028E0000-memory.dmp

    Filesize

    192KB

  • memory/3024-17-0x0000000008F70000-0x00000000090FE000-memory.dmp

    Filesize

    1.6MB

  • memory/3024-16-0x0000000000B50000-0x0000000000B78000-memory.dmp

    Filesize

    160KB

  • memory/3024-133-0x0000000000BB0000-0x00000000013FF000-memory.dmp

    Filesize

    8.3MB

  • memory/3024-13-0x0000000000B50000-0x0000000000B78000-memory.dmp

    Filesize

    160KB

  • memory/3024-8-0x0000000006210000-0x00000000062B7000-memory.dmp

    Filesize

    668KB

  • memory/3024-12-0x0000000000630000-0x000000000064D000-memory.dmp

    Filesize

    116KB

  • memory/3024-9-0x0000000000630000-0x000000000064D000-memory.dmp

    Filesize

    116KB

  • memory/3024-4-0x0000000006210000-0x00000000062B7000-memory.dmp

    Filesize

    668KB

  • memory/3024-5-0x0000000000BB0000-0x00000000013FF000-memory.dmp

    Filesize

    8.3MB

  • memory/3024-200-0x0000000000BB0000-0x00000000013FF000-memory.dmp

    Filesize

    8.3MB

  • memory/3024-3-0x00000000067C0000-0x0000000007149000-memory.dmp

    Filesize

    9.5MB