Analysis

  • max time kernel
    119s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    04-12-2023 01:34

General

  • Target

    301caec2769daa002d3d7f6408d24afa564fa59edd2033cb2962649754837bff.exe

  • Size

    158.0MB

  • MD5

    66968df71661f2397a646e38348222b8

  • SHA1

    3489b89565130e064482249de5707fee3fe5673a

  • SHA256

    301caec2769daa002d3d7f6408d24afa564fa59edd2033cb2962649754837bff

  • SHA512

    66ea44ce5e87ca9599c9f4257f816eb58bd929800f55107b490ec2f0fcc32a95b4c5d2e90d2ac6b6878f38b51daca7529d877682719ee8918631b8a6c5fc382a

  • SSDEEP

    1572864:YWarxc6cX72VubK8xidgzvKeh0ew1988ae7XRuiRU2B:XbK8xiwiyiR1

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\301caec2769daa002d3d7f6408d24afa564fa59edd2033cb2962649754837bff.exe
    "C:\Users\Admin\AppData\Local\Temp\301caec2769daa002d3d7f6408d24afa564fa59edd2033cb2962649754837bff.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2244
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Stop-Process -Name "firefox"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2576
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Stop-Process -Name "firefox"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:836
    • C:\Users\Admin\AppData\Local\Public Program\Chrome Service.exe
      "C:\Users\Admin\AppData\Local\Public Program\Chrome Service.exe"
      2⤵
      • Executes dropped EXE
      PID:1528

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    81622642191ec429a9fadbd9e3f8de76

    SHA1

    2f43e1cb07c70c94bc6e1abb142babe09271a9d1

    SHA256

    73fa1d7fdea2803d0be5ea665222362543b089409efaf0d03b4e785977ab2371

    SHA512

    fa9b11574b03b0ff40bfeff48fb53d374c930e4a079a4c1ebe3a0a6d3fa52e75323c32777264cbe8ae69a51bc0c6cc336637b3bbae3898b308e2c33a2e92b63c

  • C:\Users\Admin\AppData\Local\Public Program\Chrome Service.exe

    Filesize

    58.2MB

    MD5

    77a0f6ab4a09f253a68ee7ab25319d0a

    SHA1

    4af8fceaa7ac5556ea47805cf6216ce153a504fd

    SHA256

    c2044a1b50f49bc71ed7c768f14b8854abde34c4fa9a4ec0c6942c883fd339f3

    SHA512

    5e3da5289acbf1d22713e11bb6521315051f8198a1ee6d0ba09b9d4b6080e3892c10bb80b9784fd7740c00da213e8efd87970f2093a7f1ad8be28d87ca5e4a26

  • C:\Users\Admin\AppData\Local\Public Program\Chrome Service.exe

    Filesize

    58.2MB

    MD5

    77a0f6ab4a09f253a68ee7ab25319d0a

    SHA1

    4af8fceaa7ac5556ea47805cf6216ce153a504fd

    SHA256

    c2044a1b50f49bc71ed7c768f14b8854abde34c4fa9a4ec0c6942c883fd339f3

    SHA512

    5e3da5289acbf1d22713e11bb6521315051f8198a1ee6d0ba09b9d4b6080e3892c10bb80b9784fd7740c00da213e8efd87970f2093a7f1ad8be28d87ca5e4a26

  • C:\Users\Admin\AppData\Local\Temp\CabF559.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\TarF753.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\PBN52VQGJ11L94S2S55Q.temp

    Filesize

    7KB

    MD5

    e8a2dc702abab9b7040613f65a747a3a

    SHA1

    5e5ec51364ac4f36d75c77009e8a68867fb6bfff

    SHA256

    948af59682ddc342315b1857baffc829d93cf48b7f950f83f2b9196ad5f0b790

    SHA512

    48865210e1f85b7c45c7f3f22e42fe5cf73553fcda3c345c63c64007496ca1a03d477d84349b1ab7e8a668b4a7210832a6cdb47215b59c2d399514d8b43f9c17

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    e8a2dc702abab9b7040613f65a747a3a

    SHA1

    5e5ec51364ac4f36d75c77009e8a68867fb6bfff

    SHA256

    948af59682ddc342315b1857baffc829d93cf48b7f950f83f2b9196ad5f0b790

    SHA512

    48865210e1f85b7c45c7f3f22e42fe5cf73553fcda3c345c63c64007496ca1a03d477d84349b1ab7e8a668b4a7210832a6cdb47215b59c2d399514d8b43f9c17

  • \Users\Admin\AppData\Local\Public Program\Chrome Service.exe

    Filesize

    58.2MB

    MD5

    77a0f6ab4a09f253a68ee7ab25319d0a

    SHA1

    4af8fceaa7ac5556ea47805cf6216ce153a504fd

    SHA256

    c2044a1b50f49bc71ed7c768f14b8854abde34c4fa9a4ec0c6942c883fd339f3

    SHA512

    5e3da5289acbf1d22713e11bb6521315051f8198a1ee6d0ba09b9d4b6080e3892c10bb80b9784fd7740c00da213e8efd87970f2093a7f1ad8be28d87ca5e4a26

  • memory/836-217-0x00000000729B0000-0x0000000072F5B000-memory.dmp

    Filesize

    5.7MB

  • memory/836-216-0x0000000001F70000-0x0000000001FB0000-memory.dmp

    Filesize

    256KB

  • memory/836-215-0x00000000729B0000-0x0000000072F5B000-memory.dmp

    Filesize

    5.7MB

  • memory/836-214-0x0000000001F70000-0x0000000001FB0000-memory.dmp

    Filesize

    256KB

  • memory/836-213-0x00000000729B0000-0x0000000072F5B000-memory.dmp

    Filesize

    5.7MB

  • memory/1528-281-0x0000000001070000-0x00000000018B3000-memory.dmp

    Filesize

    8.3MB

  • memory/1528-282-0x0000000001070000-0x00000000018B3000-memory.dmp

    Filesize

    8.3MB

  • memory/2244-41-0x0000000006770000-0x0000000006806000-memory.dmp

    Filesize

    600KB

  • memory/2244-60-0x0000000006160000-0x0000000006166000-memory.dmp

    Filesize

    24KB

  • memory/2244-25-0x0000000009200000-0x0000000009556000-memory.dmp

    Filesize

    3.3MB

  • memory/2244-28-0x0000000009200000-0x0000000009556000-memory.dmp

    Filesize

    3.3MB

  • memory/2244-29-0x00000000066C0000-0x0000000006765000-memory.dmp

    Filesize

    660KB

  • memory/2244-32-0x00000000066C0000-0x0000000006765000-memory.dmp

    Filesize

    660KB

  • memory/2244-33-0x0000000000EA0000-0x0000000000EB5000-memory.dmp

    Filesize

    84KB

  • memory/2244-36-0x0000000000EA0000-0x0000000000EB5000-memory.dmp

    Filesize

    84KB

  • memory/2244-37-0x0000000001220000-0x0000000001274000-memory.dmp

    Filesize

    336KB

  • memory/2244-40-0x0000000001220000-0x0000000001274000-memory.dmp

    Filesize

    336KB

  • memory/2244-21-0x0000000000E70000-0x0000000000EA0000-memory.dmp

    Filesize

    192KB

  • memory/2244-44-0x0000000006770000-0x0000000006806000-memory.dmp

    Filesize

    600KB

  • memory/2244-45-0x00000000061C0000-0x000000000623A000-memory.dmp

    Filesize

    488KB

  • memory/2244-48-0x00000000061C0000-0x000000000623A000-memory.dmp

    Filesize

    488KB

  • memory/2244-49-0x0000000001060000-0x000000000109C000-memory.dmp

    Filesize

    240KB

  • memory/2244-52-0x0000000001060000-0x000000000109C000-memory.dmp

    Filesize

    240KB

  • memory/2244-53-0x0000000005F90000-0x0000000005FA2000-memory.dmp

    Filesize

    72KB

  • memory/2244-56-0x0000000005F90000-0x0000000005FA2000-memory.dmp

    Filesize

    72KB

  • memory/2244-57-0x0000000006160000-0x0000000006166000-memory.dmp

    Filesize

    24KB

  • memory/2244-24-0x0000000000E70000-0x0000000000EA0000-memory.dmp

    Filesize

    192KB

  • memory/2244-61-0x0000000006150000-0x000000000615C000-memory.dmp

    Filesize

    48KB

  • memory/2244-64-0x0000000006150000-0x000000000615C000-memory.dmp

    Filesize

    48KB

  • memory/2244-0-0x0000000006AC0000-0x0000000007449000-memory.dmp

    Filesize

    9.5MB

  • memory/2244-3-0x0000000006AC0000-0x0000000007449000-memory.dmp

    Filesize

    9.5MB

  • memory/2244-279-0x0000000001280000-0x0000000001ACF000-memory.dmp

    Filesize

    8.3MB

  • memory/2244-4-0x0000000000760000-0x0000000000807000-memory.dmp

    Filesize

    668KB

  • memory/2244-20-0x0000000006860000-0x00000000069EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2244-17-0x0000000006860000-0x00000000069EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2244-16-0x00000000006B0000-0x00000000006D8000-memory.dmp

    Filesize

    160KB

  • memory/2244-13-0x00000000006B0000-0x00000000006D8000-memory.dmp

    Filesize

    160KB

  • memory/2244-12-0x00000000006E0000-0x00000000006FD000-memory.dmp

    Filesize

    116KB

  • memory/2244-9-0x00000000006E0000-0x00000000006FD000-memory.dmp

    Filesize

    116KB

  • memory/2244-8-0x0000000000760000-0x0000000000807000-memory.dmp

    Filesize

    668KB

  • memory/2244-5-0x0000000001280000-0x0000000001ACF000-memory.dmp

    Filesize

    8.3MB

  • memory/2576-205-0x0000000002850000-0x0000000002890000-memory.dmp

    Filesize

    256KB

  • memory/2576-204-0x0000000002850000-0x0000000002890000-memory.dmp

    Filesize

    256KB

  • memory/2576-203-0x0000000072F60000-0x000000007350B000-memory.dmp

    Filesize

    5.7MB

  • memory/2576-202-0x0000000072F60000-0x000000007350B000-memory.dmp

    Filesize

    5.7MB

  • memory/2576-206-0x0000000072F60000-0x000000007350B000-memory.dmp

    Filesize

    5.7MB