Analysis

  • max time kernel
    121s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    05-12-2023 02:38

General

  • Target

    7fe5c47a1acaa5faa781ddc065e1c8b0d5e9a0bb2a508445b78a62debcbf02f0.exe

  • Size

    158.0MB

  • MD5

    328b0e9fd74c9d359c694658eaf025ba

  • SHA1

    2b1cc7fb3895dc9d7b49ee91b93e4ffc9c625200

  • SHA256

    7fe5c47a1acaa5faa781ddc065e1c8b0d5e9a0bb2a508445b78a62debcbf02f0

  • SHA512

    1506c1a099519b99cc68451a5d1b360b252bfa1f152373521a2d600361e233d6cafaf014214b260d81ad761f0c76747c117f724546f4c15ae2630823f7189a8e

  • SSDEEP

    1572864:IWaJrKk/uriBP1rNxoV0pPQnvKeh0ew1988ae7XRuiRU23:na92mNHpuiyiRD

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7fe5c47a1acaa5faa781ddc065e1c8b0d5e9a0bb2a508445b78a62debcbf02f0.exe
    "C:\Users\Admin\AppData\Local\Temp\7fe5c47a1acaa5faa781ddc065e1c8b0d5e9a0bb2a508445b78a62debcbf02f0.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2108
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Stop-Process -Name "firefox"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2584
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Stop-Process -Name "firefox"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2328
    • C:\Users\Admin\AppData\Local\Public Program\Chrome Service.exe
      "C:\Users\Admin\AppData\Local\Public Program\Chrome Service.exe"
      2⤵
      • Executes dropped EXE
      PID:340

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Public Program\Chrome Service.exe

    Filesize

    58.2MB

    MD5

    c0412e74f4fc21d63271ca8bd5f6a774

    SHA1

    728cce759c0aaf0ebca673ad43352eecbbc1fe78

    SHA256

    b4ed512664a81b396582759c9cc2e0bdceaa73584c1aa86bbbd12e1f4b6cec11

    SHA512

    8a85f40e3124b5404ca5537702b5a5e2caad9e2cd50522a998136298f6342d2fe7fd2b1b96a5199bb21e9cafa53a441e4b9eb10703cf7834b2faf1ba15349f1d

  • C:\Users\Admin\AppData\Local\Public Program\Chrome Service.exe

    Filesize

    58.2MB

    MD5

    c0412e74f4fc21d63271ca8bd5f6a774

    SHA1

    728cce759c0aaf0ebca673ad43352eecbbc1fe78

    SHA256

    b4ed512664a81b396582759c9cc2e0bdceaa73584c1aa86bbbd12e1f4b6cec11

    SHA512

    8a85f40e3124b5404ca5537702b5a5e2caad9e2cd50522a998136298f6342d2fe7fd2b1b96a5199bb21e9cafa53a441e4b9eb10703cf7834b2faf1ba15349f1d

  • C:\Users\Admin\AppData\Local\Temp\CabA768.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\TarA8E6.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\B5P4HJSYNHR5HSJLBNKS.temp

    Filesize

    7KB

    MD5

    0d1f176aa0a035f9fdf0457d385ae650

    SHA1

    7ef250e57f83797ce02eaf012043712e9a4914a6

    SHA256

    f869e200917ed8fcd1e14977fc71ba456e0d87bd41ad4e9b768ded464daec92a

    SHA512

    888786463bdd666ccbaafd268a674508f31ef01ba32a21a7f1bd04bc362cfb93f98e2f3dd135549ffed0407e7854126068ceae8755d1b46c1cc62cd6ec74c61c

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    0d1f176aa0a035f9fdf0457d385ae650

    SHA1

    7ef250e57f83797ce02eaf012043712e9a4914a6

    SHA256

    f869e200917ed8fcd1e14977fc71ba456e0d87bd41ad4e9b768ded464daec92a

    SHA512

    888786463bdd666ccbaafd268a674508f31ef01ba32a21a7f1bd04bc362cfb93f98e2f3dd135549ffed0407e7854126068ceae8755d1b46c1cc62cd6ec74c61c

  • \Users\Admin\AppData\Local\Public Program\Chrome Service.exe

    Filesize

    58.2MB

    MD5

    c0412e74f4fc21d63271ca8bd5f6a774

    SHA1

    728cce759c0aaf0ebca673ad43352eecbbc1fe78

    SHA256

    b4ed512664a81b396582759c9cc2e0bdceaa73584c1aa86bbbd12e1f4b6cec11

    SHA512

    8a85f40e3124b5404ca5537702b5a5e2caad9e2cd50522a998136298f6342d2fe7fd2b1b96a5199bb21e9cafa53a441e4b9eb10703cf7834b2faf1ba15349f1d

  • memory/340-293-0x0000000001200000-0x0000000001A43000-memory.dmp

    Filesize

    8.3MB

  • memory/340-291-0x0000000001200000-0x0000000001A43000-memory.dmp

    Filesize

    8.3MB

  • memory/2108-44-0x0000000008C40000-0x0000000008CD6000-memory.dmp

    Filesize

    600KB

  • memory/2108-49-0x0000000008BE0000-0x0000000008C1C000-memory.dmp

    Filesize

    240KB

  • memory/2108-13-0x0000000002960000-0x0000000002988000-memory.dmp

    Filesize

    160KB

  • memory/2108-16-0x0000000002960000-0x0000000002988000-memory.dmp

    Filesize

    160KB

  • memory/2108-17-0x0000000005DD0000-0x0000000005F5E000-memory.dmp

    Filesize

    1.6MB

  • memory/2108-20-0x0000000005DD0000-0x0000000005F5E000-memory.dmp

    Filesize

    1.6MB

  • memory/2108-21-0x0000000006130000-0x0000000006160000-memory.dmp

    Filesize

    192KB

  • memory/2108-24-0x0000000006130000-0x0000000006160000-memory.dmp

    Filesize

    192KB

  • memory/2108-25-0x0000000008E90000-0x00000000091E6000-memory.dmp

    Filesize

    3.3MB

  • memory/2108-28-0x0000000008E90000-0x00000000091E6000-memory.dmp

    Filesize

    3.3MB

  • memory/2108-29-0x0000000006670000-0x0000000006715000-memory.dmp

    Filesize

    660KB

  • memory/2108-32-0x0000000006670000-0x0000000006715000-memory.dmp

    Filesize

    660KB

  • memory/2108-33-0x00000000065C0000-0x00000000065D5000-memory.dmp

    Filesize

    84KB

  • memory/2108-37-0x0000000008B30000-0x0000000008B84000-memory.dmp

    Filesize

    336KB

  • memory/2108-36-0x00000000065C0000-0x00000000065D5000-memory.dmp

    Filesize

    84KB

  • memory/2108-41-0x0000000008C40000-0x0000000008CD6000-memory.dmp

    Filesize

    600KB

  • memory/2108-9-0x00000000028F0000-0x000000000290D000-memory.dmp

    Filesize

    116KB

  • memory/2108-40-0x0000000008B30000-0x0000000008B84000-memory.dmp

    Filesize

    336KB

  • memory/2108-45-0x00000000065F0000-0x000000000666A000-memory.dmp

    Filesize

    488KB

  • memory/2108-48-0x00000000065F0000-0x000000000666A000-memory.dmp

    Filesize

    488KB

  • memory/2108-52-0x0000000008BE0000-0x0000000008C1C000-memory.dmp

    Filesize

    240KB

  • memory/2108-12-0x00000000028F0000-0x000000000290D000-memory.dmp

    Filesize

    116KB

  • memory/2108-53-0x0000000008BC0000-0x0000000008BD2000-memory.dmp

    Filesize

    72KB

  • memory/2108-57-0x0000000008BB0000-0x0000000008BB6000-memory.dmp

    Filesize

    24KB

  • memory/2108-60-0x0000000008BB0000-0x0000000008BB6000-memory.dmp

    Filesize

    24KB

  • memory/2108-56-0x0000000008BC0000-0x0000000008BD2000-memory.dmp

    Filesize

    72KB

  • memory/2108-64-0x0000000008BA0000-0x0000000008BAC000-memory.dmp

    Filesize

    48KB

  • memory/2108-61-0x0000000008BA0000-0x0000000008BAC000-memory.dmp

    Filesize

    48KB

  • memory/2108-0-0x0000000006750000-0x00000000070D9000-memory.dmp

    Filesize

    9.5MB

  • memory/2108-292-0x0000000000CA0000-0x00000000014EF000-memory.dmp

    Filesize

    8.3MB

  • memory/2108-3-0x0000000006750000-0x00000000070D9000-memory.dmp

    Filesize

    9.5MB

  • memory/2108-4-0x0000000006240000-0x00000000062E7000-memory.dmp

    Filesize

    668KB

  • memory/2108-5-0x0000000000CA0000-0x00000000014EF000-memory.dmp

    Filesize

    8.3MB

  • memory/2108-8-0x0000000006240000-0x00000000062E7000-memory.dmp

    Filesize

    668KB

  • memory/2108-273-0x0000000000CA0000-0x00000000014EF000-memory.dmp

    Filesize

    8.3MB

  • memory/2328-227-0x0000000073130000-0x00000000736DB000-memory.dmp

    Filesize

    5.7MB

  • memory/2328-226-0x0000000073130000-0x00000000736DB000-memory.dmp

    Filesize

    5.7MB

  • memory/2328-225-0x00000000026A0000-0x00000000026E0000-memory.dmp

    Filesize

    256KB

  • memory/2328-224-0x0000000073130000-0x00000000736DB000-memory.dmp

    Filesize

    5.7MB

  • memory/2584-215-0x0000000002760000-0x00000000027A0000-memory.dmp

    Filesize

    256KB

  • memory/2584-214-0x00000000736E0000-0x0000000073C8B000-memory.dmp

    Filesize

    5.7MB

  • memory/2584-213-0x00000000736E0000-0x0000000073C8B000-memory.dmp

    Filesize

    5.7MB

  • memory/2584-216-0x0000000002760000-0x00000000027A0000-memory.dmp

    Filesize

    256KB

  • memory/2584-217-0x00000000736E0000-0x0000000073C8B000-memory.dmp

    Filesize

    5.7MB