Analysis

  • max time kernel
    121s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    10-12-2023 02:07

General

  • Target

    6625bd4b26d018dde4f1727ad9cd66112375b01efe51216e002186e543aaf772.exe

  • Size

    157.7MB

  • MD5

    2f010a1eb3eb549502c640fdf068067b

  • SHA1

    d2dd90bfadff4ff0e73884f3e47132d1bc376f56

  • SHA256

    6625bd4b26d018dde4f1727ad9cd66112375b01efe51216e002186e543aaf772

  • SHA512

    c819470c209dae93c2dd7616aa342aa30dc2fabdfb8d0afb408cc9199424ef18765a7f269690ca3307291475a8c232b159b004208626f4991b71f0c3dc73dcc2

  • SSDEEP

    1572864:1Wajz7MJ2NMyKfflSuPtvKeh0ew1988ae7XRuiRU2b:oKQ2NMD9L1iyiRv

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6625bd4b26d018dde4f1727ad9cd66112375b01efe51216e002186e543aaf772.exe
    "C:\Users\Admin\AppData\Local\Temp\6625bd4b26d018dde4f1727ad9cd66112375b01efe51216e002186e543aaf772.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:3060
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Stop-Process -Name "firefox"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2320
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Stop-Process -Name "firefox"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2940
    • C:\Users\Admin\AppData\Local\Public Program\Chrome Service.exe
      "C:\Users\Admin\AppData\Local\Public Program\Chrome Service.exe"
      2⤵
      • Executes dropped EXE
      PID:928

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2efb91b28717d87ad2cff1e4adc90025

    SHA1

    bc8cc0270ef53e7c5131593e97afc17e6a9b864b

    SHA256

    81feb0ec70c8a163dfabbe43d162ce1da3c8b1204a36ceaec53d11bb3f5719ec

    SHA512

    96287389f4c20bb71092fbbff96d85457eb2293ed5a2e3302ef84e95a19791eabe6740d055e990af07c29cfeff703a89cc1d687fb23fc79cb542975e85e39741

  • C:\Users\Admin\AppData\Local\Public Program\Chrome Service.exe

    Filesize

    58.2MB

    MD5

    ab5a0c4dfd4e40048c92943354afa758

    SHA1

    aba2064e4349fd38c7178de3a8c453894a6b2ec1

    SHA256

    4bc57f4a1419ee1539165bfefbf4448c23c0e5b248b1e759f5ce62215b38be87

    SHA512

    d3030835b48c952319242a7884994f3e91f3578a50d5b9caea9f38f6a3eb1f5d74d21ca4ed79a89d02872888a832a99b71ff1b85ea2a6c4c09b43cf3a93b5402

  • C:\Users\Admin\AppData\Local\Public Program\Chrome Service.exe

    Filesize

    58.2MB

    MD5

    ab5a0c4dfd4e40048c92943354afa758

    SHA1

    aba2064e4349fd38c7178de3a8c453894a6b2ec1

    SHA256

    4bc57f4a1419ee1539165bfefbf4448c23c0e5b248b1e759f5ce62215b38be87

    SHA512

    d3030835b48c952319242a7884994f3e91f3578a50d5b9caea9f38f6a3eb1f5d74d21ca4ed79a89d02872888a832a99b71ff1b85ea2a6c4c09b43cf3a93b5402

  • C:\Users\Admin\AppData\Local\Temp\Cab780F.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\Tar7910.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\VP8FG7DZOM8M3AWX6FWB.temp

    Filesize

    7KB

    MD5

    33b967274e37a7e893d66e5db0731bba

    SHA1

    6accdb142401dc802d0d9505a316c5ca5aff51bb

    SHA256

    95a13f78cda4a11ba13c841b379b28667bfd1cee572d948fb67891d75159df7e

    SHA512

    9f6c3e8c5442778d9cf5f549946f8fac3e436778e1de5522b2bc12b50d176cb6b01476f960756c11f50baf86ea51bfe51d213b9ca1e90ef7d45904214798cf46

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    33b967274e37a7e893d66e5db0731bba

    SHA1

    6accdb142401dc802d0d9505a316c5ca5aff51bb

    SHA256

    95a13f78cda4a11ba13c841b379b28667bfd1cee572d948fb67891d75159df7e

    SHA512

    9f6c3e8c5442778d9cf5f549946f8fac3e436778e1de5522b2bc12b50d176cb6b01476f960756c11f50baf86ea51bfe51d213b9ca1e90ef7d45904214798cf46

  • \Users\Admin\AppData\Local\Public Program\Chrome Service.exe

    Filesize

    58.2MB

    MD5

    ab5a0c4dfd4e40048c92943354afa758

    SHA1

    aba2064e4349fd38c7178de3a8c453894a6b2ec1

    SHA256

    4bc57f4a1419ee1539165bfefbf4448c23c0e5b248b1e759f5ce62215b38be87

    SHA512

    d3030835b48c952319242a7884994f3e91f3578a50d5b9caea9f38f6a3eb1f5d74d21ca4ed79a89d02872888a832a99b71ff1b85ea2a6c4c09b43cf3a93b5402

  • memory/928-284-0x0000000001360000-0x0000000001BA3000-memory.dmp

    Filesize

    8.3MB

  • memory/928-283-0x0000000001360000-0x0000000001BA3000-memory.dmp

    Filesize

    8.3MB

  • memory/2320-205-0x00000000026E0000-0x0000000002720000-memory.dmp

    Filesize

    256KB

  • memory/2320-207-0x0000000072E30000-0x00000000733DB000-memory.dmp

    Filesize

    5.7MB

  • memory/2320-206-0x00000000026E0000-0x0000000002720000-memory.dmp

    Filesize

    256KB

  • memory/2320-204-0x00000000026E0000-0x0000000002720000-memory.dmp

    Filesize

    256KB

  • memory/2320-203-0x0000000072E30000-0x00000000733DB000-memory.dmp

    Filesize

    5.7MB

  • memory/2320-202-0x0000000072E30000-0x00000000733DB000-memory.dmp

    Filesize

    5.7MB

  • memory/2940-214-0x0000000072880000-0x0000000072E2B000-memory.dmp

    Filesize

    5.7MB

  • memory/2940-215-0x0000000002650000-0x0000000002690000-memory.dmp

    Filesize

    256KB

  • memory/2940-216-0x0000000072880000-0x0000000072E2B000-memory.dmp

    Filesize

    5.7MB

  • memory/2940-217-0x0000000002650000-0x0000000002690000-memory.dmp

    Filesize

    256KB

  • memory/2940-218-0x0000000072880000-0x0000000072E2B000-memory.dmp

    Filesize

    5.7MB

  • memory/3060-28-0x00000000091B0000-0x0000000009506000-memory.dmp

    Filesize

    3.3MB

  • memory/3060-33-0x0000000005BC0000-0x0000000005BD5000-memory.dmp

    Filesize

    84KB

  • memory/3060-64-0x0000000005C40000-0x0000000005C4C000-memory.dmp

    Filesize

    48KB

  • memory/3060-61-0x0000000005C40000-0x0000000005C4C000-memory.dmp

    Filesize

    48KB

  • memory/3060-56-0x0000000005C50000-0x0000000005C62000-memory.dmp

    Filesize

    72KB

  • memory/3060-48-0x0000000006300000-0x000000000637A000-memory.dmp

    Filesize

    488KB

  • memory/3060-45-0x0000000006300000-0x000000000637A000-memory.dmp

    Filesize

    488KB

  • memory/3060-44-0x00000000063A0000-0x0000000006436000-memory.dmp

    Filesize

    600KB

  • memory/3060-40-0x00000000061A0000-0x00000000061F4000-memory.dmp

    Filesize

    336KB

  • memory/3060-37-0x00000000061A0000-0x00000000061F4000-memory.dmp

    Filesize

    336KB

  • memory/3060-29-0x0000000006250000-0x00000000062F5000-memory.dmp

    Filesize

    660KB

  • memory/3060-60-0x0000000005EF0000-0x0000000005EF6000-memory.dmp

    Filesize

    24KB

  • memory/3060-53-0x0000000005C50000-0x0000000005C62000-memory.dmp

    Filesize

    72KB

  • memory/3060-52-0x0000000005C70000-0x0000000005CAC000-memory.dmp

    Filesize

    240KB

  • memory/3060-49-0x0000000005C70000-0x0000000005CAC000-memory.dmp

    Filesize

    240KB

  • memory/3060-41-0x00000000063A0000-0x0000000006436000-memory.dmp

    Filesize

    600KB

  • memory/3060-32-0x0000000006250000-0x00000000062F5000-memory.dmp

    Filesize

    660KB

  • memory/3060-57-0x0000000005EF0000-0x0000000005EF6000-memory.dmp

    Filesize

    24KB

  • memory/3060-36-0x0000000005BC0000-0x0000000005BD5000-memory.dmp

    Filesize

    84KB

  • memory/3060-0-0x00000000067D0000-0x0000000007159000-memory.dmp

    Filesize

    9.5MB

  • memory/3060-25-0x00000000091B0000-0x0000000009506000-memory.dmp

    Filesize

    3.3MB

  • memory/3060-21-0x00000000028C0000-0x00000000028F0000-memory.dmp

    Filesize

    192KB

  • memory/3060-24-0x00000000028C0000-0x00000000028F0000-memory.dmp

    Filesize

    192KB

  • memory/3060-20-0x0000000006510000-0x000000000669E000-memory.dmp

    Filesize

    1.6MB

  • memory/3060-17-0x0000000006510000-0x000000000669E000-memory.dmp

    Filesize

    1.6MB

  • memory/3060-16-0x0000000000C10000-0x0000000000C38000-memory.dmp

    Filesize

    160KB

  • memory/3060-13-0x0000000000C10000-0x0000000000C38000-memory.dmp

    Filesize

    160KB

  • memory/3060-8-0x0000000006460000-0x0000000006507000-memory.dmp

    Filesize

    668KB

  • memory/3060-264-0x0000000000260000-0x0000000000A88000-memory.dmp

    Filesize

    8.2MB

  • memory/3060-9-0x0000000000B00000-0x0000000000B1D000-memory.dmp

    Filesize

    116KB

  • memory/3060-12-0x0000000000B00000-0x0000000000B1D000-memory.dmp

    Filesize

    116KB

  • memory/3060-5-0x0000000000260000-0x0000000000A88000-memory.dmp

    Filesize

    8.2MB

  • memory/3060-282-0x0000000000260000-0x0000000000A88000-memory.dmp

    Filesize

    8.2MB

  • memory/3060-4-0x0000000006460000-0x0000000006507000-memory.dmp

    Filesize

    668KB

  • memory/3060-3-0x00000000067D0000-0x0000000007159000-memory.dmp

    Filesize

    9.5MB