Analysis

  • max time kernel
    55s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 09:56

General

  • Target

    158b93438a8d54328fef3c117bb59ef7.exe

  • Size

    5.5MB

  • MD5

    158b93438a8d54328fef3c117bb59ef7

  • SHA1

    aa24e314910adf064dff33b5106a6dd009e90c45

  • SHA256

    179b4678a221ac2bb5059260512515eec9dd7a825287d3f71376b67371fa367b

  • SHA512

    30b016d84ff1be67fd15a4cd66b2dec24713507f197a6e0b93dad5c9ff13be6701d4d46162cd0c085e641b5b2a83e42901bd907304fcb4f60bc96465a5c86360

  • SSDEEP

    98304:prCupviDxaPqmbS5jR5sG6wKEU/1QoNMvCvzCC2bd6vO6W0GUEcqmdw8yPITd50I:prFpaEPdAN5UpFtlNMv22CCdJEEcqZ8P

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 29 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks for any installed AV software in registry 1 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\158b93438a8d54328fef3c117bb59ef7.exe
    "C:\Users\Admin\AppData\Local\Temp\158b93438a8d54328fef3c117bb59ef7.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1940
    • C:\Program Files\cbb83586061b9e10795a60573689e6f0\cbd64c377088d953ebf1e4db82c46cba.exe
      "C:\Program Files\cbb83586061b9e10795a60573689e6f0\cbd64c377088d953ebf1e4db82c46cba.exe" --install
      2⤵
      • Executes dropped EXE
      • Modifies registry class
      PID:3020
    • C:\Windows\SysWOW64\REG.exe
      REG ADD "HKLM\Software\Microsoft\Windows\CurrentVersion\Uninstall\cbb83586061b9e10795a60573689e6f0" /f /v "DisplayIcon" /t REG_SZ /d "C:\Windows\040a887fa033d510343e0f08c062d079.exe"
      2⤵
        PID:2448
      • C:\Windows\SysWOW64\REG.exe
        REG ADD "HKLM\Software\Microsoft\Windows\CurrentVersion\Uninstall\cbb83586061b9e10795a60573689e6f0" /f /v "UninstallString" /t REG_SZ /d "C:\Windows\040a887fa033d510343e0f08c062d079.exe"
        2⤵
          PID:1736
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" http://www.technologieyvonlheureux.com/index.php?firstrun=1&lp=1&v=d9.67.1.13&tv=1.0-10000&unique_id=AB93F93903D761ADB1013A5225D05686&mid=97b0b903342462c6ba3ccb8e3635b2f0&aid=3673&aid2=none&ts=&ts2=&brw=iexplore&mi=1&ma=6
          2⤵
            PID:2860
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:275457 /prefetch:2
              3⤵
                PID:1972
            • C:\Windows\system32\rundll32.exe
              rundll32.exe SETUPAPI.DLL,InstallHinfSection DefaultInstall 132 .\b9721c3028e87e945e3d889e53daa39d.inf
              2⤵
                PID:1664
            • C:\Program Files\cbb83586061b9e10795a60573689e6f0\cbd64c377088d953ebf1e4db82c46cba.exe
              "C:\Program Files\cbb83586061b9e10795a60573689e6f0\cbd64c377088d953ebf1e4db82c46cba.exe"
              1⤵
              • Executes dropped EXE
              • Checks for any installed AV software in registry
              • Drops file in Program Files directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:516

            Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Program Files\cbb83586061b9e10795a60573689e6f0\cbd64c377088d953ebf1e4db82c46cba.exe

                    Filesize

                    1.5MB

                    MD5

                    0621849d4632bde9379d655932dd9030

                    SHA1

                    4de5773750aaf95e383a413477fe110f02e4c926

                    SHA256

                    8855eee1f96a76f3b73d9fb11ec5b5c243faf2e8371bc4ab75195345c47cd4bb

                    SHA512

                    6b07615f6eccac0c4aed927e7bf8260acfd2773bf41dd8a94af96c9a4b2dfdb0f83df77023dc2c7557d311440b0b73b7efc159756595083e22ad20b2df609979

                  • C:\Program Files\cbb83586061b9e10795a60573689e6f0\cbd64c377088d953ebf1e4db82c46cba.exe

                    Filesize

                    322KB

                    MD5

                    8758f6b5fd700f4dd0c0d69cc9aef265

                    SHA1

                    3307de92460fbebdede9fb8b28bd90da00ad9b0a

                    SHA256

                    84103350275636574dad99243f34183392f8b37a14bb4e123caf34c9ffe84b8e

                    SHA512

                    ac73ec4bd153e762ea466f868303e32a50333f0eefa2f5e3afdccd87c1ae5a00521cbc98c8f4007928ac72c8403f2bc79ae0db70e528f13792dd52c614f1e123

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                    Filesize

                    344B

                    MD5

                    03635da6dd4070575d5a2edb778b6b29

                    SHA1

                    0fef8a3c1c2ab98b5772cc4a594c127eded52555

                    SHA256

                    58c3bd2477aacda8be4188fa3ee2cbae2f08f9c26a59319236e210a9053c9008

                    SHA512

                    17963a41b99c72178c1ee3fcbbbeb679ca60e7c4de76ed87c85b9ecfdbfae2e81c7dd27dcc51d767706c7da3db0cb07edacbe5e1d5df2c747601e3c9856da268

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                    Filesize

                    344B

                    MD5

                    f518bd9a884102f999ca388ede2421e4

                    SHA1

                    9c769f9782c6c7a6d4213fbfaa01ed2d6d24931d

                    SHA256

                    de1977e1be3c4b428049c04ac27d559cd9de3661b343271b15e0a4eb3d25a188

                    SHA512

                    9cc10488a80628952248a8038af45f404e3dde956416268c6e399eedbad499aa68523abde30fb7aec0dc02785ed56a55bd38429289b9a0d12062e1738ac33c0c

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                    Filesize

                    344B

                    MD5

                    3eabd78bac11067938dd931c640fd58c

                    SHA1

                    00ad93dac695bd84547d8a76340b1342a9931799

                    SHA256

                    a0872ebf2f5498675ba1b44e83ecc2289f5cf5fc36b2bc9332a7c4552d145d46

                    SHA512

                    24bf6160557b89d3ddd515df987988858cc508df57d59ea37cc5b073f9c3ec2574eacb14992471fb6dee064ad3feef7454502697d620b045ae2b7cb256e9313a

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                    Filesize

                    344B

                    MD5

                    82b149a66c7d3fd65dee6957569425df

                    SHA1

                    5423cc5c8a47688a68bb2f12669cec434d3afb9c

                    SHA256

                    1ed5ec2477949e42f58c91a4ee57aa6cc4361d277dfea29d71a9c587fb33f427

                    SHA512

                    7a34ce60b80c14a9d8d40bb511f684c0e0d4a38b984b32ca6521f3d70960337e998a38aaa78162860de34304196ff57182b3a7acd05144393b935ffe53bbcfff

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                    Filesize

                    344B

                    MD5

                    37bd10c29d4a9842d87971f668fe8418

                    SHA1

                    4cb18a41c61433198c85474ef12ed56f2a2f64ad

                    SHA256

                    d8c6a1e8a436978b79a2b92f0dc5bf3f2ee1d6e51b0adaf9a951356c9c57a504

                    SHA512

                    61636bffae0e71b327ec0e9f68215aefd8141a074c2a8741c88eec9e0700567ac55ffc2d1eacec25d8bd9c621f9eb80ca3f1fc98907d85dc1cfd18a21d30b8ec

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                    Filesize

                    344B

                    MD5

                    359888079d5aa351bc774aa78fda999b

                    SHA1

                    331b9c5b689bed568efec8daa8960778ac56d555

                    SHA256

                    d411d5a5060807487eadc0a6eb4debcfa4d72d8af499fcf34bb787764e753b5e

                    SHA512

                    61dc315e736408954663509aa3d03aaa0a65b87e843827223c72d88fb8ff0ef1df913cf07dc691ff604ecb1791fed288eae57f2db61fe8a8f1479c0a04bedc3e

                  • C:\Users\Admin\AppData\Local\Temp\CabFA0B.tmp

                    Filesize

                    65KB

                    MD5

                    ac05d27423a85adc1622c714f2cb6184

                    SHA1

                    b0fe2b1abddb97837ea0195be70ab2ff14d43198

                    SHA256

                    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

                    SHA512

                    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

                  • C:\Users\Admin\AppData\Local\Temp\TarFA2D.tmp

                    Filesize

                    171KB

                    MD5

                    9c0c641c06238516f27941aa1166d427

                    SHA1

                    64cd549fb8cf014fcd9312aa7a5b023847b6c977

                    SHA256

                    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

                    SHA512

                    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\IUDS4AGO.txt

                    Filesize

                    115B

                    MD5

                    0487bc1eb50cb0bf26b606c60e81fc96

                    SHA1

                    1631e0bbdeea105d36db86d85f1c355453e8d21e

                    SHA256

                    d1d9c61c4b6d3f87446166d4870d29a8e80bbadd75b2bdb5bb82ddcde44f0849

                    SHA512

                    b120a9f8007518770da67bc18ea89dc2d585d8eb91dc21f1f303d207a7cfb12571d0e00bb5ea270bb8fb45c972887685a9d141857aaf8e998baf2ff685e3f000

                  • \??\c:\program files\cbb83586061b9e10795a60573689e6f0\3956bd468adc5eb0c9847796cd53b33d

                    Filesize

                    72KB

                    MD5

                    e89c1fbe7111f9358b2f9f11105cf0ac

                    SHA1

                    fb2de9905a21971fcd165f4617ebf431b9ab5798

                    SHA256

                    886fe52d45653f63653129a762d4335fe4bc0ea83557a06af575b032635e9e69

                    SHA512

                    dd9ef96b732c9cf113d051a3f735c41f17bc871306d90382e5d782291de2a3cef000a37b131823b85b7e7ca6a097c6ae51c99cfc357b2f87b086fcb0071b853c

                  • \??\c:\program files\cbb83586061b9e10795a60573689e6f0\578a48abe209a869ae748b60481c4eba.exe

                    Filesize

                    371KB

                    MD5

                    2f85e633ab9128e52fe79c711cb255e2

                    SHA1

                    92edbb76347f487667965b1ccd7d4f084943677d

                    SHA256

                    ac58acecdae009a6a415f40b0b4c363966f7c19562da8b3ee7da3d95894acf17

                    SHA512

                    3152efb96c501d40b3ebe0bfd477a3f6de36b85410b458e038b57934bd882b711ef68ae02c147a3c00b4b4ed2f699231a190fe8df2601421aa6476c6c792843e

                  • \??\c:\program files\cbb83586061b9e10795a60573689e6f0\a3c703846464c3b6251be90da7b2703d.exe

                    Filesize

                    363KB

                    MD5

                    5a45f703efaf80d41ab13bee3b32bcf3

                    SHA1

                    a6ce4c665c804e78d3557f28bda8e2846e9cc178

                    SHA256

                    4c2dc40e091dff697d38ab7dcf2bf39cd061569bd8dc8aaa5a45666e34a4aa9d

                    SHA512

                    53b8c812f49fea01df5caca79e209ebfc82347c4a9f96fd852093702a7b732b2593a5c683624e118ace1970288d90ca61b0f85435f216a550c0dcab8b3842275

                  • \Program Files\cbb83586061b9e10795a60573689e6f0\cbd64c377088d953ebf1e4db82c46cba.exe

                    Filesize

                    1.8MB

                    MD5

                    2e94b69e71f5a4e72cd864f23c1e6e49

                    SHA1

                    4e038214d68713075789fd80006bf72152426684

                    SHA256

                    ed6e860d4be50070484a83bd070014a41a9c77400c1dd846b02ed16b9ed9e51b

                    SHA512

                    a3807466a2c873867e1281775049b5753a89dcf983f7487fbbe42862b2b9e9a2e3872efd1198c511554c50bfcf504bf12978ed6dd07735e6ca646bf59b20865c

                  • \Program Files\cbb83586061b9e10795a60573689e6f0\cbd64c377088d953ebf1e4db82c46cba.exe

                    Filesize

                    563KB

                    MD5

                    480311839e180df5d5e9faa688483d32

                    SHA1

                    4d747adf86650189e4d7135d28347b86238f3310

                    SHA256

                    36d21f5ae455dd3a035d474f56f85c08f28aa4a36ccdea70f5fdc97082d45c70

                    SHA512

                    45991801e3ce80a4752836eecfe302dabdca06d4e4ddfdcb97d643c67470c097b20cf1f23fb9761dbaa098865323dd5a7893b89c17a39dad5c05018fb09e41ba

                  • \Users\Admin\AppData\Local\Temp\nsi44ED.tmp\IpConfig.dll

                    Filesize

                    114KB

                    MD5

                    a3ed6f7ea493b9644125d494fbf9a1e6

                    SHA1

                    ebeee67fb0b5b3302c69f47c5e7fca62e1a809d8

                    SHA256

                    ec0f85f8a9d6b77081ba0103f967ef6705b547bf27bcd866d77ac909d21a1e08

                    SHA512

                    7099e1bc78ba5727661aa49f75523126563a5ebccdff10cabf868ce5335821118384825f037fbf1408c416c0212aa702a5974bc54d1b63c9d0bcade140f9aae1

                  • \Users\Admin\AppData\Local\Temp\nsi44ED.tmp\MoreInfo.dll

                    Filesize

                    7KB

                    MD5

                    80e34b7f576b710d100f6e7c0bed0c2e

                    SHA1

                    2b5b895034d41ee0d0d01bf650594ad0d1346662

                    SHA256

                    569d62345f6c915236772fa2575d1806cd2bfe089505807cb477618f1eeccf99

                    SHA512

                    f5970c192b7089040fd1cf26e5cab131879b91722dff0216cdc735f9cfde1eda061409b579eb0f11e3b32e5513e34bbedd4050b75bb1b2acc81be814c2c6c59b

                  • \Users\Admin\AppData\Local\Temp\nsi44ED.tmp\NSISList.dll

                    Filesize

                    97KB

                    MD5

                    2e0785f18f8714393bc4bc1fe170eadf

                    SHA1

                    1efba431c0fac46c6cb6f60dc08f65a0e23ccf3d

                    SHA256

                    e68d65626b24e7c1f6fbe1001f43174d0243095181025736f37ad704662f4351

                    SHA512

                    8a272bb264fa066960a4f34411a81652839eccdbc6fa25be20c0b94d7d10b16cb568338abb5d1a96c155cbc4bc7923d0387fa36bed69c1021296cc6cc5fbb45e

                  • \Users\Admin\AppData\Local\Temp\nsi44ED.tmp\SimpleSC.dll

                    Filesize

                    61KB

                    MD5

                    d63975ce28f801f236c4aca5af726961

                    SHA1

                    3d93ad9816d3b3dba1e63dfcbfa3bd05f787a8c9

                    SHA256

                    e0c580bbe48a483075c21277c6e0f23f3cbd6ce3eb2ccd3bf48cf68f05628f43

                    SHA512

                    8357e1955560bf0c42a8f4091550c87c19b4939bf1e6a53a54173d1c163b133b9c517014af6f7614eddc0c9bbf93b3b987c4977b024b10b05b3dc4eb20141810

                  • \Users\Admin\AppData\Local\Temp\nsi44ED.tmp\System.dll

                    Filesize

                    11KB

                    MD5

                    c17103ae9072a06da581dec998343fc1

                    SHA1

                    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

                    SHA256

                    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

                    SHA512

                    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

                  • \Users\Admin\AppData\Local\Temp\nsi44ED.tmp\brh.dll

                    Filesize

                    549KB

                    MD5

                    3b0c0cf4025ce8b68140f370fc1807ff

                    SHA1

                    943592e8c26e5744792b0eab2c23ef65938aa22e

                    SHA256

                    a0f2252c217549e0ae3da6e007b1bd586c150a32635f8bc6a1f45454dd330501

                    SHA512

                    959beb2a20b2ebf20611118e5c6e46047880b1462412c4efead4ba157601a99192c0abc15c2bf66f77f15334a060a0cc811785782cb9b6d57ec9b408153c9a13

                  • \Users\Admin\AppData\Local\Temp\nsi44ED.tmp\inetc.dll

                    Filesize

                    21KB

                    MD5

                    d7a3fa6a6c738b4a3c40d5602af20b08

                    SHA1

                    34fc75d97f640609cb6cadb001da2cb2c0b3538a

                    SHA256

                    67eff17c53a78c8ec9a28f392b9bb93df3e74f96f6ecd87a333a482c36546b3e

                    SHA512

                    75cf123448567806be5f852ebf70f398da881e89994b82442a1f4bc6799894e799f979f5ab1cc9ba12617e48620e6c34f71e23259da498da37354e5fd3c0f934

                  • \Users\Admin\AppData\Local\Temp\nsi44ED.tmp\md5dll.dll

                    Filesize

                    8KB

                    MD5

                    97960d7a18662dac9cd80a8c5e3c794b

                    SHA1

                    4c28449cefa9af46bb7a63e9b9ea66a2de0ea287

                    SHA256

                    e0d1dc6e4c5cc13fb2db08fc741da0d08b315ebc8d3b53baa61552625d19b9c3

                    SHA512

                    1baab7b5378f3a396b31bf63b01b7905759c9f1d17d71882af63338d64eceda1884c947d93e4d9ef911bded1ef061043c873a88b8272f1aa296731aa745e756c

                  • \Users\Admin\AppData\Local\Temp\nsi44ED.tmp\nsExec.dll

                    Filesize

                    6KB

                    MD5

                    acc2b699edfea5bf5aae45aba3a41e96

                    SHA1

                    d2accf4d494e43ceb2cff69abe4dd17147d29cc2

                    SHA256

                    168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

                    SHA512

                    e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

                  • memory/1940-99-0x0000000004A30000-0x0000000004A43000-memory.dmp

                    Filesize

                    76KB

                  • memory/1940-50-0x0000000003D10000-0x0000000003D2D000-memory.dmp

                    Filesize

                    116KB

                  • memory/1940-14-0x0000000003300000-0x0000000003326000-memory.dmp

                    Filesize

                    152KB