Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2023 14:33

General

  • Target

    25eff213e366d4952b623a9f6b8537fc.exe

  • Size

    252KB

  • MD5

    25eff213e366d4952b623a9f6b8537fc

  • SHA1

    352c791627c44137001e0e8dea6191859f4afb18

  • SHA256

    4a3a2ea567cfdabae9c0445b4852cbd14ab5ad2da5ee68bdccb61d7133c51bd5

  • SHA512

    6449b695a159a30162c7db0f9724108e0a17241358d645c073c2c74cf09b1c427ca8f6c9f0bb0bd8c297789c6f67c64f30f460e587e7a4d631b2d9add1a5efcb

  • SSDEEP

    6144:91OgDPdkBAFZWjadD4s2Ibt1oqDOxpRNSMoQhvZlj:91OgLdaatGqDOxpRvxt

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 2 IoCs
  • Modifies registry class 63 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\25eff213e366d4952b623a9f6b8537fc.exe
    "C:\Users\Admin\AppData\Local\Temp\25eff213e366d4952b623a9f6b8537fc.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4560
    • C:\Users\Admin\AppData\Local\Temp\7zSA0E3.tmp\setup.exe
      .\setup.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      • System policy modification
      PID:2040

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7zSA0E3.tmp\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    f0ded83c97e0190109bc35e59c3a86a3

    SHA1

    8ba0d099b3ae07ed479f45000f422f78a579254f

    SHA256

    9301e5cd5c9018835f5656cdbc01e62968d2cdc305f4230fdd2b12e256463484

    SHA512

    6a437fc06c2db07568606e8a9561f51e6d038d8afb2c05608167e42c5c134290d96a8be80851b01175e579f07685dc49ac1921f497f2f384670ccb24a1cbbb52

  • C:\Users\Admin\AppData\Local\Temp\7zSA0E3.tmp\content.js

    Filesize

    388B

    MD5

    10905c573b52a64b8d1e42dbcb3e4644

    SHA1

    a8ef4169031acb0ff26a9676a6bff84abf553937

    SHA256

    3b9409d4051c6864178bbf895c0aee2dc21e3593faa0c709180a9a69d44dea37

    SHA512

    763cb072ea21233f803957ff0f61e250b3c7dddb6e7202bfb5f27d33a0ece1b48ca829680f5aae84870077aa82afa85d1305645d0e45669b1f699a327d690cd3

  • C:\Users\Admin\AppData\Local\Temp\7zSA0E3.tmp\settings.ini

    Filesize

    667B

    MD5

    37253b19f9f6ae2d3b9bec7d7f3fc475

    SHA1

    939309738d3f9ff4a5a4e639ba9044c4b9ea5f1a

    SHA256

    4a5a13a86ab92e53af7c9f7fd0117c7053081e33106e5a4982600dc79aa3e041

    SHA512

    190087588f7186f4d9d6ffebe641cdde38862697cb0bfccc8124c0de905e3c4e410e4751422ffedac6cb5629b92e3c68b07bb4947ec9a6d6bdc1e58852988eed

  • C:\Users\Admin\AppData\Local\Temp\7zSA0E3.tmp\setup.exe

    Filesize

    61KB

    MD5

    16ef6e914973925977cdc5ef6b8b2565

    SHA1

    4815da2815975b33f5dc94d482e6dbc02588afa6

    SHA256

    6b9a2b64b90799f1d50458dc38fb4e9e13a8abb37210c8f5d9eeedae84c6912f

    SHA512

    c74f0e17878c4598b626edb5e75e7ee098b71c0c26454ba709e2ea438517670ce11abf7d909470e6c935a21d0413c0d14b29960af9bd6a423e3261789a35b059