Analysis

  • max time kernel
    94s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-12-2023 02:43

General

  • Target

    4d872864e6008aa1cf92684590f8aeb9.exe

  • Size

    313KB

  • MD5

    4d872864e6008aa1cf92684590f8aeb9

  • SHA1

    7586448b037a131daa9445d9a417c48a19f465f7

  • SHA256

    54ad3a0e184610310c3ed38e06f0657ba96a18f0079cc094c889a129cb0e5430

  • SHA512

    42adb9ce0b61a18a2982df5d54f1b6a83c0453f2bffdeb51c357d7006c0e6c131325213849a4b2132fcfa06d6ce5d18beca6bf3633154de8c84f35384a57b884

  • SSDEEP

    6144:91OgDPdkBAFZWjadD4sdRKiAeSu47OaweCF86D7GG2t0ocF5efqF2e1:91OgLdagpA9qpfy6DSMWfbU

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 6 IoCs
  • Modifies registry class 63 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4d872864e6008aa1cf92684590f8aeb9.exe
    "C:\Users\Admin\AppData\Local\Temp\4d872864e6008aa1cf92684590f8aeb9.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2292
    • C:\Users\Admin\AppData\Local\Temp\7zS5728.tmp\setup.exe
      .\setup.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      • System policy modification
      PID:668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\ADDICT-THING\uninstall.exe

    Filesize

    46KB

    MD5

    2628f4240552cc3b2ba04ee51078ae0c

    SHA1

    5b0cca662149240d1fd4354beac1338e97e334ea

    SHA256

    03c965d0bd9827a978ef4080139533573aa800c9803599c0ce91da48506ad8f6

    SHA512

    6ecfcc97126373e82f1edab47020979d7706fc2be39ca792e8f30595133cd762cd4a65a246bee9180713e40e61efa373ecfb5eb72501ee18b38f13e32e61793b

  • C:\Users\Admin\AppData\Local\Temp\7zS5728.tmp\[email protected]\chrome.manifest

    Filesize

    114B

    MD5

    00a031f7a2945ec9503b90a6b5f9b8d4

    SHA1

    0c54b846a7cebefad1d4a2c52218aa9f81b8941a

    SHA256

    0d04ca7c46baa160faa503b32dad5cb9b6e3f749dcb84db5b297b405d7d9097a

    SHA512

    6b767b40a4b0aeb6f373ca90634dffcce1bbfe06aa6bf84d195428d20c9b640e0d91b8261395f56d6ffddcdc6eb8d48667bc3ce0d1340c6942a687979ae40794

  • C:\Users\Admin\AppData\Local\Temp\7zS5728.tmp\[email protected]\content\indexeddb.js

    Filesize

    1KB

    MD5

    75526a349ea4e4df9d2c36d1b0f9dab2

    SHA1

    a982e82a2729de7c0198badde3607562df79eb8e

    SHA256

    bd0a9aa9c5b8d2d9ebdd195c935f10fb839950f99382c4b84af9717d7275cf93

    SHA512

    e99795e4e357d9a744cc1477b89d578786f7cfcd972711b53d0272c473054a944f968e1e4c3f944d3e6a7f94d9f8a4fa2a40ec7e4805921e09e78ae7403281d2

  • C:\Users\Admin\AppData\Local\Temp\7zS5728.tmp\[email protected]\content\jquery.js

    Filesize

    91KB

    MD5

    4bab8348a52d17428f684ad1ec3a427e

    SHA1

    56c912a8c8561070aee7b9808c5f3b2abec40063

    SHA256

    3739b485ac39b157caa066b883e4d9d3f74c50beff0b86cd8a24ce407b179a23

    SHA512

    a693069c66d8316d73a3c01ed9e6a4553c9b92d98b294f0e170cc9f9f5502c814255f5f92b93aeb07e0d6fe4613f9a1d511e1bfd965634f04e6cf18f191a7480

  • C:\Users\Admin\AppData\Local\Temp\7zS5728.tmp\[email protected]\content\jsext.js

    Filesize

    6KB

    MD5

    400c1fbad17d8365218c81a35b49d01b

    SHA1

    15ca08272bb5b097b5907eee1a45ee857b02745d

    SHA256

    b1b14ccee20a0b170c6ba028598d6a8ee0da231f6bb76edb9855a8e98034cb5d

    SHA512

    bb715a356a88aaf7f9e877e7c72b58c31bc8395ed62df89a8c0e6958d08faca102c8184f6a817db2e581664cbfc8b40ac412059d06dd2d2a743c3c8f2cd079f7

  • C:\Users\Admin\AppData\Local\Temp\7zS5728.tmp\[email protected]\content\lsdb.js

    Filesize

    1KB

    MD5

    a6998184d5450cea706aa1a890d5d8ed

    SHA1

    cb77410dd750f966072ff186f0091179248a13ce

    SHA256

    a45c0e2a8f65719f7e04413c1ed59beac39c759aedd8dc593540e0b4a646d0f9

    SHA512

    98a8a140a1a27fe9afd107ca5204bd2332b8b3d517ffd3a0209654f39b1229df509d040c5207cf0d75bc3a055c4241956c09f57b3fc7f39999206b1dc137f81e

  • C:\Users\Admin\AppData\Local\Temp\7zS5728.tmp\[email protected]\content\prfdb.js

    Filesize

    1KB

    MD5

    8b2a2583aca9a6b3cc79f1cc9cfa8804

    SHA1

    8c56a5bf00a14bf617e1702d802eaedc8b9e03b6

    SHA256

    1f08517bd90bdf55acb50795c030f80b3f6b84771489d30d748c6a203a50fd57

    SHA512

    98bc9588d34e1581abf4dcffbf1ae240da93984db19fea46ab3b058d7e61d81a7073952cb47b8906c2be33e8dee8e26794860a6a62d61fed664a64ee05c1e406

  • C:\Users\Admin\AppData\Local\Temp\7zS5728.tmp\[email protected]\content\sqlite.js

    Filesize

    1KB

    MD5

    44376d12e6ec10ee7157bf049bbaecfc

    SHA1

    6ade42aa5075ab8affb6484625226e182c4fc90d

    SHA256

    4a00c96d87dc52fd6da753bba5c4b959995b7b6120d558f4db4a9531f2bbd779

    SHA512

    be73ed133f5da429a9817e91ae07db2b950f1ce5c27394fb0632b56701b89b0ccaca4a4131e139dfa17c0a9f48a8822cd8d645e093c0f8e9162b8fcddbeefb4a

  • C:\Users\Admin\AppData\Local\Temp\7zS5728.tmp\[email protected]\content\wx.xul

    Filesize

    228B

    MD5

    415e85d3f005d4a8bf7bfb9c61a5b415

    SHA1

    883f8e308cf512b7449219dc123dfa9ba5268ff6

    SHA256

    e1d05749deb735deadcd40c37303aa165fdcca9f3feedc54e9c6416dc987c33c

    SHA512

    85debd732ea1e4b0d30ec78f85465f9d699a15c2aaa931c9e5c30eebb529675f8e4e5abab904544974ec130c27e5ddb1be32979251b44528a6d8ea9f0866d095

  • C:\Users\Admin\AppData\Local\Temp\7zS5728.tmp\[email protected]\install.rdf

    Filesize

    677B

    MD5

    e4a5f302d5664f596d336ad621185282

    SHA1

    08c515169b4e5ddc99b68e3850e7a1dc06496d3e

    SHA256

    9286d9f6378982c85f37599f2618350037fda79167d7a7e9b46ca1459e7c08e7

    SHA512

    dd9956f08672a2c4b4ff52ad72cc803b1670ccc307f215c510a4a9634d42db7162156aa5f76c86250edaca6ca4e638a16b185c07afe0048032f2f9cbcb3df104

  • C:\Users\Admin\AppData\Local\Temp\7zS5728.tmp\background.html

    Filesize

    5KB

    MD5

    7e52a4d210cf1cf80417483ee33e11fb

    SHA1

    0df0470cbc89832c6ba2f8d080c85294e38b224f

    SHA256

    d48aa2e09baedda1c76de953f10ca7b8f9c648459a151dc1717e69de6e1ff291

    SHA512

    e29a4fe6dbda2f1eaa996320165851f1bb2c3d673a76114e893c159c4024224d971776cfe8ff0eb209bbb7ca021b6e249168ca294731d3c97072f58102206b91

  • C:\Users\Admin\AppData\Local\Temp\7zS5728.tmp\bhoclass.dll

    Filesize

    137KB

    MD5

    ac13c733379328f86568f6e514c2f7f8

    SHA1

    338901240fedcef4e3892fd4c723c89154f4de05

    SHA256

    7bf09b5c2a9b6348227199c1b3951b57907ca6a5c215a04ad8d5e43232f5b562

    SHA512

    35f69a82694a2ea4268a3dde7940af6bd1c87a32d93a72723464f90e4e818805be9e80872469d1cc29150a9aac872fc78613a584baa1327dfa8478c2de5672c4

  • C:\Users\Admin\AppData\Local\Temp\7zS5728.tmp\cgpnbmlgfahjekdeihepajcghobecepm.crx

    Filesize

    37KB

    MD5

    8e7d94069d630ee160a8e8fe81de4adc

    SHA1

    4601dcdd6237592c4554a8921bcb189454503503

    SHA256

    dfba65262ff388955d3c9f9d2e90e2e2bdd59c1c3f47ae797bec3d9c3b216969

    SHA512

    557a14e76725555e5488b1cee8a7aab19cca13b16bdf1476df7838b91035cfc405b610689836a9005f14f130e9e4d733bab159576a49c2dd3f2a5e4ecc5a76f5

  • C:\Users\Admin\AppData\Local\Temp\7zS5728.tmp\content.js

    Filesize

    388B

    MD5

    8f3b7eeb98857aae149eb806d50a5c28

    SHA1

    8d64596c0cb34074ca00639bb4040d0d211acc4d

    SHA256

    d384192bee77def994ff93ce3a633b218b7435a0a7938ddf897dfcf1d5711f36

    SHA512

    3e67ef5608697239974b9cf960696ac77055aaa43e966e97ad5abca711a0041abefef779075868d82c8cc4c90c364590913253aecab5d0892d52d63fd52fb4e4

  • C:\Users\Admin\AppData\Local\Temp\7zS5728.tmp\settings.ini

    Filesize

    610B

    MD5

    c92c555fed671823ee2b33e594f765f7

    SHA1

    f73c0e3fa5a800f4086d460851a1165c4978643a

    SHA256

    4096fab221b30150eee3b64f77265e3fb2645f5b1beeac3211e9105cde2e1c83

    SHA512

    18e0f6166cfbd72d3a1cff80b518b0595ee12b901bdbaa5da8ea06877e570b96b3a28e38ad3270f2d5cf5658d17163c422ee5d07f3cc769e80398d6a0a19a700

  • C:\Users\Admin\AppData\Local\Temp\7zS5728.tmp\setup.exe

    Filesize

    2KB

    MD5

    e8eaf5d906ae11934b5af8395c37c14b

    SHA1

    9a6848ba89e42212332fe5ed9ee32833204291cb

    SHA256

    4b5f17a071d3792c1e53f16e0abdd8b505e75935a02d6a62df7a4727b2fd2432

    SHA512

    77f0ca759b4ec71d72703126423bb0fa4ae6c77da0e588498fc000081fe2fdb7ad58073cf4de2b97b3c66239a013b5d3265c94ee5a36b83375fae5885d4bc907

  • C:\Users\Admin\AppData\Local\Temp\7zS5728.tmp\setup.exe

    Filesize

    61KB

    MD5

    201d2311011ffdf6c762fd46cdeb52ab

    SHA1

    65c474ca42a337745e288be0e21f43ceaafd5efe

    SHA256

    15c0e4fd6091cda70fa308ea5ee956996f6eb23d24e44700bd5c74bf111cf2aa

    SHA512

    235d70114f391d9e7a319d94bdfc49665d147723379de7487ef76cfc968f7faa3191153b32ba1ab466caeeeeef4852381529a168c3acca9a8d5a26dfe0436f6b