Analysis

  • max time kernel
    136s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-12-2023 04:45

General

  • Target

    5544e7cd28fb71ac7e9db03b91ddbb63.exe

  • Size

    5.3MB

  • MD5

    5544e7cd28fb71ac7e9db03b91ddbb63

  • SHA1

    1c7ef21aa798120ac9d2bf66b5eb5ecab20de843

  • SHA256

    bdfcf247429be25c11cc670aadc41e47754304d7e17b9587a378c554da7224b2

  • SHA512

    e114493a0279d2a1ebdf36c89b099662340e49e2e74557c45ff43abb0ac7454700447d7893d84471710284d091a1c29df0bc2f462202d4c389b73e79e73528a3

  • SSDEEP

    98304:qgwRoYLOmOpZVvoJnYvDDPwm7SAvrl4DMhl+CKRNj9sl/l+AhInZ2l5KbLZ98shC:qggCmOXqJnUZ7SAvrl4DZCR/lBCnSApG

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 13 IoCs
  • Modifies registry class 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 52 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5544e7cd28fb71ac7e9db03b91ddbb63.exe
    "C:\Users\Admin\AppData\Local\Temp\5544e7cd28fb71ac7e9db03b91ddbb63.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4420
    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\setup.exe
      "C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\setup.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:836
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32.exe /s "C:\Users\Admin\AppData\Local\skinmanager\common\SMPlugin.dll"
        3⤵
        • Loads dropped DLL
        • Modifies registry class
        PID:1064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\skinmanager\setting\smgr2.ini

    Filesize

    42B

    MD5

    3af37a142a5ddec6cc0ca2d6ae93c8c5

    SHA1

    bf5229ad5cf9f4f0cdd8e5947fb8b42a32b3bddb

    SHA256

    57b33eeb5faf3b90a0884ae383757956d1a2ecd1038897f1327762d06588df80

    SHA512

    1a66fcf60d05814e2b1272d4b997c00ef54c7421033dc12bf77977e4e97c24667585194a3b29104b043bdf812cf8f6cf5a6480218ae7d1c357046b2ac250df71

  • C:\Users\Admin\AppData\LocalLow\skinmanager\setting\smgr3.ini

    Filesize

    226B

    MD5

    e97dbc3b26e56f8f18c3b245c6ae236c

    SHA1

    7f9afb92b82b5de0d9d2fb37691bd8cc2728e614

    SHA256

    76c62e41bc9015d205f60b534a0530a82516b6cc9889bb7af946f35b466422d9

    SHA512

    5f7892b6f51355ec6454f933aafb66f38f3fe40a2867566a606963b911191b2a82a7645cb9dcc64dfd4a31efdb9c64807187579e67a7693b6a5e2d07e4eeb8cf

  • C:\Users\Admin\AppData\LocalLow\skinmanager\setting\smgr3.ini

    Filesize

    106B

    MD5

    bfb9a17b357ecdc001409f81238d20d8

    SHA1

    dd969ae27eb66a5a895d5f72a358ff0b2ca2d3a4

    SHA256

    fd7afd3a59e329a2e6ab4fc25efce8b7812cc303a411f20d11607b5d12bd1bd2

    SHA512

    cbc1b95c58260a2cdeaac7c7f9e0c1cc0fcc9adcbed1610acca58e124f403375f228c34498ff362e5a9ee109311e11d4bc444b353f137c6e4d81c81140eb78d3

  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\7z.dll

    Filesize

    92KB

    MD5

    8b09ed58305d9072a68b8770c5755b25

    SHA1

    5ce93d259a248d7264a67e85ee5409656877d99d

    SHA256

    23754e548518c2e39f4147ffc64d9a33dc6f73f29ab8eeaa2a7114fc34c16e2a

    SHA512

    886e427eb3078b2b148f19cea40676488f927dc1cd83f318e97ef9f4aea5eceb015fd6ea19fffdf48f69b65b8e3180f4f36b4647900d13fa28d656fa42868265

  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\guide.dll

    Filesize

    2.0MB

    MD5

    a22cdb6916818db02ccbfc2c246698b3

    SHA1

    16801e5ea0186d51b4dbe443964a071eb0332c17

    SHA256

    7d54a962ad3349c5d7b603ada604959120334fa808bb99d88a6aa483d5d3b912

    SHA512

    112c59f153a39153c6d9057de2e3598f546cb22a39d8b0fbb2b45ff0eacc1b1346cbc7f567fb2db6de6338f401c0396d67f3ac4c38e15d8fd8c822a75f2c9084

  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\guide.dll

    Filesize

    2.0MB

    MD5

    8c8c94d723e9983e4d7b0bed8a04d8b2

    SHA1

    3ba5c734fbfb69f40dc6a51b606b5f383a7758c7

    SHA256

    278ec6c9f7da44d159ffda4de32d195dc67e3bc3528999e9899f96353d90281b

    SHA512

    dbf352a872de0b5126dc7d960b3037c31b9a678796745e14346572debe3c643f9babaf695cbcaad4ec02aa68cf6616e5449ab88f2da1feb8b29c5d03f0cb5b82

  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\setup.exe

    Filesize

    102KB

    MD5

    135edfd3229a5f05744da338cccb6494

    SHA1

    9dd47300cf78050213a5e864e399be6ece6bab99

    SHA256

    f86a4ea817c29833edef72f4b6982dfc05059f036c46a533fe3ec0aee597fa00

    SHA512

    4878329d679d43b1fccd41723839ca0084bd2a6a7c92941e537a1269cea7ea28af6cb7f9822093ce192e54c00b71ed7dddffff93396fdd6e318e09cbeb2a4b8f

  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\skinmgr.dat

    Filesize

    93KB

    MD5

    4fbaa02e956b8ad5e106ce710458d82c

    SHA1

    c484a347f7c6c9bf6d611f03e1480be38483ec99

    SHA256

    b0efa26b5d7c9171a1db5555ed66e8b23e90f77614722eee583d7b3fc7adf4d8

    SHA512

    1e950783f39ee96adc4e0b15b94d504d33fed1c511fa0caa83e22ab5bc3cfa11a59b950be7c2424717b1e73d129d0a8d0dd1ac061ee3ce9c4111c4321ad8c21f

  • C:\Users\Admin\AppData\Local\skinmanager\1.0.0.9\smtmp\setting\chrome1\deajhnfendlflohdehgglolainipoefj\1.1.1.10_0\background.html

    Filesize

    355B

    MD5

    7b88e5755afa615e27c0051983133dc2

    SHA1

    4663c8420c657c3a930ad5b779e8037660e23c35

    SHA256

    6d5b22a38d7a1fdeefad1eca9af45af90f99fd498ef9bfa38512f4d27bd5449b

    SHA512

    59ea166201e8aedc722267f3bb6a06054edb3721f052e1954c4f0f994b577ebe55981c5e6fc07c468b91dc808f302c40503b0bee7bba9f98f3499ba7aa449b11

  • C:\Users\Admin\AppData\Local\skinmanager\1.0.0.9\smtmp\setting\chrome1\deajhnfendlflohdehgglolainipoefj\1.1.1.10_0\background.js

    Filesize

    72KB

    MD5

    d36e2247c84bf99605840751826f108b

    SHA1

    c8eea0fb855ffde26061ea6225141cc17184b7e0

    SHA256

    0afa6f658ac130095355a8f8d3c6d3fd31cc6e1fa3239e597383cebc20943c5a

    SHA512

    3399100b0c54468b4a3fd06173b8fee8db7b06d6f4ed2659955608e4fb96e3cec73b3a14bfca620da69f1dd0f709e52faf017506139256620bab7d4d575197d0

  • C:\Users\Admin\AppData\Local\skinmanager\1.0.0.9\smtmp\setting\chrome1\deajhnfendlflohdehgglolainipoefj\1.1.1.10_0\contentScript.js

    Filesize

    6KB

    MD5

    6dfb115e23e1fa68ebc3571af9e071a5

    SHA1

    fb593d26e2617b38e180ef0a0a81b5a52db4f30c

    SHA256

    a16ba7952a5a9894ff62defe58f7ff3ee9d354d16a49a4cc7379580c7c759c9d

    SHA512

    5edb930958487b40e1bd089a263932b59399b289ced84f0188e6f303a5def729313a2b775e960e7f8af11ea689d575086fb92bb5d8172a8c4e3282f9211e6e27

  • C:\Users\Admin\AppData\Local\skinmanager\1.0.0.9\smtmp\setting\chrome1\deajhnfendlflohdehgglolainipoefj\1.1.1.10_0\css\ext-main.css

    Filesize

    86B

    MD5

    25e3ce1c0ead9526adef1a3b76f99ce2

    SHA1

    94d683d252f928bab493e93c8e61e674757ee836

    SHA256

    5be476812829a3bf0f973fb14450f05bfa16225a02b554f58d71d8248240a058

    SHA512

    031adb90972e8f563df9028dfb07f8adf4be1034ab7ffbe65baa03e587a2cf314481e5f4fd5f63815fdb4ce5ee8f5314c288115cbb5b3c97d73ba9ea2bb68013

  • memory/836-56-0x0000000000B90000-0x0000000000B91000-memory.dmp

    Filesize

    4KB