Analysis

  • max time kernel
    149s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 11:44

General

  • Target

    6bc751fc3cb92bf34c2567917b7554a3.exe

  • Size

    255KB

  • MD5

    6bc751fc3cb92bf34c2567917b7554a3

  • SHA1

    5e113e799983b1538bfe0a201c6dcd50eaf78a32

  • SHA256

    ebfa0c977a44b115369beb40e4d982929a2f4c474690da6991f191ff8670a1fb

  • SHA512

    cfcabdbb86055673a4abe79acb97ee1e254f552a048b430ac8b67076a725b2e2dbf0e22653894cc225746451e2a0f827d3a3ac255fd3d7386602f93aee636cd2

  • SSDEEP

    6144:h1OgDPdkBAFZWjadD4s5XacWhBHqlKAKM8FJfwPZxtPc3:h1OgLdaOX6qlKAKM8FGPntI

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 4 IoCs
  • Modifies registry class 45 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6bc751fc3cb92bf34c2567917b7554a3.exe
    "C:\Users\Admin\AppData\Local\Temp\6bc751fc3cb92bf34c2567917b7554a3.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2844
    • C:\Users\Admin\AppData\Local\Temp\7zS4371.tmp\51572a3f04cb1.exe
      .\51572a3f04cb1.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops Chrome extension
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      • System policy modification
      PID:8

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\MagNiPiic\51572a3f04ce8.dll

    Filesize

    115KB

    MD5

    00ce3831a16a62c6d7ea4b21049e4b22

    SHA1

    3e48c8d25b196d67722ed20cd36bf3448a4c9136

    SHA256

    d4bb7937b36973cbf3b12c9500c25ed34103944a69bad9162f3b98f39474529c

    SHA512

    7633071b26d802aae1250111baa40e5158fb1a1639d76098f2ecd6263adf0e6371d5e9a70d9005b267cb907da84235f4e361f8c8a75b8adbd19a049ab1227619

  • C:\ProgramData\MagNiPiic\51572a3f04ce8.tlb

    Filesize

    18KB

    MD5

    d5980ff8eb0ef4276fad96fba8fc5018

    SHA1

    2cb05f8b43aa3ae2f5492f590997eec6ff808fe2

    SHA256

    ac3a1daa32b1c489f9c2f4413ab35c4fc90b54a52ede0fb53276666e6eeef16f

    SHA512

    30404f467dd727a7de132fb08cd3c88abf5fb2e7ef18f24af5371b63fd106d6d5757061ec55c7b54daf9844100280670bf2b22a71c89b160048552b5eec12d0c

  • C:\ProgramData\MagNiPiic\uninstall.exe

    Filesize

    48KB

    MD5

    f3c79bda3fdf7c5dd24d60400a57cadb

    SHA1

    1adb606aaeedb246a371c8877c737f0f8c798625

    SHA256

    a76272ed3bbf23308782a308d428ee805ec77fbb622a830af26cb0ddbbf7377b

    SHA512

    c43cb957bdea357bd016fe03a8004a48d8117a12106f62876394feba05ad01a321ff6017ffb7b926cc77712f5ab63ea2e4b169a419c444c8f62aa4933f289935

  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\pglaiheihpoidlnblafjcelnkbokfdhg\1\manifest.json

    Filesize

    501B

    MD5

    b8d0f3b9bf7fb51aad87747c5f507010

    SHA1

    da6510ca351e26c043f302dfc64aff502655a553

    SHA256

    2dd53cfa1cd4ba8fac0e4305c77a3f3f031bee891da5f74f417cd03e6c082137

    SHA512

    061f56a926b60d3f86534dfd34743395a77e67b93953239f74d3f42d6ed0d7ecb87025289ae878828db0b68beaaf2eb5aa9863408187e9975b8170b4db61fb6a

  • C:\Users\Admin\AppData\Local\Temp\7zS4371.tmp\51572a3f04cb1.exe

    Filesize

    71KB

    MD5

    b78633fae8aaf5f7e99e9c736f44f9c5

    SHA1

    26fc60e29c459891ac0909470ac6c61a1eca1544

    SHA256

    d205693516dbaf34cfbd216e825190de4de1412e861bc9cb30ce863907b30d22

    SHA512

    3885b609269b26918ccfcd9069181168c12f4271b6bdfcc51afe176b2dd242d4c0953ac1a4ddaf25abcfaf28a0b694a6269d96ae39bb7b2db2f0140d2d60cd43

  • C:\Users\Admin\AppData\Local\Temp\7zS4371.tmp\pglaiheihpoidlnblafjcelnkbokfdhg\51572a3f04ae38.32128932.js

    Filesize

    4KB

    MD5

    b3b898270bfc2786a8b5b64ebb3e1a6d

    SHA1

    e96364b28333db9b218bea2e0a20a84224b21ebe

    SHA256

    100f549f92dfb888c4cd83362bbcd280dfa45a61fe9bd417899e2934df163026

    SHA512

    345d34d5b44a15b3df06e407390bef187669862cedeadfa10002edc15276723463505ede6828e80bf5591466b3cfbaf4961dbe798ad42d6dc888cacddcb018a5

  • C:\Users\Admin\AppData\Local\Temp\7zS4371.tmp\pglaiheihpoidlnblafjcelnkbokfdhg\background.html

    Filesize

    161B

    MD5

    bcc66b7831613a425647a310c1e150c7

    SHA1

    33337aa168b88340d00a4373726122b5b13d54a0

    SHA256

    65f3cf3beabfccf9d8e0ac74a5349b3596e1174d03a80dc04c9b8db1c2543184

    SHA512

    7e435604b18464acd9a335f525f152dfeeb13d42b9de5a92118aa9dbae58e3b40cbb72d6a410f9bb8ef6f87ccc1543a67b6a091a9ef3ce3fa657dc6867fa96dc

  • C:\Users\Admin\AppData\Local\Temp\7zS4371.tmp\pglaiheihpoidlnblafjcelnkbokfdhg\content.js

    Filesize

    197B

    MD5

    5f9891607f65f433b0690bae7088b2c1

    SHA1

    b4edb7579dca34dcd00bca5d2c13cbc5c8fac0de

    SHA256

    fb01e87250ac9985ed08d97f2f99937a52998ea9faebdc88e4071d6517e1ea6b

    SHA512

    76018b39e4b62ff9ea92709d12b0255f33e8402dfc649ed403382eebc22fb37c347c403534a7792e6b5de0ed0a5d97a09b69f0ffc39031cb0d4c7d79e9440c7c

  • C:\Users\Admin\AppData\Local\Temp\7zS4371.tmp\pglaiheihpoidlnblafjcelnkbokfdhg\lsdb.js

    Filesize

    559B

    MD5

    209b7ae0b6d8c3f9687c979d03b08089

    SHA1

    6449f8bff917115eef4e7488fae61942a869200f

    SHA256

    e3cf0049af8b9f6cb4f0223ccb8438f4b0c75863684c944450015868a0c45704

    SHA512

    1b38d5509283ef25de550b43ef2535dee1a13eff12ad5093f513165a47eec631bcc993242e2ce640f36c61974431ae2555bd6e2a97aba91eb689b7cd4bf25a25

  • C:\Users\Admin\AppData\Local\Temp\7zS4371.tmp\pglaiheihpoidlnblafjcelnkbokfdhg\sqlite.js

    Filesize

    1KB

    MD5

    98c556b20d4568f8e0a286927ad89679

    SHA1

    4b3bcee2c1e43f3f1faeba6cd821bece9bd9890a

    SHA256

    4320efaee681434a88f6a00f8d8cf016661376fe044abca53d4d9704f4eac8fc

    SHA512

    25a10ad7680626faa915e0875052c5b27b0864bde78a0fc028721e673c608641ec48e00a7945d2d7ce25c25b6fa1322b9430ef0a6854b6bf92656efc676426e3

  • C:\Users\Admin\AppData\Local\Temp\7zS4371.tmp\settings.ini

    Filesize

    6KB

    MD5

    0859375ffc6526669b07e4c791d20822

    SHA1

    e41d86c8c67306ca272a76e58c56394c9557e932

    SHA256

    596b6c66ad9c82db4994d6435d03942b6a6fff66210d178556bdb912d6d0f463

    SHA512

    8dc11beaeb455550b1a14fb18a1d9bcbdfe68c02968b36567c8ff242f29d08560313cb1325ca0f6662c1181f21e6b84cc71b29d01147bf0476d45446fbb50d8a

  • C:\Users\Admin\AppData\Local\Temp\7zS4371.tmp\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    7330eb6762063fbd0601f3655157f08b

    SHA1

    f8727bfb4f989b33d6c0301fc2e1537a80721487

    SHA256

    cc8dea73ff33d03d196b972b741857a8f86da3be1aa5b0bb21b156a4d991a385

    SHA512

    2bb38458314acca073c839fb71c5b0910933ed313ebd0f51abf00353e15e6a14b7f1f79e27d35ab54e73f39f48a6002ee1b6fa5c63a5e8a87f706c7f90dc0491

  • C:\Users\Admin\AppData\Local\Temp\7zS4371.tmp\[email protected]\chrome.manifest

    Filesize

    116B

    MD5

    4f39f13e86b22dc2f00f88108f6bf6ba

    SHA1

    0b151f0ab7cb21ac207899e96ff50f0cd6474502

    SHA256

    d9663197f029f5f2f0b1a79846c5d48475d4893336df676956f126de7e272487

    SHA512

    e820a1eba5e6b40bb36c024a0fdf7ee1a72f063b69900d136fb5457b8e7b41735ddbb995ea6106a51e321b8ea749a71f2489e649616e1551326377b99f438cee

  • C:\Users\Admin\AppData\Local\Temp\7zS4371.tmp\[email protected]\content\bg.js

    Filesize

    8KB

    MD5

    67a36ef0b1a91479cf062de46392b799

    SHA1

    f02c2396c1feb607f96365580f602757c1e2feda

    SHA256

    5e312db9869a51d80a7413736c6280471794c220184fc9ff970891d0622e54b9

    SHA512

    64d231bbec686fd871b7c720ad1393c7db30ceb167abe371a8032ecb86bb34bd785ca616731278e81749cf7617ee3eb626e23d0c8552c76b8fcef98c700b3b48

  • C:\Users\Admin\AppData\Local\Temp\7zS4371.tmp\[email protected]\content\zy.xul

    Filesize

    225B

    MD5

    80d48a9b66c02d03fc4f5fe33abbbf50

    SHA1

    2b01e558a876c84d943baa8ebe6dea85bd70197e

    SHA256

    963b2dc3d8c0d108bb37897a8449d4dbedebd8db49f17b5f14a9bb3403be7fe3

    SHA512

    211fe7a6747d87d35373eea671f309fcfb2736e923d77aaaf5d4afb6e0cf3bff40d0f92aae233fe18491779caa931f1cbad5da59c8b0d7ed6be38c5619074fed

  • C:\Users\Admin\AppData\Local\Temp\7zS4371.tmp\[email protected]\install.rdf

    Filesize

    601B

    MD5

    840ccd3a4cf61dcd25bdac12a8c92109

    SHA1

    0e2b74264d3afaf8fe7a53f9627fba56a45cbc29

    SHA256

    78865ab6e876d4e3d6170d63aaa64ddea34654cd82276071cc21cb5685840816

    SHA512

    762c54e69855a6bfa124e5512b9f0e33859121f7a1d9d180e0974eb7bddf07e0b932893b25b33e783890e65eb64e406c844a11dacd32abb44fdc7389f12da442

  • C:\Users\Admin\AppData\Local\Temp\nst441E.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    7579ade7ae1747a31960a228ce02e666

    SHA1

    8ec8571a296737e819dcf86353a43fcf8ec63351

    SHA256

    564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5

    SHA512

    a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b

  • C:\Users\Admin\AppData\Local\Temp\nst441E.tmp\nsJSON.dll

    Filesize

    7KB

    MD5

    b9cd1b0fd3af89892348e5cc3108dce7

    SHA1

    f7bc59bf631303facfc970c0da67a73568e1dca6

    SHA256

    49b173504eb9cd07e42a3c4deb84c2cd3f3b49c7fb0858aee43ddfc64660e384

    SHA512

    fdcbdd21b831a92ca686aab5b240f073a89a08588e42439564747cad9160d79cfa8e3c103b6b4f2917684c1a591880203b4303418b85bc040f9f00b6658b0c90

  • memory/8-78-0x0000000074860000-0x000000007486A000-memory.dmp

    Filesize

    40KB