Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 17:12

General

  • Target

    7f7ca983831cdfc28bd691d92ffba5aa.exe

  • Size

    313KB

  • MD5

    7f7ca983831cdfc28bd691d92ffba5aa

  • SHA1

    79bbb0ad0238057e48d67467124943913a2d515e

  • SHA256

    91b4d0eaf53864f2a3d4da0d5798d25bf9359ca5b5a0f09e3964bc03368c52fe

  • SHA512

    45f9208a45a2711b4b96359dca95c1baee286681190b11abe7e5fdef612fd1f338f77ddb9d4cba76f202a36c2fed08155c9b68e37ec14b83782b6d8124fa24a3

  • SSDEEP

    6144:91OgDPdkBAFZWjadD4su9pFyXGnyw23No1ncADgFxc0ygfenvOFpgqdEVHr7:91OgLdaL9p4XGb23WnLDgFxLAIpDdEVv

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 4 IoCs
  • Modifies registry class 63 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7f7ca983831cdfc28bd691d92ffba5aa.exe
    "C:\Users\Admin\AppData\Local\Temp\7f7ca983831cdfc28bd691d92ffba5aa.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2964
    • C:\Users\Admin\AppData\Local\Temp\7zS5580.tmp\setup.exe
      .\setup.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      • System policy modification
      PID:2892

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\wxDfast\bhoclass.dll

          Filesize

          137KB

          MD5

          ac13c733379328f86568f6e514c2f7f8

          SHA1

          338901240fedcef4e3892fd4c723c89154f4de05

          SHA256

          7bf09b5c2a9b6348227199c1b3951b57907ca6a5c215a04ad8d5e43232f5b562

          SHA512

          35f69a82694a2ea4268a3dde7940af6bd1c87a32d93a72723464f90e4e818805be9e80872469d1cc29150a9aac872fc78613a584baa1327dfa8478c2de5672c4

        • C:\ProgramData\wxDfast\settings.ini

          Filesize

          599B

          MD5

          e6bf1b2ddf2890d74849a542f9a6d4cc

          SHA1

          22523bdfba10266f57da61d38b99d7346d80be87

          SHA256

          da1584410c5d6de975df89942f1557076cd5e95ab1a760a62d64137c6547dc43

          SHA512

          f7e1d698a7f46632da9e3b68953b906c5f2a6cec97b4ab162d8066b0573a8ddbfe10236834522643f212800124d2c91251039630e3b7fed072bd27aa58663c19

        • C:\ProgramData\wxDfast\uninstall.exe

          Filesize

          46KB

          MD5

          2628f4240552cc3b2ba04ee51078ae0c

          SHA1

          5b0cca662149240d1fd4354beac1338e97e334ea

          SHA256

          03c965d0bd9827a978ef4080139533573aa800c9803599c0ce91da48506ad8f6

          SHA512

          6ecfcc97126373e82f1edab47020979d7706fc2be39ca792e8f30595133cd762cd4a65a246bee9180713e40e61efa373ecfb5eb72501ee18b38f13e32e61793b

        • C:\Users\Admin\AppData\Local\Temp\7zS5580.tmp\[email protected]\chrome.manifest

          Filesize

          114B

          MD5

          12a4636a65b83a6c8725ee7f65d14919

          SHA1

          70419c608722b1d49e8199c7c748a42041cf0ed1

          SHA256

          e48b115cc56ec883376a03c01aab9c83812a300a641a5815a8d34ff23538b40b

          SHA512

          a3536792c231f2ef1d34a7f7e1d07e1423243806d7cddc04a5307b49e806d5c1bcb8d5e7d47e455e9926728a7ca83f331ec161ac6b48bf871449a93b550a33c2

        • C:\Users\Admin\AppData\Local\Temp\7zS5580.tmp\[email protected]\content\indexeddb.js

          Filesize

          1KB

          MD5

          3fef158a7e18c6a003f9842c49384710

          SHA1

          6e69b12cd301b1ee4d0595c29d86c06158c56175

          SHA256

          79217eaef3ed5c760e66bbef7b8b30faecc523e522b51d55a32c51eaf82b4284

          SHA512

          886e10aae65d41fc938bdc0e66490b7e0fb2d525a673cb140e17881a54b93b4a372f4894091cdb45ba18f31f18e5572b31e65474fb90fe601e5352707e607ae2

        • C:\Users\Admin\AppData\Local\Temp\7zS5580.tmp\[email protected]\content\jquery.js

          Filesize

          91KB

          MD5

          4bab8348a52d17428f684ad1ec3a427e

          SHA1

          56c912a8c8561070aee7b9808c5f3b2abec40063

          SHA256

          3739b485ac39b157caa066b883e4d9d3f74c50beff0b86cd8a24ce407b179a23

          SHA512

          a693069c66d8316d73a3c01ed9e6a4553c9b92d98b294f0e170cc9f9f5502c814255f5f92b93aeb07e0d6fe4613f9a1d511e1bfd965634f04e6cf18f191a7480

        • C:\Users\Admin\AppData\Local\Temp\7zS5580.tmp\[email protected]\content\jsext.js

          Filesize

          6KB

          MD5

          c278aaf668d8366649d93facaca74e86

          SHA1

          6b9f13c3de26b61322ecf089bd443d16eac5f1b4

          SHA256

          14d02286ef1c8c643961aa5dadb4f99d760b0de50e6b731a81665108f8977a0f

          SHA512

          e9a898558cf043dc3056b3d6a9afe18366ed87d475fe3a0f92cc8a4dea84919a51e57e1d7ad5a8749012067c18cfb5a9110374d9a4308294fb833f9cabd219cc

        • C:\Users\Admin\AppData\Local\Temp\7zS5580.tmp\[email protected]\content\lsdb.js

          Filesize

          1KB

          MD5

          a3d5dabf8f2c094d3bb374a11c75fe6f

          SHA1

          eb12daa1793c02359103a6437a2a2a6e17650705

          SHA256

          e2cf8c1c29ed2cca59fa6856677da64ad7cc9a70a3dc031cb8f1298880eccbdd

          SHA512

          d72af1a5a31c3b7b57a741d5f5bc0ae45b833e692d4598a327936f7c5b274093d5de5f134bbbd49de03863ed6598a4b90f9ccb8b28691412b012cca6cd3fd6b3

        • C:\Users\Admin\AppData\Local\Temp\7zS5580.tmp\[email protected]\content\sqlite.js

          Filesize

          1KB

          MD5

          d3a5173f2fd87f4be3197e3747e83d96

          SHA1

          5a5f114579433207e9678f0d1ac13294a0ead22a

          SHA256

          d81b2f7f927728b6802adbd873842bc10734627f9815abe0286499d0bbef3792

          SHA512

          e3805a7b90b949fd3d4687377308d1eee13f845d4ee49ef92bb87d3f1c778ec747467b6a977eed68e24cc5566105acbf9062c3f6c5a761ff776a9d71ea83eb4d

        • C:\Users\Admin\AppData\Local\Temp\7zS5580.tmp\background.html

          Filesize

          5KB

          MD5

          3deeb1b4d7137b2b782d6ac45b086dd3

          SHA1

          524c19996b160f04dd19a97eb3cd49de91a41465

          SHA256

          dc6cc2ed70c273d96d1026c3b8f9367e958359bb7e9e00e751ffefd52cdfb9ce

          SHA512

          3ce3fa5cfddda7127b0180f64bd2ad07316c4b155756d6b0a735a92465857089b9b797d1083c91a888f0a2f1ba686ca4836dd62fd71c9114f35c9966ade78dbc

        • \Users\Admin\AppData\Local\Temp\7zS5580.tmp\setup.exe

          Filesize

          61KB

          MD5

          201d2311011ffdf6c762fd46cdeb52ab

          SHA1

          65c474ca42a337745e288be0e21f43ceaafd5efe

          SHA256

          15c0e4fd6091cda70fa308ea5ee956996f6eb23d24e44700bd5c74bf111cf2aa

          SHA512

          235d70114f391d9e7a319d94bdfc49665d147723379de7487ef76cfc968f7faa3191153b32ba1ab466caeeeeef4852381529a168c3acca9a8d5a26dfe0436f6b