Analysis

  • max time kernel
    122s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 17:13

General

  • Target

    7f8351c90a9210d7426d79e7698589a4.exe

  • Size

    250KB

  • MD5

    7f8351c90a9210d7426d79e7698589a4

  • SHA1

    fb9ff0c05b19ebcaf6cf2104e995624d591e0475

  • SHA256

    4f5e41254147d87d56bada78cc319c8a8eaeb1ae8ef7b2d31dfc645c05a07009

  • SHA512

    eaafe46293960db90faad9fad101b53c6eea89e85bf3f2c1aa0739ac411b0d52a7e37e682663aaa406ad5bb794d0de5ff3bed95a072bf5f2496172ec7c9bdc89

  • SSDEEP

    6144:h1OgDPdkBAFZWjadD4s5EPlc7BdArSfIVP6qgpJM+tdaPjk:h1OgLdaOmc7vfIVP6fIjjk

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 4 IoCs
  • Modifies registry class 45 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7f8351c90a9210d7426d79e7698589a4.exe
    "C:\Users\Admin\AppData\Local\Temp\7f8351c90a9210d7426d79e7698589a4.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2488
    • C:\Users\Admin\AppData\Local\Temp\7zS9D0.tmp\50f965e8c0403.exe
      .\50f965e8c0403.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops Chrome extension
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      • System policy modification
      PID:2688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Browse2save\uninstall.exe

    Filesize

    48KB

    MD5

    f3c79bda3fdf7c5dd24d60400a57cadb

    SHA1

    1adb606aaeedb246a371c8877c737f0f8c798625

    SHA256

    a76272ed3bbf23308782a308d428ee805ec77fbb622a830af26cb0ddbbf7377b

    SHA512

    c43cb957bdea357bd016fe03a8004a48d8117a12106f62876394feba05ad01a321ff6017ffb7b926cc77712f5ab63ea2e4b169a419c444c8f62aa4933f289935

  • C:\Users\Admin\AppData\Local\Temp\7zS9D0.tmp\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    99c9b9c75ecfce366ca9149dffea2c22

    SHA1

    44aab102a9ca45409ee98119a360db5928a14381

    SHA256

    4584cc3e38935d408aee845e5fa39b420be9b7c8174c9dca022e589a4ca425d7

    SHA512

    c61c71d4335a2fed2af328db9cb6b2c16f628297f48a09bf2ed6e7d1d9c3680684c0529feb2a793dba0ab772e0c952dc53e8bca07a8e70585df4fcf058313473

  • C:\Users\Admin\AppData\Local\Temp\7zS9D0.tmp\[email protected]\chrome.manifest

    Filesize

    116B

    MD5

    8fa9d066b321644714aab77c3f3c22e6

    SHA1

    331c6cdd7f6ff934a0e46e978b387fc6089509db

    SHA256

    4d6ebf312e2f38617140245916cc3df8049e31649839d2f24f4bf18f198891ba

    SHA512

    0da769aceaf9d8b2c453e46e06796263ad8372af81e5290bc917f98a72c2cbdda2068d1126bd3d11cfc96ccdc41546246fb9f8b796cb014b84ff81faddc761e1

  • C:\Users\Admin\AppData\Local\Temp\7zS9D0.tmp\[email protected]\content\bg.js

    Filesize

    8KB

    MD5

    5f5ad132114cdff702c931decd0a521e

    SHA1

    8bb40aa5df9c64726fe7b3b4d574bf8d5d843ac1

    SHA256

    59c73edd4e4081046c16c434abb53845b60aa39fe07a7c5d6371296dcd4cfe75

    SHA512

    cce9f797e917fbdf9ee629bc1e137abda0e1b2bf35ff7bb61724f1917a24480841b116af7ff2ecf300e2b8f7d0456025b77987e7d12d9c8ddb1d8f4206f95cdb

  • C:\Users\Admin\AppData\Local\Temp\7zS9D0.tmp\[email protected]\content\zy.xul

    Filesize

    225B

    MD5

    175b824e80d93d0a1aa5c7182904aca5

    SHA1

    a341478429ed861d16a8f01be264f39709762cc2

    SHA256

    a8b31c5b4f74701ebc60ac215c71b735b33098c4da2fe8e7005ab7c306714020

    SHA512

    241d1a9e853c21912d1c6b00fef134d54c1269089fb2f8af800bb72a1dcb4bd12db70f3da9f1146ec103325d618bb8f344326861dcbacabb7988de5dba8f7b69

  • C:\Users\Admin\AppData\Local\Temp\7zS9D0.tmp\[email protected]\install.rdf

    Filesize

    718B

    MD5

    28574c791770130a63c5d64089640a32

    SHA1

    4d291d2a7b7eac1b0a899eefa70c5b1e88f24d82

    SHA256

    c6275e5d8e0c036ac5d297bbfcefb18be3dbbb2e024ba904c363a7680d4bcab2

    SHA512

    76f98aa692766e04c0766a55e81d22ca9c3b8c4103d8b3c1c7a27f32fce7969dda1d357d9305a573155b0acfc2993b4049d04ff0ec7dd62b0571b085d2bca10f

  • C:\Users\Admin\AppData\Local\Temp\7zS9D0.tmp\50f965e8c043c.dll

    Filesize

    116KB

    MD5

    da161da8bcb9b8032908cc303602f2ee

    SHA1

    8a2d5e5b32376a40f33d6c9881001425ec025205

    SHA256

    0648d564b30e13a0819f28e00a9af39a6686a4d29ccd265c7d81548e4fe0f67e

    SHA512

    39e882a371dbce2484324811bffdd7ae7655b57401d07bf264aced6b5dac0ae326bd1945c536f05d8ab3b92ca03ff056c5a7baf54f7eb477b45fc405ec54052c

  • C:\Users\Admin\AppData\Local\Temp\7zS9D0.tmp\50f965e8c043c.tlb

    Filesize

    2KB

    MD5

    1f14de44d0d63a79f91d3fe90badb5fc

    SHA1

    7fcc921608d2cf40e81cdd9a98e1a15a6ba1f57e

    SHA256

    bd3d85c0136a66b2af79d4d91c1c5700c8931937b7e554d5ece946760ef4a99c

    SHA512

    86eb6ebf9eccf1dcb601db827797ac603c0ebe01b6d73318986275c29bd034c8df5f7c79ddf0b19536faf24bdb11e09ac95ea43e8fe75b0ed3dde76dd139883c

  • C:\Users\Admin\AppData\Local\Temp\7zS9D0.tmp\abkjfblcgbkkephofbokpginkgpdjejo\50f965e8c02278.97469801.js

    Filesize

    4KB

    MD5

    e9f106787e6fa981b1b184248ea5523f

    SHA1

    cacb97acf24025d7e04a5f26017a1f8eda60cad7

    SHA256

    8e442651e9e94814168d0794dd24254007710bdfa634cb234f42e57f3eb95679

    SHA512

    d6b3331e2f15f06abe91335b0048d7aa15c5e5ee65c3bfab1107fba52d610a89cee175761483836af38c2fdf50da6523b5e88b562e67f0b8dd516e42fbbd3377

  • C:\Users\Admin\AppData\Local\Temp\7zS9D0.tmp\abkjfblcgbkkephofbokpginkgpdjejo\background.html

    Filesize

    161B

    MD5

    548f8c7a2725475da008e1c6c6f03690

    SHA1

    c96bed0ea955e74845ee27e82e0b1fd112d4f871

    SHA256

    dad7a19de287574b5f8f439284b518bc34052004c0840722c88c00a0b90bfd86

    SHA512

    2a154ed9c218db55785c69d9ed626d77eeb5f0894f38bec25b5ada706973bc26ee8b5c90a5209f1050134af07436bbc139805de33784838a7d62a29ebd54b49b

  • C:\Users\Admin\AppData\Local\Temp\7zS9D0.tmp\abkjfblcgbkkephofbokpginkgpdjejo\content.js

    Filesize

    197B

    MD5

    5f9891607f65f433b0690bae7088b2c1

    SHA1

    b4edb7579dca34dcd00bca5d2c13cbc5c8fac0de

    SHA256

    fb01e87250ac9985ed08d97f2f99937a52998ea9faebdc88e4071d6517e1ea6b

    SHA512

    76018b39e4b62ff9ea92709d12b0255f33e8402dfc649ed403382eebc22fb37c347c403534a7792e6b5de0ed0a5d97a09b69f0ffc39031cb0d4c7d79e9440c7c

  • C:\Users\Admin\AppData\Local\Temp\7zS9D0.tmp\abkjfblcgbkkephofbokpginkgpdjejo\lsdb.js

    Filesize

    559B

    MD5

    209b7ae0b6d8c3f9687c979d03b08089

    SHA1

    6449f8bff917115eef4e7488fae61942a869200f

    SHA256

    e3cf0049af8b9f6cb4f0223ccb8438f4b0c75863684c944450015868a0c45704

    SHA512

    1b38d5509283ef25de550b43ef2535dee1a13eff12ad5093f513165a47eec631bcc993242e2ce640f36c61974431ae2555bd6e2a97aba91eb689b7cd4bf25a25

  • C:\Users\Admin\AppData\Local\Temp\7zS9D0.tmp\abkjfblcgbkkephofbokpginkgpdjejo\manifest.json

    Filesize

    480B

    MD5

    1a2173a6fed9391e199e3afcdfc40225

    SHA1

    ee64aaec103ddfbd7a920fd118b25d866631a265

    SHA256

    9c31c7d56d28973e10dc0191ec073ec185c2ef0e5d742ea2e6ada0b0de66dda8

    SHA512

    6ce09f31313c451ffb5bd276ea1fa9df59ddc0b3d5bd4bccb3579ccb480a3ec14f9fd1b096e6167e5c1be61db68a534b2e94389134e45785ca491714538a9f45

  • C:\Users\Admin\AppData\Local\Temp\7zS9D0.tmp\abkjfblcgbkkephofbokpginkgpdjejo\sqlite.js

    Filesize

    1KB

    MD5

    53e7db26981a0d251cb155deed2bb58a

    SHA1

    7237b07858fff0adbcb2959708e896aea4a5f598

    SHA256

    8f330e27ac49a9b95f6ed64eacc91db8b8d531c363f94ddceeaed6536af32a1e

    SHA512

    fa120805ea989a7bb954cc6b788f7c4db184d9a281a61e1b8f9831a787c01d9330e5447aec54d5ebd8ed9267f1cd5aa9366564574388f065829e7e88d95ff154

  • C:\Users\Admin\AppData\Local\Temp\7zS9D0.tmp\settings.ini

    Filesize

    6KB

    MD5

    b3e6519d61c307eef163ef8090425de7

    SHA1

    5098840374b155305fa14377a6ee2760f7f9e3f9

    SHA256

    48bba7eeac214157d4a381e205169a33e28e478fc4d92795093bb0936e5253ea

    SHA512

    46408a5d21f95aa294f9481ae915775b1c41d2ad43a7fe0e365cd7b9d90085fe88ac88e4e33cac79f141531c9a7fd3ccbd82b2b47e3e9cae2b47899bd6c7259d

  • \Users\Admin\AppData\Local\Temp\7zS9D0.tmp\50f965e8c0403.exe

    Filesize

    71KB

    MD5

    b78633fae8aaf5f7e99e9c736f44f9c5

    SHA1

    26fc60e29c459891ac0909470ac6c61a1eca1544

    SHA256

    d205693516dbaf34cfbd216e825190de4de1412e861bc9cb30ce863907b30d22

    SHA512

    3885b609269b26918ccfcd9069181168c12f4271b6bdfcc51afe176b2dd242d4c0953ac1a4ddaf25abcfaf28a0b694a6269d96ae39bb7b2db2f0140d2d60cd43

  • \Users\Admin\AppData\Local\Temp\nsyA2F.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    7579ade7ae1747a31960a228ce02e666

    SHA1

    8ec8571a296737e819dcf86353a43fcf8ec63351

    SHA256

    564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5

    SHA512

    a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b

  • \Users\Admin\AppData\Local\Temp\nsyA2F.tmp\nsJSON.dll

    Filesize

    7KB

    MD5

    b9cd1b0fd3af89892348e5cc3108dce7

    SHA1

    f7bc59bf631303facfc970c0da67a73568e1dca6

    SHA256

    49b173504eb9cd07e42a3c4deb84c2cd3f3b49c7fb0858aee43ddfc64660e384

    SHA512

    fdcbdd21b831a92ca686aab5b240f073a89a08588e42439564747cad9160d79cfa8e3c103b6b4f2917684c1a591880203b4303418b85bc040f9f00b6658b0c90

  • memory/2688-87-0x0000000074CF0000-0x0000000074CFA000-memory.dmp

    Filesize

    40KB