Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 17:13

General

  • Target

    7f8351c90a9210d7426d79e7698589a4.exe

  • Size

    250KB

  • MD5

    7f8351c90a9210d7426d79e7698589a4

  • SHA1

    fb9ff0c05b19ebcaf6cf2104e995624d591e0475

  • SHA256

    4f5e41254147d87d56bada78cc319c8a8eaeb1ae8ef7b2d31dfc645c05a07009

  • SHA512

    eaafe46293960db90faad9fad101b53c6eea89e85bf3f2c1aa0739ac411b0d52a7e37e682663aaa406ad5bb794d0de5ff3bed95a072bf5f2496172ec7c9bdc89

  • SSDEEP

    6144:h1OgDPdkBAFZWjadD4s5EPlc7BdArSfIVP6qgpJM+tdaPjk:h1OgLdaOmc7vfIVP6fIjjk

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 2 IoCs
  • Modifies registry class 45 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7f8351c90a9210d7426d79e7698589a4.exe
    "C:\Users\Admin\AppData\Local\Temp\7f8351c90a9210d7426d79e7698589a4.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4124
    • C:\Users\Admin\AppData\Local\Temp\7zS55A2.tmp\50f965e8c0403.exe
      .\50f965e8c0403.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops Chrome extension
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      • System policy modification
      PID:4520

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7zS55A2.tmp\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    99c9b9c75ecfce366ca9149dffea2c22

    SHA1

    44aab102a9ca45409ee98119a360db5928a14381

    SHA256

    4584cc3e38935d408aee845e5fa39b420be9b7c8174c9dca022e589a4ca425d7

    SHA512

    c61c71d4335a2fed2af328db9cb6b2c16f628297f48a09bf2ed6e7d1d9c3680684c0529feb2a793dba0ab772e0c952dc53e8bca07a8e70585df4fcf058313473

  • C:\Users\Admin\AppData\Local\Temp\7zS55A2.tmp\[email protected]\chrome.manifest

    Filesize

    116B

    MD5

    8fa9d066b321644714aab77c3f3c22e6

    SHA1

    331c6cdd7f6ff934a0e46e978b387fc6089509db

    SHA256

    4d6ebf312e2f38617140245916cc3df8049e31649839d2f24f4bf18f198891ba

    SHA512

    0da769aceaf9d8b2c453e46e06796263ad8372af81e5290bc917f98a72c2cbdda2068d1126bd3d11cfc96ccdc41546246fb9f8b796cb014b84ff81faddc761e1

  • C:\Users\Admin\AppData\Local\Temp\7zS55A2.tmp\[email protected]\content\bg.js

    Filesize

    8KB

    MD5

    5f5ad132114cdff702c931decd0a521e

    SHA1

    8bb40aa5df9c64726fe7b3b4d574bf8d5d843ac1

    SHA256

    59c73edd4e4081046c16c434abb53845b60aa39fe07a7c5d6371296dcd4cfe75

    SHA512

    cce9f797e917fbdf9ee629bc1e137abda0e1b2bf35ff7bb61724f1917a24480841b116af7ff2ecf300e2b8f7d0456025b77987e7d12d9c8ddb1d8f4206f95cdb

  • C:\Users\Admin\AppData\Local\Temp\7zS55A2.tmp\[email protected]\content\zy.xul

    Filesize

    225B

    MD5

    175b824e80d93d0a1aa5c7182904aca5

    SHA1

    a341478429ed861d16a8f01be264f39709762cc2

    SHA256

    a8b31c5b4f74701ebc60ac215c71b735b33098c4da2fe8e7005ab7c306714020

    SHA512

    241d1a9e853c21912d1c6b00fef134d54c1269089fb2f8af800bb72a1dcb4bd12db70f3da9f1146ec103325d618bb8f344326861dcbacabb7988de5dba8f7b69

  • C:\Users\Admin\AppData\Local\Temp\7zS55A2.tmp\[email protected]\install.rdf

    Filesize

    718B

    MD5

    28574c791770130a63c5d64089640a32

    SHA1

    4d291d2a7b7eac1b0a899eefa70c5b1e88f24d82

    SHA256

    c6275e5d8e0c036ac5d297bbfcefb18be3dbbb2e024ba904c363a7680d4bcab2

    SHA512

    76f98aa692766e04c0766a55e81d22ca9c3b8c4103d8b3c1c7a27f32fce7969dda1d357d9305a573155b0acfc2993b4049d04ff0ec7dd62b0571b085d2bca10f

  • C:\Users\Admin\AppData\Local\Temp\7zS55A2.tmp\50f965e8c0403.exe

    Filesize

    71KB

    MD5

    b78633fae8aaf5f7e99e9c736f44f9c5

    SHA1

    26fc60e29c459891ac0909470ac6c61a1eca1544

    SHA256

    d205693516dbaf34cfbd216e825190de4de1412e861bc9cb30ce863907b30d22

    SHA512

    3885b609269b26918ccfcd9069181168c12f4271b6bdfcc51afe176b2dd242d4c0953ac1a4ddaf25abcfaf28a0b694a6269d96ae39bb7b2db2f0140d2d60cd43

  • C:\Users\Admin\AppData\Local\Temp\7zS55A2.tmp\settings.ini

    Filesize

    6KB

    MD5

    b3e6519d61c307eef163ef8090425de7

    SHA1

    5098840374b155305fa14377a6ee2760f7f9e3f9

    SHA256

    48bba7eeac214157d4a381e205169a33e28e478fc4d92795093bb0936e5253ea

    SHA512

    46408a5d21f95aa294f9481ae915775b1c41d2ad43a7fe0e365cd7b9d90085fe88ac88e4e33cac79f141531c9a7fd3ccbd82b2b47e3e9cae2b47899bd6c7259d

  • C:\Users\Admin\AppData\Local\Temp\nsw564F.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    7579ade7ae1747a31960a228ce02e666

    SHA1

    8ec8571a296737e819dcf86353a43fcf8ec63351

    SHA256

    564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5

    SHA512

    a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b

  • memory/4520-78-0x0000000074830000-0x000000007483A000-memory.dmp

    Filesize

    40KB