Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    03-01-2024 21:06

General

  • Target

    dfe3c14fea77ea02a85f2317ed77f2e2814ce9e6c609404a1a954e22ccb2873c.exe

  • Size

    1.3MB

  • MD5

    3f705a7387cf12af6e397b345b09e241

  • SHA1

    0c0ac5248bcfae2f769d4805347ebb82306c229f

  • SHA256

    dfe3c14fea77ea02a85f2317ed77f2e2814ce9e6c609404a1a954e22ccb2873c

  • SHA512

    29cd6f21330423f4f7ab732b70fe60deb587d6c1cf15803bd5d6a5618586a81dd88a1baf2af4655db39180e85533462d2d9335988473b14706102d52181d63a0

  • SSDEEP

    24576:QTvRhpBjV5A7oL9lbMmaTi1cEWuqpdbfbCuMpc+:QTZhjV20LyacE1qpJjCux+

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 18 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dfe3c14fea77ea02a85f2317ed77f2e2814ce9e6c609404a1a954e22ccb2873c.exe
    "C:\Users\Admin\AppData\Local\Temp\dfe3c14fea77ea02a85f2317ed77f2e2814ce9e6c609404a1a954e22ccb2873c.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2616
    • C:\Users\Admin\AppData\Local\Temp\nsy24B1.tmp\BDinit.exe
      "C:\Users\Admin\AppData\Local\Temp\nsy24B1.tmp\BDinit.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2244
      • C:\Program Files (x86)\Common Files\BDinit.exe
        "C:\Program Files (x86)\Common Files\BDinit.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1440
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1440 -s 608
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:2052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2bf611cf0ffe631fadb108cf68af916a

    SHA1

    c8a8adbfa456e6d8bde405b4d5f74a8ca05d5234

    SHA256

    aeec35b9abbcdd094a15f652dd24a9ea1a997f2a6c4e7919d7e075d47fc1ada2

    SHA512

    076dd4e4169e9afe3482451e5a07f65e46dd09dbdd347e57553378f02de878c7dec98a90650a051520912fce4ab03757327c4002d976999a2038e211565bfb76

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dec4c411ab8ecc528bad26170da72b3f

    SHA1

    de5ed9a550fdfa4c8ef7cce148cc47562dc2c468

    SHA256

    7cfee3f7629062689cba070b21de4c0a49e691f1de86f9ebca5aa6d9dffb68c2

    SHA512

    68ebda94038dcf30fa1f7fecbd64d4243981bbb764f9b449b82882b635716a06f7bdbd1ecb127d63ca91d19deb85d601c869678fca362734a546069059b8b641

  • C:\Users\Admin\AppData\Local\Temp\Cab63CA.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar63DD.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • C:\Users\Admin\AppData\Local\Temp\nsy24B1.tmp\InetBgDL.dll

    Filesize

    17KB

    MD5

    97c607f5d0add72295f8d0f27b448037

    SHA1

    dfb9a1aa1d3b1f7821152afaac149cad38c8ce3c

    SHA256

    dc98ed352476af459c91100b8c29073988da19d3adc73e2c2086d25f238544a5

    SHA512

    ad759062152869089558389c741876029198c5b98fa725e2d2927866dc8b416ae2de871cb2479f614f6d29b6f646bf7191d02837c3cabc15b8185b563bc46268

  • C:\Users\Admin\AppData\Local\Temp\nsy24B1.tmp\installing.html

    Filesize

    1KB

    MD5

    32de55f44c497811dd7ed7f227f5c28d

    SHA1

    c111be08e7f3d268e7a2ed160d0c30833f25ae4a

    SHA256

    6259f3a41a703f13466503e6fbd37ca40e94f565a2f4b4087fbcd87a13bf3ee1

    SHA512

    48bb6f24b3ee2f4b7052205a3843ea34f917ee192b70261d2438c037b0e17d48bce8beb4c31be4141e9618922a45b6b47745b797e5618f18fe00bfc1625309ef

  • C:\Users\Admin\AppData\Local\Temp\nsy24B1.tmp\installing.js

    Filesize

    2KB

    MD5

    dfa7861bca754036ab853b3bb02b194d

    SHA1

    46d7c5ba614b39caa4857fcba4bdedbabb2c67c0

    SHA256

    2c286b6eefd38f032a385f3ac6a1f794deab3bac0fbff71bd0ba21453f477878

    SHA512

    c58d96fb2496a84261a5e4b18cf4156a30f9ad161bbabc3652b6b5c24976f1ac432dced31927a9443260cdca0292524d1f691766b7c0731f926d37be11fe0c64

  • C:\Users\Admin\AppData\Local\Temp\nsy24B1.tmp\installing_page.css

    Filesize

    1KB

    MD5

    6582e207592b60a995b4510cf959eb03

    SHA1

    08afdebde481b653e04f89bedad0cba6c8dbd999

    SHA256

    43c38801c1746880625f97eee3fe37fe94d1300adf812bfe26e47b094b87523b

    SHA512

    0a5a5ce944b89f552a38300674c44cc9de4920e87c2aa2c3c63bbceedff1d80ab35ab31274bfa89e0acc518470f466a2d67d483147f2ca8061d68b770e2ebe48

  • C:\Users\Admin\AppData\Local\Temp\nsy24B1.tmp\log.dll

    Filesize

    643KB

    MD5

    379559a928d17a3822b1e06483960254

    SHA1

    750dbd7134e55963f3acc8615f3a944be2b940c8

    SHA256

    9952f3a2fbf87c6fa1f8e79e81e7dc303048ba2e96c6ffa08abe4295163182b1

    SHA512

    eeb6b40674b69683408865bb085a0ea6a0410a995d8dafa9d702879cae23c73115260e3fdb67e17cdf25e29d83ff7d46c0b4ce058a61689ba6401e233465baa5

  • C:\Users\Admin\AppData\Local\Temp\nsy24B1.tmp\stub_common.css

    Filesize

    684B

    MD5

    544b51f11ad19df720669478d28f129d

    SHA1

    d238b604fd3fa37dfd552eacdc6aacc474fcddad

    SHA256

    4d9495b6f0e18331659993b79440e414a6e607fcdaeacbc7477e0683cc0fa98b

    SHA512

    bbbb0f31839316c51464cfd225166145f968ce38995dc2748df5402b7e109ff6119d65b6774fc4738638ad4c9d89776516b00ab5a700097d9d74e1824a11dc5e

  • C:\Users\Admin\AppData\Local\Temp\nsy24B1.tmp\stub_common.js

    Filesize

    817B

    MD5

    58b8ac894c64370cfa137f5848aeb88d

    SHA1

    6a1ac1f88a918a232b79fe798b2de69cf433945f

    SHA256

    0e28aa770b0afade30be85c6dc1e50344db8f8cdd3fa01989d81a9e20a4990bd

    SHA512

    ae309518e0f926021e4d9378950c1a375263247d4f79d8a8cc09464cd01653ae5e707d52a4b0c36d532e649c246f4be6b5ba8648f58fb0e3e40c495ae63180ab

  • \Users\Admin\AppData\Local\Temp\nsy24B1.tmp\BDinit.exe

    Filesize

    192KB

    MD5

    8a8db1e20dc508af5a81fc00b1929468

    SHA1

    32e1ebec9672ad7cc5dc36d8a1c87bbf47a4fa9f

    SHA256

    386eb7aa33c76ce671d6685f79512597f1fab28ea46c8ec7d89e58340081e2bd

    SHA512

    9c5747fd7563b29ecf43b71b5480b260b083892d37054ff77cc6c613c3db380ce2bdf990fb466edc8705f784b051dc1be208b454696e67eb0c90c20470f4ea87

  • \Users\Admin\AppData\Local\Temp\nsy24B1.tmp\CityHash.dll

    Filesize

    53KB

    MD5

    2021acc65fa998daa98131e20c4605be

    SHA1

    2e8407cfe3b1a9d839ea391cfc423e8df8d8a390

    SHA256

    c299a0a71bf57eb241868158b4fcfe839d15d5ba607e1bdc5499fdf67b334a14

    SHA512

    cb96d3547bab778cbe94076be6765ed2ae07e183e4888d6c380f240b8c6708662a3b2b6b2294e38c48bc91bf2cc5fc7cfcd3afe63775151ba2fe34b06ce38948

  • \Users\Admin\AppData\Local\Temp\nsy24B1.tmp\System.dll

    Filesize

    22KB

    MD5

    b361682fa5e6a1906e754cfa08aa8d90

    SHA1

    c6701aee0c866565de1b7c1f81fd88da56b395d3

    SHA256

    b711c4f17690421c9dc8ddb9ed5a9ddc539b3a28f11e19c851e25dcfc7701c04

    SHA512

    2778f91c9bcf83277d26c71118a1ccb0fb3ce50e89729f14f4915bc65dd48503a77b1e5118ce774dea72f5ce3cc8681eb9ca3c55cf90e9f61a177101ba192ae9

  • \Users\Admin\AppData\Local\Temp\nsy24B1.tmp\UAC.dll

    Filesize

    28KB

    MD5

    d23b256e9c12fe37d984bae5017c5f8c

    SHA1

    fd698b58a563816b2260bbc50d7f864b33523121

    SHA256

    ec6a56d981892bf251df1439bea425a5f6c7e1c7312d44bedd5e2957f270338c

    SHA512

    13f284821324ffaeadafd3651f64d896186f47cf9a68735642cf37b37de777dba197067fbccd3a7411b5dc7976e510439253bd24c9be1d36c0a59d924c17ae8e

  • \Users\Admin\AppData\Local\Temp\nsy24B1.tmp\UserInfo.dll

    Filesize

    14KB

    MD5

    610ad03dec634768cd91c7ed79672d67

    SHA1

    dc8099d476e2b324c09db95059ec5fd3febe1e1e

    SHA256

    c6c413108539f141bea3f679e0e2ef705898c51ec7c2607f478a865fc5e2e2df

    SHA512

    18c3c92be81aadfa73884fe3bdf1fce96ccfbd35057600ef52788a871de293b64f677351ba2885c6e9ce5c3890c22471c92832ffc13ba544e9d0b347c5d33bfd

  • \Users\Admin\AppData\Local\Temp\nsy24B1.tmp\WebBrowser.dll

    Filesize

    103KB

    MD5

    b53cd4ad8562a11f3f7c7890a09df27a

    SHA1

    db66b94670d47c7ee436c2a5481110ed4f013a48

    SHA256

    281a0dc8b4f644334c2283897963b20df88fa9fd32acca98ed2856b23318e6ec

    SHA512

    bb45d93ed13df24a2056040c219cdf36ee44c8cddb7e178fdaabcec63ac965e07f679ca1fa42591bba571992af619aa1dc76e819a7901709df79598a2b0cef81

  • memory/2616-28-0x0000000000740000-0x0000000000741000-memory.dmp

    Filesize

    4KB

  • memory/2616-197-0x0000000000740000-0x0000000000741000-memory.dmp

    Filesize

    4KB