Analysis

  • max time kernel
    118s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    04/02/2024, 20:08

General

  • Target

    $LOCALAPPDATA/funmoods.exe

  • Size

    1.6MB

  • MD5

    badf0b8e9bc8d7352fb084951255ee4f

  • SHA1

    e584634b5565fd81d7258fca86c632c9d3e1cd14

  • SHA256

    73db5f6b89963d6692e3c43c8f3e5265ec4512ce87fe652e9ec3a4a0bb036db8

  • SHA512

    3b704e3b0d440f1e580cc277c3c68223139f35156b00250ebf9a231f03d5f74bd19bbf948061e7b8be13b9c08aca9f30a0929cfce5a9d5cc3558cd187a05d53e

  • SSDEEP

    24576:VtxBMupYpmZICsiWuu0uFYBimEuDYYmTj67rRXFO6BbwZTdNFtr6Ps7QOWxQ6NVN:p6HmZICsfujIvGmTW7rRQakZpt+xQON

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 6 IoCs
  • Modifies Internet Explorer settings 1 TTPs 6 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$LOCALAPPDATA\funmoods.exe
    "C:\Users\Admin\AppData\Local\Temp\$LOCALAPPDATA\funmoods.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3044
    • C:\Users\Admin\AppData\Local\Temp\FNMD\FM\1.5.11.16\FM4ie.exe
      "C:\Users\Admin\AppData\Local\Temp\FNMD\FM\1.5.11.16\FM4ie.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Drops file in Program Files directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1968
      • C:\Program Files (x86)\Funmoods\funmoods\1.5.11.16\funmoodssrv.exe
        "C:\Program Files (x86)\Funmoods\funmoods\1.5.11.16\funmoodssrv.exe" /RegServer
        3⤵
        • Executes dropped EXE
        • Modifies registry class
        PID:2428
    • C:\Users\Admin\AppData\Local\Temp\FNMD\FM\1.5.11.16\FM4ffx.exe
      C:\Users\Admin\AppData\Local\Temp\FNMD\FM\1.5.11.16\FM4ffx.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:1720

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Funmoods\funmoods\1.5.11.16\uninstall.exe

          Filesize

          130KB

          MD5

          673e6109fbc2405238429562ae058f37

          SHA1

          293a96724fc0e772706f108895db321b58051524

          SHA256

          4dae85611b9fd18f44c36f330762ca7dae3842604999d6a5edd3d416b4ab0841

          SHA512

          0d1db02c84d2a7502af966886889a63467fdc310c25076cd1629064f9dc5bda63248ea2cb34757f9e93e341cd89833979c8bdfffab2d09c722c3a20cd244f4c0

        • C:\Users\Admin\AppData\Local\Temp\FNMD\FM\1.5.11.16\FM4ffx.exe

          Filesize

          319KB

          MD5

          fe768a6b82ed2a59c58254eae67b8cf9

          SHA1

          3dad9bf5011fb73b9be2fe6c601bb6281a3ceaf6

          SHA256

          3ac3c700060a0487060724f3fd22faf70d5f633e69401641964d7ba4d6e6e570

          SHA512

          3d8caadc61ea127bd0e3d01f35274a2ebfa34a0ac12b0932988300d011347f74a09c2bf3c85e58bfbe5200288c6e6f100b4f08916d23e56d7b52a70130aad14b

        • C:\Users\Admin\AppData\Local\Temp\FNMD\FM\1.5.11.16\nsd9D33.tmp

          Filesize

          825B

          MD5

          14a1b9d98baa44194f60f2b1b2a97c01

          SHA1

          a1a10f492b7fadc4e1bc3edf5ffa9394d63d07d7

          SHA256

          39fc0de7a02a9e8b47607141e6efb5757ae8febb34b362c93f9cb545031f9a69

          SHA512

          05d8d1c93406e8b94f035dcc10d02055be764da2fa477fb25e23d6cd62f261c4e6fb213129f05e3d8e7b77acffb4db5051694dddecaabed2db72d490fea18699

        • C:\Users\Admin\AppData\Local\Temp\FNMD\FM\1.5.11.16\nsdA0EC.tmp

          Filesize

          731B

          MD5

          035a53f846402e01b53491829de43fe1

          SHA1

          a1056866e59777b954acdf4c30b7640211809141

          SHA256

          990f571b6dcd33941c95b5d9d47d0385f028f8c5e75c20e9cc085e25aed33b9f

          SHA512

          a95aa9ea5f7affc36338cae31cd9195ac421744adc011d341eb8a3c6a29474e3450ffdbb12af7513132eee5f990a3140870ccde47e682a59a165c0d1e656cd3f

        • C:\Users\Admin\AppData\Local\Temp\FNMD\FM\1.5.11.16\nsjA0BD.tmp

          Filesize

          679B

          MD5

          1cb47dbe7c8f97a07c7d370dc8680138

          SHA1

          456bcbf3c9c26cf80cb55e4a5380de6eb79115d6

          SHA256

          970d3162f6c3762100bf16f2ab3544b3ac8f27049c7ef01b26aff1bd0d1a708a

          SHA512

          aadfbb074e6a5afc7e2f55d34bfcd30c699ab5401e03e24dda03d3606a50fa9e819657c0d869e7e7ec97f229ae33206a8354586771a0cf37fe1a93e0c3546245

        • C:\Users\Admin\AppData\Local\Temp\FNMD\FM\1.5.11.16\nso9DC1.tmp

          Filesize

          876B

          MD5

          42699c520396bf135ce46ff24785a472

          SHA1

          787352fd479d37c0d409eeedcecf2611b03fb58f

          SHA256

          7190175daf417f5f519443feedb6d7f6f4a6f9d52e205e2f9e51fd7fa3ac7113

          SHA512

          336389ab2349b257e1400e253f4dab36c31662a26ac1dff136916593f999b7c21a29a32a40dff051cea012235eeda605f677231775371c89eb83f9037bb09492

        • C:\Users\Admin\AppData\Local\Temp\FNMD\FM\1.5.11.16\nso9F4B.tmp

          Filesize

          1KB

          MD5

          432ffa64b519add5cebf722958be62c9

          SHA1

          655909cd7fdeeb81efb51de2e0e613da9eae83a2

          SHA256

          4ef8097e7215c3144b1d9eb2e9fda27c6f53c304c43a2bda59f956cbe8241365

          SHA512

          b6382f24f335c27205d5981b06fa67c4d951aba061d1e6b98f527888521cb0b5e0a0291395231fec177224c5af6d6d249c75dccbe8cdda90b835ca30fafaa84e

        • C:\Users\Admin\AppData\Local\Temp\FNMD\FM\1.5.11.16\nsoA12C.tmp

          Filesize

          781B

          MD5

          0e725fabd8d0e1de18a6c1d265ed3cdb

          SHA1

          28c28efc55f3212ad39f2c237cb4b0fe2bb2a2ad

          SHA256

          95193bd46a3d376f71e0b746180a16f45b674cec4522e72940a4a3bf822425f4

          SHA512

          d64d73af852f5d372d004dfb5bc57a5c0157c66d4c19b4e063e3cdbee67e203adfef366d1d6158b05f852d669077f3c92d63cc9b0650cacbbda7c70878e21ab6

        • C:\Users\Admin\AppData\Local\Temp\FNMD\FM\1.5.11.16\nstA00D.tmp

          Filesize

          463B

          MD5

          c445c75772101e88c912c42d77f39510

          SHA1

          c71b1b06f984904fe0560480635098185073e4b0

          SHA256

          acea6055aae0ce476b97e2668fc90df179fb95cd869af7855236497bce7dc06f

          SHA512

          e493aaeb911acfd780277c5dca0a1ea11d256ee56f0d77d432f043b9dd524fe50bda856a4044090e4c8263ae8d9df6fdbdc0d8d8966ce16f494f89357ad8e18c

        • C:\Users\Admin\AppData\Local\Temp\FNMD\FM\1.5.11.16\nstA19A.tmp

          Filesize

          830B

          MD5

          73c591734b6b94b95e732a462c5d9cfb

          SHA1

          a9880f728b4613dbe443ad8e02d266e309a8f5c4

          SHA256

          e2bc63b9b507b1f2cbdecdaf33039bfce5604ecdf27f39a2a1a13936687527a6

          SHA512

          535a2d86fa6f89ba418321bb9912bd5edebac29d80b28c51a21ffbd893068a7904c8ec740fd23c5b079d6fb207e2ac93b44b687f27520b508be82acb0f895c11

        • C:\Users\Admin\AppData\Local\Temp\nso94E1.tmp\NSISdl.dll

          Filesize

          14KB

          MD5

          a5f8399a743ab7f9c88c645c35b1ebb5

          SHA1

          168f3c158913b0367bf79fa413357fbe97018191

          SHA256

          dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9

          SHA512

          824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977

        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\kzcnpuah.Admin\user.js

          Filesize

          301B

          MD5

          2bbed7c9521174d68eb82751901184d3

          SHA1

          5adc5a58175f2cf899695e3c162b31f1dfa04524

          SHA256

          0eebe6ecb1c7f74a5175dd6aef7ea4a605741a54104f26b08f29ed0b763ae7db

          SHA512

          0feec3cc87c72b66b5dd53ee42e812b4a392ce7a26c47d31a06554e777271c7075bb4870a1435fde647a4fa7c1418d1eef8f7bbaf2d133fb43a2b7a7631bf471

        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\kzcnpuah.Admin\user.js

          Filesize

          537B

          MD5

          932c6f52cea9c3e199ea1751f6cbc37d

          SHA1

          71444fcc1f4afb3e5fa5b8e9f68ddeef82e01447

          SHA256

          3fda0ddaf979b3de6563ba9a38f8f4afaa9bce920ac609a4af2db35349d1b629

          SHA512

          8a7566c383d004e97ff88603e8afcd0eee2f1d3dadbaf37a68ed58ad150133df37b2a9c9c7898aad024ad2cc87ea1b0d75d747747f064887c78f400ef560e387

        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\kzcnpuah.Admin\user.js

          Filesize

          713B

          MD5

          d1f4c32ccc6c644b5f490c03103c3efa

          SHA1

          14638126e768c3da80babb0541e0abaa49bc9b78

          SHA256

          c5461dd1d139709cf13e8ac07508f8691361dbf33bc868b037aea22d6be070f1

          SHA512

          0335f21d4444761525ea19e6650fc69c07c1430e7b1c76b389b5afafd587bff9f086072f57b20b25758565baf6de1661ce06a15d80e623be670f8c7dd88aeae1

        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\kzcnpuah.Admin\user.js

          Filesize

          1KB

          MD5

          219653f2147ad3f1c8b32a84675474c7

          SHA1

          c7615a673d266b472a32beb198838cfbb95ef2b4

          SHA256

          74636a83b50812b1167917c4c1d7853fe0453c2111bc44cb950cf86fa7700868

          SHA512

          6ea50449e8ef1cb1f82f7ea25f870332aeb29fb272a015e3b319ceee64724117be20ea80dd3116ce2652fa200970e9aed3c6f9b23a80646c3057458e373a8d43

        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\kzcnpuah.default-release\user.js

          Filesize

          520B

          MD5

          1e0e1714641ec776e8399fe47f9926a8

          SHA1

          f100b3147f3115920447cca8c00305b5c502baba

          SHA256

          37008bee4f413c3711fce51a31e7dcff05bca6467d89497dee68c1f3250e7e75

          SHA512

          16b1b1710397f528c0de315f9e69cf69705b558508ed242d26640a68ebe933b567a6aa6758c1985193ca9dfdd5fd52b9fa6a0d824b89e1988ddf4ef68290d95e

        • \Users\Admin\AppData\Local\Temp\FNMD\FM\1.5.11.16\FM4ie.exe

          Filesize

          1.1MB

          MD5

          ddcada8c66d56df6e4ef2bbedf2bb865

          SHA1

          059a7f8bb8ed2e99d5153d26ecf986e91c24df19

          SHA256

          abcde03656f4c6f51d4d4c788ece555581b8c7b52bfe1c18ef70678cb3a2e872

          SHA512

          63a3ca5d733cef71cc4ff61d6b5b3dd74613d57bac2b5d41efffbbf64ab6031bde66c0cd7058bf50c047e64e4ee0ef87dff3c7864a18c118521f5711ab69cc91

        • \Users\Admin\AppData\Local\Temp\nso94E1.tmp\ExtractDLLEx.dll

          Filesize

          7KB

          MD5

          ba4063f437abb349aa9120e9c320c467

          SHA1

          b045d785f6041e25d6be031ae2af4d4504e87b12

          SHA256

          73acba7dd477dfd6cf4249911f4e3c781196c7cf6b28425761dcb2d4f90c36c5

          SHA512

          48a813f55834069f8c6b90740de3df01564a136b0fe637f9f85cc1a19d7f32b1f70205ff2462526508fe3c1962d7c1e8e384c40463e328538aeba28e8d0fb92a

        • \Users\Admin\AppData\Local\Temp\nso94E1.tmp\InetLoad.dll

          Filesize

          18KB

          MD5

          994669c5737b25c26642c94180e92fa2

          SHA1

          d8a1836914a446b0e06881ce1be8631554adafde

          SHA256

          bf01a1f272e0daf82df3407690b646e0ff6b2c562e36e47cf177eda71ccb6f6c

          SHA512

          d0ab7ca7f890ef9e59015c33e6b400a0a4d1ce0d24599537e09e845f4b953e3ecd44bf3e3cbe584f57c2948743e689ed67d2d40e6caf923bd630886e89c38563

        • \Users\Admin\AppData\Local\Temp\nso94E1.tmp\Processes.dll

          Filesize

          56KB

          MD5

          cc0bd4f5a79107633084471dbd4af796

          SHA1

          09dfcf182b1493161dec8044a5234c35ee24c43a

          SHA256

          3b5388e13dab53d53e08791f492ed7d3094a0cee51e9841af83ce02534e0621c

          SHA512

          67ba90ec04366e07d0922ffb4dbbb4f12f90b6785b87700adaae29327db9ec2a03d750b229f858db0594f439499d6346fbf1ebc17c77162bf8da027515219ee3

        • \Users\Admin\AppData\Local\Temp\nso94E1.tmp\System.dll

          Filesize

          11KB

          MD5

          c17103ae9072a06da581dec998343fc1

          SHA1

          b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

          SHA256

          dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

          SHA512

          d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

        • \Users\Admin\AppData\Local\Temp\nso94E1.tmp\Time.dll

          Filesize

          10KB

          MD5

          38977533750fe69979b2c2ac801f96e6

          SHA1

          74643c30cda909e649722ed0c7f267903558e92a

          SHA256

          b4a95a455e53372c59f91bc1b5fb9e5c8e4a10a506fa04aaf7be27048b30ae35

          SHA512

          e17069395ad4a17e24f7cd3c532670d40244bd5ae3887c82e3b2e4a68c250cd55e2d8b329d6ff0e2d758955ab7470534e6307779e49fe331c1fd2242ea73fd53

        • \Users\Admin\AppData\Local\Temp\nso94E1.tmp\UserInfo.dll

          Filesize

          4KB

          MD5

          7579ade7ae1747a31960a228ce02e666

          SHA1

          8ec8571a296737e819dcf86353a43fcf8ec63351

          SHA256

          564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5

          SHA512

          a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b

        • \Users\Admin\AppData\Local\Temp\nso94E1.tmp\chrmPref.dll

          Filesize

          194KB

          MD5

          6845d147b88de1f005d9c6ebb6596574

          SHA1

          64523302e2b1e2ee7a31580d2acac852db3c7e45

          SHA256

          c9ccc486c3353bad0d2819a42203c0db7ba98b4826b6a2b8d4deee832e4d3d8e

          SHA512

          cd4caa6669b5f90ead60579a2e5b01a9cd2d17fd2919651cecda6327acb32e2eb3b9953412c085d50dee89779d2f60df658236fb4c3cc54bed4ae66929590606

        • \Users\Admin\AppData\Local\Temp\nso94E1.tmp\mt.dll

          Filesize

          5KB

          MD5

          aac69f856c4540edd4ef7ce6c8571639

          SHA1

          2860f55ea9774d631219e66604051e90a43258b7

          SHA256

          6dc2644a389feeef9e0ac65e2c8b01fc18ca6e53b253f10efffcb117e0a852dd

          SHA512

          ebacc8117c44d298ae519705510285c576932761b3c7b697eeb91cb7620150ebe551102d1ab83d68f4c78e1496b191a55ad8f78c491f5b4af456c4de6ad72dcd

        • \Users\Admin\AppData\Local\Temp\nso94E1.tmp\nsisos.dll

          Filesize

          5KB

          MD5

          69806691d649ef1c8703fd9e29231d44

          SHA1

          e2193fcf5b4863605eec2a5eb17bf84c7ac00166

          SHA256

          ba79ab7f63f02ed5d5d46b82b11d97dac5b7ef7e9b9a4df926b43ceac18483b6

          SHA512

          5e5e0319e701d15134a01cb6472c624e271e99891058aef4dfe779c29c73899771a5b6f8b1cd61b543a3b3defeaecaa080c9cc4e76e84038ca08e12084f128eb

        • memory/3044-79-0x0000000001C40000-0x0000000001C52000-memory.dmp

          Filesize

          72KB

        • memory/3044-1584-0x0000000002380000-0x0000000002392000-memory.dmp

          Filesize

          72KB