Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09/03/2024, 23:22

General

  • Target

    bd1376f0f71183a2ec7857648b5dec23.exe

  • Size

    250KB

  • MD5

    bd1376f0f71183a2ec7857648b5dec23

  • SHA1

    f62b12b79d64bcb85ce87a8db84c022665e78e9b

  • SHA256

    34df74d3cdf24356dc52d69679447dd696d44f99be7758316b77bd5b2b14c9cb

  • SHA512

    41b251e225214187569d94609d0937aff747fcc5ac4f0564e341ea690296d09033c6fa1ef1ded2ea4d14404543d29ea99608855bc5792c0b75364bfe13a5b200

  • SSDEEP

    6144:h1OgDPdkBAFZWjadD4s5SF0WD7um9Ph8PN48wY6KMKj:h1OgLdaOGJnGC5Kj

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 4 IoCs
  • Modifies registry class 45 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd1376f0f71183a2ec7857648b5dec23.exe
    "C:\Users\Admin\AppData\Local\Temp\bd1376f0f71183a2ec7857648b5dec23.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2096
    • C:\Users\Admin\AppData\Local\Temp\7zS1842.tmp\50efcc078dc58.exe
      .\50efcc078dc58.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops Chrome extension
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      • System policy modification
      PID:2596

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\SaveSale\uninstall.exe

    Filesize

    48KB

    MD5

    f3c79bda3fdf7c5dd24d60400a57cadb

    SHA1

    1adb606aaeedb246a371c8877c737f0f8c798625

    SHA256

    a76272ed3bbf23308782a308d428ee805ec77fbb622a830af26cb0ddbbf7377b

    SHA512

    c43cb957bdea357bd016fe03a8004a48d8117a12106f62876394feba05ad01a321ff6017ffb7b926cc77712f5ab63ea2e4b169a419c444c8f62aa4933f289935

  • C:\Users\Admin\AppData\Local\Temp\7zS1842.tmp\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    46d0b9e84631120ce591065bcce7a49f

    SHA1

    292180b82743bbe52e09c8ef81b64e7e2648c4bd

    SHA256

    4a3460f790a832827fcf3ad50f35f02842a0214d60dd27d48ed54b760924cf45

    SHA512

    0a71b94bf029af76a16c27c7529ee2681e1119e37276221edcf73e38a1c4db6745927a7a5390097e92b82036c4886a5cee44e4dc404ee3a949178b70481da350

  • C:\Users\Admin\AppData\Local\Temp\7zS1842.tmp\[email protected]\chrome.manifest

    Filesize

    116B

    MD5

    c17989381dffb7b154be828389bde85c

    SHA1

    e48bf039cb37800c16e448a70445ad5ea43d6022

    SHA256

    4cbeeab6fa81ef82543a026bda67a4526ca0f53fd47543cf7ce4527e260ae35f

    SHA512

    934b515c84db5315526b6dd057299472a7450f5fab2c5b466ffd77e103ff690f5d5b628b92131f52d8db43261c1ca12e3ce075a0ce9dc80bb17b83fd04dd7cf9

  • C:\Users\Admin\AppData\Local\Temp\7zS1842.tmp\[email protected]\content\bg.js

    Filesize

    8KB

    MD5

    c6e2064023f1011adba8fae53dc14b63

    SHA1

    828145f9e3f823c85321f6e1fdedd4053e329105

    SHA256

    bc19c2ec9fbb467d62cc2c938ea26111897d8d191432c9c912b10aac99c95c80

    SHA512

    f109ebc12fabff225e864ea0f36ed900d15fa3612653eca6039bb6bd86311121f6e6066bce166cc7ba48dbd46aee9394d74e23b8835ec5e83da95cfcacb2c930

  • C:\Users\Admin\AppData\Local\Temp\7zS1842.tmp\[email protected]\content\zy.xul

    Filesize

    225B

    MD5

    2d4b5d3540da7aa760b9249527f30086

    SHA1

    ab5894800eed5059b5b9e69da2cfa0208877970b

    SHA256

    61916f36318e5555194b787ee24c4c447922207f1fb7d508cff79f25252d5eb4

    SHA512

    d42c8e2123722356b08c2839ba76593df08074cc2b2a02929c8e32db3ac67023f912b9587212462ad2acceb3dc0bdc4036695940cd7831f3e98e27fc704783ac

  • C:\Users\Admin\AppData\Local\Temp\7zS1842.tmp\[email protected]\install.rdf

    Filesize

    705B

    MD5

    a46a63bef735843a5d2549f47e47e34e

    SHA1

    6e6f897148b899c6419fdecaf5f9762fcd15f6d0

    SHA256

    1d493db937ffa1ff1b84c681577884d78821813865bc1014f35a75a1151ccf3f

    SHA512

    c2179e46258aae5011db1f94e74e691e89160bee8c26fbc14d58438a7f6708d0b9162db22c569a2d323d7d34daa60e46a66258d40bc6f9fa677f039b2c232bdc

  • C:\Users\Admin\AppData\Local\Temp\7zS1842.tmp\50efcc078dc58.exe

    Filesize

    71KB

    MD5

    b78633fae8aaf5f7e99e9c736f44f9c5

    SHA1

    26fc60e29c459891ac0909470ac6c61a1eca1544

    SHA256

    d205693516dbaf34cfbd216e825190de4de1412e861bc9cb30ce863907b30d22

    SHA512

    3885b609269b26918ccfcd9069181168c12f4271b6bdfcc51afe176b2dd242d4c0953ac1a4ddaf25abcfaf28a0b694a6269d96ae39bb7b2db2f0140d2d60cd43

  • C:\Users\Admin\AppData\Local\Temp\7zS1842.tmp\50efcc078dc91.dll

    Filesize

    116KB

    MD5

    da161da8bcb9b8032908cc303602f2ee

    SHA1

    8a2d5e5b32376a40f33d6c9881001425ec025205

    SHA256

    0648d564b30e13a0819f28e00a9af39a6686a4d29ccd265c7d81548e4fe0f67e

    SHA512

    39e882a371dbce2484324811bffdd7ae7655b57401d07bf264aced6b5dac0ae326bd1945c536f05d8ab3b92ca03ff056c5a7baf54f7eb477b45fc405ec54052c

  • C:\Users\Admin\AppData\Local\Temp\7zS1842.tmp\50efcc078dc91.tlb

    Filesize

    2KB

    MD5

    1f14de44d0d63a79f91d3fe90badb5fc

    SHA1

    7fcc921608d2cf40e81cdd9a98e1a15a6ba1f57e

    SHA256

    bd3d85c0136a66b2af79d4d91c1c5700c8931937b7e554d5ece946760ef4a99c

    SHA512

    86eb6ebf9eccf1dcb601db827797ac603c0ebe01b6d73318986275c29bd034c8df5f7c79ddf0b19536faf24bdb11e09ac95ea43e8fe75b0ed3dde76dd139883c

  • C:\Users\Admin\AppData\Local\Temp\7zS1842.tmp\nfcnfiomfbjihfelganhjfbnebophkeg\50efcc078da8b1.31546656.js

    Filesize

    4KB

    MD5

    0242afaf378af1afa2210addf9b4cd1c

    SHA1

    0876dc752dcd2c39fe88b01957bf5a73e6569d0d

    SHA256

    a13df0bab21e8b0ef1e918bd8da69187257152c64f9f94af600a20532003b660

    SHA512

    532ede643720792fb901c390cc81e52a458c18e4f74961c44de28ad9ce047fb72c9fb767bab98fd530fa6709517bfc822c4dcfdfe4a7f2f26e8a9a97699fd118

  • C:\Users\Admin\AppData\Local\Temp\7zS1842.tmp\nfcnfiomfbjihfelganhjfbnebophkeg\background.html

    Filesize

    161B

    MD5

    78625e611e8eaeda9d3ed0bb5ef3eed4

    SHA1

    9f8b37587ca0e26e99e6d5c9b49b21dc9ff0346a

    SHA256

    7bcfac7943b64294e75c46f73f9e5080d9da84eccb429b205ea7f21052c206ab

    SHA512

    827ad19404686d72c5f5d278396c0e3c66f2200f2bd151a521f24aad9f7ca90cb6b3672f72a472f1a95957ff815cce3412cd00c93e9ee5fa173944137d38dacb

  • C:\Users\Admin\AppData\Local\Temp\7zS1842.tmp\nfcnfiomfbjihfelganhjfbnebophkeg\content.js

    Filesize

    197B

    MD5

    5f9891607f65f433b0690bae7088b2c1

    SHA1

    b4edb7579dca34dcd00bca5d2c13cbc5c8fac0de

    SHA256

    fb01e87250ac9985ed08d97f2f99937a52998ea9faebdc88e4071d6517e1ea6b

    SHA512

    76018b39e4b62ff9ea92709d12b0255f33e8402dfc649ed403382eebc22fb37c347c403534a7792e6b5de0ed0a5d97a09b69f0ffc39031cb0d4c7d79e9440c7c

  • C:\Users\Admin\AppData\Local\Temp\7zS1842.tmp\nfcnfiomfbjihfelganhjfbnebophkeg\lsdb.js

    Filesize

    559B

    MD5

    209b7ae0b6d8c3f9687c979d03b08089

    SHA1

    6449f8bff917115eef4e7488fae61942a869200f

    SHA256

    e3cf0049af8b9f6cb4f0223ccb8438f4b0c75863684c944450015868a0c45704

    SHA512

    1b38d5509283ef25de550b43ef2535dee1a13eff12ad5093f513165a47eec631bcc993242e2ce640f36c61974431ae2555bd6e2a97aba91eb689b7cd4bf25a25

  • C:\Users\Admin\AppData\Local\Temp\7zS1842.tmp\nfcnfiomfbjihfelganhjfbnebophkeg\manifest.json

    Filesize

    475B

    MD5

    f91cd42bdfe41bcc97d2eb37eafd8bd2

    SHA1

    c0dd02c8f7959b84bf6583d62ecd308651c37b6d

    SHA256

    6805fc1de5ccc99d653689693aeb3a390116b024eedc26b0ca00a7296ec422a5

    SHA512

    8a043a54c40787174c0f167c0083899757803b06100189a9a485d86ebadfa791b83af0e8a502fd34c2b8b20ad9b4c82cf1c302234db69006cf089e0b7179ab2f

  • C:\Users\Admin\AppData\Local\Temp\7zS1842.tmp\nfcnfiomfbjihfelganhjfbnebophkeg\sqlite.js

    Filesize

    1KB

    MD5

    1b5c98b5315821ec7197d77b816b63c2

    SHA1

    2364c6219902ee42a3e04caa3690f629e1e4127f

    SHA256

    0258ea7e776f67392e235b51ca1c7c4ff0f1488cf2e5aac3fb637fb1c3a28c77

    SHA512

    e95dacc84d8a5a1a998c51957f022e464a5e870f47fb932dfe5f24762fccf29a77aec950c0a3b36ba3a6fc26da098ec4ba5bdb4d3d74ad421d7e45f4b78e5e0d

  • C:\Users\Admin\AppData\Local\Temp\7zS1842.tmp\settings.ini

    Filesize

    6KB

    MD5

    b2c57c5196b20185860edb6a44ec08d0

    SHA1

    bad0c9cb59deef9000045d8a9c183381c4bddeae

    SHA256

    4dfecea58b7149ff35bffb618bfe425acb439bc08a2b2d904c3ede2574092333

    SHA512

    ea73c6958a5620da0eb57eb7a1c79f60ff3cac36a32c0aa915d9a984d726c7f8ba588f1ad64647222e9e72ae35eff587024aad1eec0bb00c8a42be07508eafdc

  • \Users\Admin\AppData\Local\Temp\nst18B0.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    7579ade7ae1747a31960a228ce02e666

    SHA1

    8ec8571a296737e819dcf86353a43fcf8ec63351

    SHA256

    564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5

    SHA512

    a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b

  • \Users\Admin\AppData\Local\Temp\nst18B0.tmp\nsJSON.dll

    Filesize

    7KB

    MD5

    b9cd1b0fd3af89892348e5cc3108dce7

    SHA1

    f7bc59bf631303facfc970c0da67a73568e1dca6

    SHA256

    49b173504eb9cd07e42a3c4deb84c2cd3f3b49c7fb0858aee43ddfc64660e384

    SHA512

    fdcbdd21b831a92ca686aab5b240f073a89a08588e42439564747cad9160d79cfa8e3c103b6b4f2917684c1a591880203b4303418b85bc040f9f00b6658b0c90

  • memory/2596-80-0x00000000749C0000-0x00000000749CA000-memory.dmp

    Filesize

    40KB