Analysis

  • max time kernel
    138s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    18-03-2024 14:54

General

  • Target

    d3ca12696888bf83808e98cca7c6b961.exe

  • Size

    1.4MB

  • MD5

    d3ca12696888bf83808e98cca7c6b961

  • SHA1

    36db77944f96021d25aa36bf1a132600832c888a

  • SHA256

    126fadf7c7ae9ed8762af791340fbbfbc2ab1dfd67c9a4abde14fdedac28f7ee

  • SHA512

    a28261e247b6b35c798c6e07d9cedc52dedbe02fca94668590d73b1ea6cff6a0a37da78db4208acc47fb78077c911a4a180b647b1e622693a18677e38aa9b9cf

  • SSDEEP

    24576:41+1V88Rzc2WNnwTBUHt8dal48nW4I5PRC/Rodslrvci09cK5:v8SzaN8dalM4OwpnlrEiY5

Malware Config

Signatures

  • Loads dropped DLL 22 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 50 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d3ca12696888bf83808e98cca7c6b961.exe
    "C:\Users\Admin\AppData\Local\Temp\d3ca12696888bf83808e98cca7c6b961.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1632
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32 /s "C:\Program Files (x86)\SafeMonitor\IE\common.dll"
      2⤵
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      PID:1888

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\SafeMonitor\IE\common.dll

    Filesize

    383KB

    MD5

    ec029eae2a58bce111747a9e31731f37

    SHA1

    4b4e73e51d09411fb9b84b1ac0afbaf0fe531c38

    SHA256

    62790a9b1ec03175dbd8bc43d3727cd234d29459ffe5909e41b554b126ba9b0f

    SHA512

    cce5602d8b7148811829e0f01906e415ee6bcdc34ef67bba78406a246bf17521f12bbd6287fbcdd1fab916e29046f76a01f7b84d8b9bcc28cc820526ce89d618

  • C:\Users\Admin\AppData\Local\Temp\nso5F8F.tmp\KillProcWMI.dll

    Filesize

    65KB

    MD5

    61fd777443084ed61c05c22e8e3c3eff

    SHA1

    607944fdcfad205a164f3ca84793ab13d3d4ba97

    SHA256

    a69a51de19784287ee9031322cda5104a6025d7cdf1ffd0e897fdd8ce4e8df4b

    SHA512

    ce12cc55088a2176bfc5de8b65b92db8def8e930ddffe3961bb855b9536a25632cd921903f616c885699fb2d00f5074d03a213e25a759ac0aa4ecdfc33878323

  • \Users\Admin\AppData\Local\Temp\nso5F8F.tmp\Processes.dll

    Filesize

    35KB

    MD5

    2cfba79d485cf441c646dd40d82490fc

    SHA1

    83e51ac1115a50986ed456bd18729653018b9619

    SHA256

    86b302fa9c85dfa0c1c03ba000864a928365dab571f3355347dba02da22949b7

    SHA512

    cca186a7f9c5cff3f4eca410fbe8cc13dad2514a7e36aec9b1addfbcb239ace9b9b2d8427771858e3fd11783abce7e24d43c286f98da9f8b17562ca095a4c043

  • \Users\Admin\AppData\Local\Temp\nso5F8F.tmp\System.dll

    Filesize

    11KB

    MD5

    00a0194c20ee912257df53bfe258ee4a

    SHA1

    d7b4e319bc5119024690dc8230b9cc919b1b86b2

    SHA256

    dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3

    SHA512

    3b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667

  • \Users\Admin\AppData\Local\Temp\nso5F8F.tmp\inetc.dll

    Filesize

    20KB

    MD5

    3a3a9223dd834d9898fdd8bf260bc373

    SHA1

    ec7ba0f20486cfb16bed7a2f8e62c228cb9f5e93

    SHA256

    e36cdce05b8858cf6841db19f5618f9335aa67a9a59ffe8ec2be0fe83b5bb8cb

    SHA512

    c8a4e07da6fe203f79f5c4314a6f5aa21b1a6648848bfa009a87b9af1d6c09ccf9c01ed3813442e57f7fa221ca088dbca236ea1bf80d033574c9670883d3611c

  • \Users\Admin\AppData\Local\Temp\nso5F8F.tmp\nsDialogs.dll

    Filesize

    9KB

    MD5

    ab73c0c2a23f913eabdc4cb24b75cbad

    SHA1

    6569d2863d54c88dcf57c843fc310f6d9571a41e

    SHA256

    3d0060c5c9400a487dbefe4ac132dd96b07d3a4ba3badab46a7410a667c93457

    SHA512

    99d287b5152944f64edc7ce8f3ebcd294699e54a5b42ac7a88e27dff8a68278a5429f4d299802ee7ddbe290f1e3b6a372a5f3bb4ecb1a3c32e384bca3ccdb2b8

  • \Users\Admin\AppData\Local\Temp\nso5F8F.tmp\util_ex.dll

    Filesize

    767KB

    MD5

    4c429c2cadf1e454cc7d3b1fd75b7245

    SHA1

    dc4bc6c1472146d4952cd3abc42f15084fed58bf

    SHA256

    00c7fdabdc3360e1adf46da408b4312a805e1013f189bf7b5965a94ae201d719

    SHA512

    8750813681ecc8e6180d053630a6c53b0db397b0ed369c18363e4899bd08d065999a30e2297eedd048b65fbea6ba4c2c3a50911f88289285cbd54aa30c9aac40

  • memory/1632-39-0x0000000001D30000-0x0000000001D3D000-memory.dmp

    Filesize

    52KB

  • memory/1632-45-0x0000000003A60000-0x0000000003A75000-memory.dmp

    Filesize

    84KB