Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    15-04-2024 21:34

General

  • Target

    $LOCALAPPDATA/funmoods.exe

  • Size

    1.6MB

  • MD5

    badf0b8e9bc8d7352fb084951255ee4f

  • SHA1

    e584634b5565fd81d7258fca86c632c9d3e1cd14

  • SHA256

    73db5f6b89963d6692e3c43c8f3e5265ec4512ce87fe652e9ec3a4a0bb036db8

  • SHA512

    3b704e3b0d440f1e580cc277c3c68223139f35156b00250ebf9a231f03d5f74bd19bbf948061e7b8be13b9c08aca9f30a0929cfce5a9d5cc3558cd187a05d53e

  • SSDEEP

    24576:VtxBMupYpmZICsiWuu0uFYBimEuDYYmTj67rRXFO6BbwZTdNFtr6Ps7QOWxQ6NVN:p6HmZICsfujIvGmTW7rRQakZpt+xQON

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 6 IoCs
  • Modifies Internet Explorer settings 1 TTPs 6 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$LOCALAPPDATA\funmoods.exe
    "C:\Users\Admin\AppData\Local\Temp\$LOCALAPPDATA\funmoods.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2360
    • C:\Users\Admin\AppData\Local\Temp\FNMD\FM\1.5.11.16\FM4ie.exe
      "C:\Users\Admin\AppData\Local\Temp\FNMD\FM\1.5.11.16\FM4ie.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Drops file in Program Files directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2012
      • C:\Program Files (x86)\Funmoods\funmoods\1.5.11.16\funmoodssrv.exe
        "C:\Program Files (x86)\Funmoods\funmoods\1.5.11.16\funmoodssrv.exe" /RegServer
        3⤵
        • Executes dropped EXE
        • Modifies registry class
        PID:2852
    • C:\Users\Admin\AppData\Local\Temp\FNMD\FM\1.5.11.16\FM4ffx.exe
      C:\Users\Admin\AppData\Local\Temp\FNMD\FM\1.5.11.16\FM4ffx.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2240

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Funmoods\funmoods\1.5.11.16\uninstall.exe

    Filesize

    130KB

    MD5

    673e6109fbc2405238429562ae058f37

    SHA1

    293a96724fc0e772706f108895db321b58051524

    SHA256

    4dae85611b9fd18f44c36f330762ca7dae3842604999d6a5edd3d416b4ab0841

    SHA512

    0d1db02c84d2a7502af966886889a63467fdc310c25076cd1629064f9dc5bda63248ea2cb34757f9e93e341cd89833979c8bdfffab2d09c722c3a20cd244f4c0

  • C:\Users\Admin\AppData\Local\Temp\FNMD\FM\1.5.11.16\nsd1388.tmp

    Filesize

    520B

    MD5

    04293468ac98004c0bb9e3a9fb1db007

    SHA1

    9d5c97b4616c6a660534698ec61e898e91f1e569

    SHA256

    40468fb0232e697296ebe9dfc75de00101b9a4619ea270257ea4692f39d5b171

    SHA512

    dd4c28c3e7570cfaea39a5098b7e4c581ae028a3618c4e8ae003a19731d2ceb8c75e49ffeb23506e3a918ff29cc7e600e5bfa5b6e31f7ce7de010f9e92e54242

  • C:\Users\Admin\AppData\Local\Temp\FNMD\FM\1.5.11.16\nst129D.tmp

    Filesize

    592B

    MD5

    354923d36f002c9914de143a2d6c539f

    SHA1

    618d2faa494dee90a07b32c8bb72a01fffea340a

    SHA256

    0d8f9433e34de699f7d9372ff9c4609c13902b9be379d4a789824d586280c1e2

    SHA512

    127c818fa77fa4f6a215b8efdab50e535ff4be49c1d8ccc15aeb9a140a93d940749ecee596fd1bbca475b0c882d879aa59e24e0c05efdf1ee1a61b3bdd5178ef

  • C:\Users\Admin\AppData\Local\Temp\nsd1066.tmp\NSISdl.dll

    Filesize

    14KB

    MD5

    a5f8399a743ab7f9c88c645c35b1ebb5

    SHA1

    168f3c158913b0367bf79fa413357fbe97018191

    SHA256

    dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9

    SHA512

    824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977

  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xkoyglns.Admin\user.js

    Filesize

    1KB

    MD5

    9acdcb19fb3e32ce7f2fd53e5861ac45

    SHA1

    44ad0d841800f328e87ec825a8fdeadf33980021

    SHA256

    5c53bfd87f699001233cd933b1fdb9defe01458ec102046981ce18035a465809

    SHA512

    b2d2b7f75e04a98de113cc36aac17a66792055a83991c556d63768a17eecbd08ffeeb31484949b29949759e27fcfdd0257f03e13c9bb3a0032b98bb5635763df

  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xkoyglns.Admin\user.js

    Filesize

    648B

    MD5

    231f14fa18a6b14307aee7a5e2f5c8c2

    SHA1

    cc6f74ff6c5d97e815b8296f5520f95272d88fb1

    SHA256

    3f8caefb1436dd3a1e00187e5a83b340274cc42fcc7fe022ee7446e3e8a28378

    SHA512

    33f4c70081d1898c95c15a0d5cc8a415acd243fd49dabf72225abebe2b21f5bcfbab048f1ab512673a9211ad5d13d32d521f5a555e93cbac6312b2329bbe76ee

  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xkoyglns.Admin\user.js

    Filesize

    981B

    MD5

    04d49e734a3c55ea5a097da9eb36dd86

    SHA1

    632ce908555e55159e434d3fd9738c9b509b3b02

    SHA256

    7e20d70cff98fb8c0ed3b96addc609a728d719380c294cbaf719ffd46fe1a447

    SHA512

    3a7f6d2b5149a7d74ea7ae1ce50128f8c793c46be9073fdeb240318f9c3584a32cbce55f079eacc8f192bad5ec099306dbf6b12e8d160fbabdaa603d21d8b7af

  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xkoyglns.default-release\user.js

    Filesize

    463B

    MD5

    3942587cd373efdac08248e8e1df29ba

    SHA1

    e9082ceb47aa190501500b5edff3fbaf7b729669

    SHA256

    e2c6f4c3435a55c01c6ec89e1348ddc3cb0d5a499b31112898e2cea39938a12b

    SHA512

    080808b3556e82b25c0b3ade123ecc7ad517edb5d159c4fc5adc219916de987fe789330061fc65f4051f021bcc635278ce128c1de28e861c154cd2e114dee19d

  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xkoyglns.default-release\user.js

    Filesize

    626B

    MD5

    297fdf34b3687908a238c0f5ffb9ce3c

    SHA1

    6c58f48f1e0280834035b7f49dab410994e2448b

    SHA256

    250b2e04eda851841c0e7de25af78ee899f4286287aa8a5c83dd5e00ecc388c4

    SHA512

    d655986daff068d72401eee55144f86a537d5779b2d287ffda0cd247d75614395b1ebb1407e5b7b1f3629c9091d9943e162cb004e5c8e9afe613582e88f85c5a

  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xkoyglns.default-release\user.js

    Filesize

    882B

    MD5

    3bf9ef102d098618fc9f3de76b6c0065

    SHA1

    0eb97bc988488562412a65256352dee5a9900c5c

    SHA256

    602306aecef074bcfb87a084e74e010df68bcf2f4fc199dd8914be2d95a7fd7a

    SHA512

    a45489226a0f4682be6fad6e3a4b7e839a75afc4c6aecb751ad256f31f707d30cc2f48f2f74eaed610cb1338f2531679bcb2b1bf6f01a28155cc8f32ddb6d87d

  • \Program Files (x86)\Funmoods\funmoods\1.5.11.16\funmoodsTlbr.dll

    Filesize

    245KB

    MD5

    7f8be790b6614f46adeafd59761abbeb

    SHA1

    a1be7d513d40b1a0af1aa1fd73c2c2b6173ac700

    SHA256

    b1fa4dacf9656e31588eebeca1f831c72a33d9affca07ede0d5f5d113ec14aaf

    SHA512

    4d17c74368543092a8e7604208689bc6a5fc5bcc46c60cfb9255622d031a4265adaa13d7c0b5f410ababed802f29cb89c2dd7d7b1adc1af33fbb5f55e4a8a5ca

  • \Users\Admin\AppData\Local\Temp\FNMD\FM\1.5.11.16\FM4ffx.exe

    Filesize

    319KB

    MD5

    fe768a6b82ed2a59c58254eae67b8cf9

    SHA1

    3dad9bf5011fb73b9be2fe6c601bb6281a3ceaf6

    SHA256

    3ac3c700060a0487060724f3fd22faf70d5f633e69401641964d7ba4d6e6e570

    SHA512

    3d8caadc61ea127bd0e3d01f35274a2ebfa34a0ac12b0932988300d011347f74a09c2bf3c85e58bfbe5200288c6e6f100b4f08916d23e56d7b52a70130aad14b

  • \Users\Admin\AppData\Local\Temp\FNMD\FM\1.5.11.16\FM4ie.exe

    Filesize

    1.1MB

    MD5

    ddcada8c66d56df6e4ef2bbedf2bb865

    SHA1

    059a7f8bb8ed2e99d5153d26ecf986e91c24df19

    SHA256

    abcde03656f4c6f51d4d4c788ece555581b8c7b52bfe1c18ef70678cb3a2e872

    SHA512

    63a3ca5d733cef71cc4ff61d6b5b3dd74613d57bac2b5d41efffbbf64ab6031bde66c0cd7058bf50c047e64e4ee0ef87dff3c7864a18c118521f5711ab69cc91

  • \Users\Admin\AppData\Local\Temp\nsd1066.tmp\ExtractDLLEx.dll

    Filesize

    7KB

    MD5

    ba4063f437abb349aa9120e9c320c467

    SHA1

    b045d785f6041e25d6be031ae2af4d4504e87b12

    SHA256

    73acba7dd477dfd6cf4249911f4e3c781196c7cf6b28425761dcb2d4f90c36c5

    SHA512

    48a813f55834069f8c6b90740de3df01564a136b0fe637f9f85cc1a19d7f32b1f70205ff2462526508fe3c1962d7c1e8e384c40463e328538aeba28e8d0fb92a

  • \Users\Admin\AppData\Local\Temp\nsd1066.tmp\InetLoad.dll

    Filesize

    18KB

    MD5

    994669c5737b25c26642c94180e92fa2

    SHA1

    d8a1836914a446b0e06881ce1be8631554adafde

    SHA256

    bf01a1f272e0daf82df3407690b646e0ff6b2c562e36e47cf177eda71ccb6f6c

    SHA512

    d0ab7ca7f890ef9e59015c33e6b400a0a4d1ce0d24599537e09e845f4b953e3ecd44bf3e3cbe584f57c2948743e689ed67d2d40e6caf923bd630886e89c38563

  • \Users\Admin\AppData\Local\Temp\nsd1066.tmp\Processes.dll

    Filesize

    56KB

    MD5

    cc0bd4f5a79107633084471dbd4af796

    SHA1

    09dfcf182b1493161dec8044a5234c35ee24c43a

    SHA256

    3b5388e13dab53d53e08791f492ed7d3094a0cee51e9841af83ce02534e0621c

    SHA512

    67ba90ec04366e07d0922ffb4dbbb4f12f90b6785b87700adaae29327db9ec2a03d750b229f858db0594f439499d6346fbf1ebc17c77162bf8da027515219ee3

  • \Users\Admin\AppData\Local\Temp\nsd1066.tmp\System.dll

    Filesize

    11KB

    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

  • \Users\Admin\AppData\Local\Temp\nsd1066.tmp\Time.dll

    Filesize

    10KB

    MD5

    38977533750fe69979b2c2ac801f96e6

    SHA1

    74643c30cda909e649722ed0c7f267903558e92a

    SHA256

    b4a95a455e53372c59f91bc1b5fb9e5c8e4a10a506fa04aaf7be27048b30ae35

    SHA512

    e17069395ad4a17e24f7cd3c532670d40244bd5ae3887c82e3b2e4a68c250cd55e2d8b329d6ff0e2d758955ab7470534e6307779e49fe331c1fd2242ea73fd53

  • \Users\Admin\AppData\Local\Temp\nsd1066.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    7579ade7ae1747a31960a228ce02e666

    SHA1

    8ec8571a296737e819dcf86353a43fcf8ec63351

    SHA256

    564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5

    SHA512

    a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b

  • \Users\Admin\AppData\Local\Temp\nsd1066.tmp\chrmPref.dll

    Filesize

    194KB

    MD5

    6845d147b88de1f005d9c6ebb6596574

    SHA1

    64523302e2b1e2ee7a31580d2acac852db3c7e45

    SHA256

    c9ccc486c3353bad0d2819a42203c0db7ba98b4826b6a2b8d4deee832e4d3d8e

    SHA512

    cd4caa6669b5f90ead60579a2e5b01a9cd2d17fd2919651cecda6327acb32e2eb3b9953412c085d50dee89779d2f60df658236fb4c3cc54bed4ae66929590606

  • \Users\Admin\AppData\Local\Temp\nsd1066.tmp\mt.dll

    Filesize

    5KB

    MD5

    aac69f856c4540edd4ef7ce6c8571639

    SHA1

    2860f55ea9774d631219e66604051e90a43258b7

    SHA256

    6dc2644a389feeef9e0ac65e2c8b01fc18ca6e53b253f10efffcb117e0a852dd

    SHA512

    ebacc8117c44d298ae519705510285c576932761b3c7b697eeb91cb7620150ebe551102d1ab83d68f4c78e1496b191a55ad8f78c491f5b4af456c4de6ad72dcd

  • \Users\Admin\AppData\Local\Temp\nsd1066.tmp\nsisos.dll

    Filesize

    5KB

    MD5

    69806691d649ef1c8703fd9e29231d44

    SHA1

    e2193fcf5b4863605eec2a5eb17bf84c7ac00166

    SHA256

    ba79ab7f63f02ed5d5d46b82b11d97dac5b7ef7e9b9a4df926b43ceac18483b6

    SHA512

    5e5e0319e701d15134a01cb6472c624e271e99891058aef4dfe779c29c73899771a5b6f8b1cd61b543a3b3defeaecaa080c9cc4e76e84038ca08e12084f128eb

  • memory/2360-1584-0x0000000002350000-0x0000000002362000-memory.dmp

    Filesize

    72KB

  • memory/2360-79-0x0000000001C50000-0x0000000001C62000-memory.dmp

    Filesize

    72KB