Analysis

  • max time kernel
    92s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/05/2024, 01:33

General

  • Target

    ChromeHistory.exe

  • Size

    233KB

  • MD5

    5ae56682a3ad6210a76469e9d074abaf

  • SHA1

    8cc2bcd404a1e6785f2080bda906bc5d4f7bc399

  • SHA256

    02ea208909d0fbb5767f1cde4872cf5deee52d550fa1b459f5e0ccce6c2a4ce7

  • SHA512

    1aa84c9ccb55215c08e51cfbc2803a6592d71e294bf735b801004b357530abc617acab60ce1384b21c6033a0e59f18ee8a4a9c35951eb820df84bd11036ac475

  • SSDEEP

    6144:jbLYUUWhnyl8xBPHhPhEholbw4LM/bXbgXRZ:jb9/hyl8/RaqlbnLM/brAZ

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 2 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ChromeHistory.exe
    "C:\Users\Admin\AppData\Local\Temp\ChromeHistory.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1904
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe REGSVR32.EXE C:\Windows\system32\comctl32.ocx /s
      2⤵
        PID:832
      • C:\Users\Admin\AppData\Local\Temp\ChromeHistory.exe
        C:\Users\Admin\AppData\Local\Temp\ChromeHistory
        2⤵
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:1816
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1816 -s 880
          3⤵
          • Program crash
          PID:3528
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1816 -ip 1816
      1⤵
        PID:3996

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\c_htemp.bak

        Filesize

        152KB

        MD5

        73bd1e15afb04648c24593e8ba13e983

        SHA1

        4dd85ca46fcdf9d93f6b324f8bb0b5bb512a1b91

        SHA256

        aab0b201f392fef9fdff09e56a9d0ac33d0f68be95da270e6dab89bb1f971d8b

        SHA512

        6eb58fb41691894045569085bd64a83acd62277575ab002cf73d729bda4b6d43c36643a5fa336342e87a493326337ed43b8e5eaeae32f53210714699cb8dfac7

      • memory/1816-6-0x00000000048E0000-0x0000000004933000-memory.dmp

        Filesize

        332KB

      • memory/1816-2541-0x00000000048E0000-0x0000000004933000-memory.dmp

        Filesize

        332KB