Analysis

  • max time kernel
    106s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11-09-2024 05:10

General

  • Target

    d11ff0b35e661bab51c522ea9e8ee940N.exe

  • Size

    313KB

  • MD5

    d11ff0b35e661bab51c522ea9e8ee940

  • SHA1

    38742d4ecaa545c7b9d3b799818f2df0c3d669be

  • SHA256

    56a2f2f34ad822d2ebb397036380feee3abcacd34f839d06490dd8430cf27c72

  • SHA512

    99fd32a93c53d1a4f1ab81763f2f219a245881c0dd1a68f4834413fa9114db1d890e15cea6c3621873acd6806610dfead994f4170a0d2e6ccfa29afc2df09a05

  • SSDEEP

    6144:91OgDPdkBAFZWjadD4sh3QofuAMHq4B3bzPyNYbxq+qdZ7HT1ibo:91OgLdawL7n4BzKEF0E0

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 4 IoCs
  • Modifies registry class 63 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d11ff0b35e661bab51c522ea9e8ee940N.exe
    "C:\Users\Admin\AppData\Local\Temp\d11ff0b35e661bab51c522ea9e8ee940N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2132
    • C:\Users\Admin\AppData\Local\Temp\7zSCD8C.tmp\setup.exe
      .\setup.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • System policy modification
      PID:2316

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\ADDICT-THING\uninstall.exe

    Filesize

    46KB

    MD5

    2628f4240552cc3b2ba04ee51078ae0c

    SHA1

    5b0cca662149240d1fd4354beac1338e97e334ea

    SHA256

    03c965d0bd9827a978ef4080139533573aa800c9803599c0ce91da48506ad8f6

    SHA512

    6ecfcc97126373e82f1edab47020979d7706fc2be39ca792e8f30595133cd762cd4a65a246bee9180713e40e61efa373ecfb5eb72501ee18b38f13e32e61793b

  • C:\Users\Admin\AppData\Local\Temp\7zSCD8C.tmp\[email protected]\chrome.manifest

    Filesize

    114B

    MD5

    02984ee756d041b67aa06cb8d81f374b

    SHA1

    3ed83c641d707c6021b5f03a0eb4138ca338a0ae

    SHA256

    999cdab64d3fdfbc75ff759fd7071d304341c4f0e9ff518481f3dcc5883e9a60

    SHA512

    a9475b4a730aa345369632dc770ff28711ad0349284419ae016fae30b84936067e4ac69da151f34760f995fc24e8736bd849102f140adb0c5cbdf2e613d00848

  • C:\Users\Admin\AppData\Local\Temp\7zSCD8C.tmp\[email protected]\content\indexeddb.js

    Filesize

    1KB

    MD5

    d7caa37de66768ed4266299426547c92

    SHA1

    7f93beb11e0994d9b997476dc06b410f1fd6a6b0

    SHA256

    86e1ebabdca425b3fbd5f0730ec67c7419df2471b347169b2ff8ca67aa4bcdf2

    SHA512

    ab5fe4b35ada4557b5b3d057a5b6a3f673ae31a09f474fab4928f69a756de8f27bb16c09eb81551d6f9a54d943dc0605a499ec22df5e4a2ee17e749ba1e48578

  • C:\Users\Admin\AppData\Local\Temp\7zSCD8C.tmp\[email protected]\content\jquery.js

    Filesize

    91KB

    MD5

    4bab8348a52d17428f684ad1ec3a427e

    SHA1

    56c912a8c8561070aee7b9808c5f3b2abec40063

    SHA256

    3739b485ac39b157caa066b883e4d9d3f74c50beff0b86cd8a24ce407b179a23

    SHA512

    a693069c66d8316d73a3c01ed9e6a4553c9b92d98b294f0e170cc9f9f5502c814255f5f92b93aeb07e0d6fe4613f9a1d511e1bfd965634f04e6cf18f191a7480

  • C:\Users\Admin\AppData\Local\Temp\7zSCD8C.tmp\[email protected]\content\jsext.js

    Filesize

    6KB

    MD5

    515bbe109a87511acbaef14a36a4ea47

    SHA1

    f4c54d294a0a185a697ca0d48690be32f1938b56

    SHA256

    916422ade8e2730ba62e576102cc568500e18b85214eb1bb5c02cf79515958b1

    SHA512

    4341998d8319bd5ac6049aa96199e99bb9fe53e165345914f25d9f35bb3b21e92f3f8eec9fa3c0c08334280377dddedd1213225586f03949e6c6b5ad7a5bbde3

  • C:\Users\Admin\AppData\Local\Temp\7zSCD8C.tmp\[email protected]\content\lsdb.js

    Filesize

    1KB

    MD5

    dc9468c6c1da25155540658df701fd4a

    SHA1

    7ce6521c34a0a375a8c502868d7d8d784f4efd56

    SHA256

    4700361079234cd13bb4dac1ad1c7d40446213ab6c8c7dd7c2a3fc54ed15c7f4

    SHA512

    861b5980dfe30b3b8c016024fe0aa10221967c8cf6134ad1dec9bf9757b701099b3b60bf7f02301076ffd542c3aacdb861426cb43e1e56313838132013975f67

  • C:\Users\Admin\AppData\Local\Temp\7zSCD8C.tmp\[email protected]\content\prfdb.js

    Filesize

    1KB

    MD5

    b3c287b545cdafb10345acfe54a62b5c

    SHA1

    f264161fa5ac511ec1994a6ece8dbb32f3bb5a2b

    SHA256

    14d1401bb3923af66e33cb298ed3f7db804c6d23f01bc3b9419bc85d9c1d0a92

    SHA512

    e90b2c88d00399eece61af7a1933abbdbeff0adce8549adbae6bd1605b2fd125d52e73e982e629f4cb168ecd50f4c629a6b5c6803a95d791f1c65b1880a01688

  • C:\Users\Admin\AppData\Local\Temp\7zSCD8C.tmp\[email protected]\content\sqlite.js

    Filesize

    1KB

    MD5

    d15d8644dde69ef77d0f658aecb840ad

    SHA1

    74de0e939ef4777e691f70d014620c64c98c81c2

    SHA256

    2ffdcc1ae204bb2626d8610abd0f4576066519588988e63e70a83e5f8f77b504

    SHA512

    2405ef9265ccecbd22722b6fdb144bb1dccb9f72a004ef90694e79ae0f70e0ece1ca985a7402a2a39558d5695d456e692b5b08833c07aa4a16608041a84d7751

  • C:\Users\Admin\AppData\Local\Temp\7zSCD8C.tmp\[email protected]\content\wx.xul

    Filesize

    228B

    MD5

    2524635f3436f2a134671aa375537982

    SHA1

    ef6b8696070527d0849b8d84c37f00c0a556ef6b

    SHA256

    36fc039e7d210ff88af169945b901a47053ebaeafcfe43b9ed5f70f0dcfe16c5

    SHA512

    46420c9f3c454a3a6e61e8ea2f9641a89018659f9b5a709d4a901b5b6b8cea9201ec9f5e4de440c6cdd5f6794ddff1851008a8ba7c956c51a0c90c3beec659e5

  • C:\Users\Admin\AppData\Local\Temp\7zSCD8C.tmp\[email protected]\install.rdf

    Filesize

    677B

    MD5

    cecf6e4993bed2ea8a8909ca9de4ce84

    SHA1

    1eef712ec980783851f2d2d059f8eb9b6b2e9d4a

    SHA256

    15b99c04448373dbf2d0bea48a1d532968c77bff71a021301a5643573c592aec

    SHA512

    e6570fb3363b5ffbf87f7e03ca4a1d6c7c846df2f14a5b0c656ec79e508a44f83f4571398bb9162e84078fd2516a666a910707fa7950cf3469c1c5b63d9ef8fe

  • C:\Users\Admin\AppData\Local\Temp\7zSCD8C.tmp\background.html

    Filesize

    5KB

    MD5

    f14abfa3924ec0e0f59cf415db3e3078

    SHA1

    0bb84b5916699fee94d7e9d904f0e7dffedadf4e

    SHA256

    440fb460dbfc96456c47d39aeb9439032285ca3bb5c11f469f8be7f8e7dc265a

    SHA512

    2349d73775b6f764ffdfc635d439b46599a4f056ddf562bd5b0d9d9a082626857f8c8d0ef4be86262b1dbfc006bdfb9e19780c3b14b11ed295daca5206ea93cd

  • C:\Users\Admin\AppData\Local\Temp\7zSCD8C.tmp\bhoclass.dll

    Filesize

    137KB

    MD5

    ac13c733379328f86568f6e514c2f7f8

    SHA1

    338901240fedcef4e3892fd4c723c89154f4de05

    SHA256

    7bf09b5c2a9b6348227199c1b3951b57907ca6a5c215a04ad8d5e43232f5b562

    SHA512

    35f69a82694a2ea4268a3dde7940af6bd1c87a32d93a72723464f90e4e818805be9e80872469d1cc29150a9aac872fc78613a584baa1327dfa8478c2de5672c4

  • C:\Users\Admin\AppData\Local\Temp\7zSCD8C.tmp\bmdimbjfkkjhlmladmpapipjkopmcodi.crx

    Filesize

    37KB

    MD5

    74d8f635143ad692e9e353488cdd8bae

    SHA1

    9f0fc447a376639e06b1e5d2533b01df84b48f9d

    SHA256

    7343580e0fddd01fc118f22be36856a1e84971d59f44beee74d78876d5bfdc9e

    SHA512

    49b7f73069295744f034ced2ed7639d87726826971b7c71be96069153ea52556a22617ca52ea20d66b067f2e4143fc935663417d3c32f827788d359c37d70e25

  • C:\Users\Admin\AppData\Local\Temp\7zSCD8C.tmp\content.js

    Filesize

    387B

    MD5

    787030145bc939bb27ebac987da1ffc7

    SHA1

    158b1408dcd7d9870862f5e0e306c1b042802213

    SHA256

    c0d9bff43fee3a322c2b2cd0b8355de88a82b900f12e3582471466b43d788618

    SHA512

    9daec765159abc87e5a2a8f32210a5db8f06806b7acdcf8f02999d809f04f9de446aceb08de1aebab5a981aea4823080d1afd08da336249cb9ab7da5b8d2bd4c

  • C:\Users\Admin\AppData\Local\Temp\7zSCD8C.tmp\settings.ini

    Filesize

    610B

    MD5

    dc4c029ec2d9247312435c96ab0aa1c3

    SHA1

    96d59c27223e6ae25d2f17094ea0cdbe51b9e7cb

    SHA256

    b3c3c1de3a19c3a948145634e38bf6b14472e20a2c7ab6c975cf3b7f3db8b8b7

    SHA512

    3734035c2769cf7c39668d1cdde34a4059a4a6253c1f18af6309bf5add0911359a05de658241127e1d1453af545c7c814ebcc0547a5822a19f84812fd8136562

  • \Users\Admin\AppData\Local\Temp\7zSCD8C.tmp\setup.exe

    Filesize

    61KB

    MD5

    201d2311011ffdf6c762fd46cdeb52ab

    SHA1

    65c474ca42a337745e288be0e21f43ceaafd5efe

    SHA256

    15c0e4fd6091cda70fa308ea5ee956996f6eb23d24e44700bd5c74bf111cf2aa

    SHA512

    235d70114f391d9e7a319d94bdfc49665d147723379de7487ef76cfc968f7faa3191153b32ba1ab466caeeeeef4852381529a168c3acca9a8d5a26dfe0436f6b