Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30/09/2024, 16:20

General

  • Target

    a29fa641c723cea3af3939f553ec1aac350e48142277db1600ebf612176daf27N.exe

  • Size

    313KB

  • MD5

    f1d8128895f3341861a7bac054637c80

  • SHA1

    62ced285d7aa6a49d6a0031deee5513a4e89b033

  • SHA256

    a29fa641c723cea3af3939f553ec1aac350e48142277db1600ebf612176daf27

  • SHA512

    93da918db450cbeba27a1de5db3df8a95f5a2eb796e448e430ee8e84d4a1e821d0aee1e7e86fa7b6f1d9fe2cd517c5cc860e62943e776020864abab8585ca162

  • SSDEEP

    6144:91OgDPdkBAFZWjadD4sIINGR6b+Ey4ArcpDKKLrg7ST8EIb4j:91OgLda4MR6bF6ULHYSQxb4j

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 4 IoCs
  • Modifies registry class 63 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a29fa641c723cea3af3939f553ec1aac350e48142277db1600ebf612176daf27N.exe
    "C:\Users\Admin\AppData\Local\Temp\a29fa641c723cea3af3939f553ec1aac350e48142277db1600ebf612176daf27N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:800
    • C:\Users\Admin\AppData\Local\Temp\7zS4DE2.tmp\setup.exe
      .\setup.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • System policy modification
      PID:2788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\wxDfast\uninstall.exe

    Filesize

    46KB

    MD5

    2628f4240552cc3b2ba04ee51078ae0c

    SHA1

    5b0cca662149240d1fd4354beac1338e97e334ea

    SHA256

    03c965d0bd9827a978ef4080139533573aa800c9803599c0ce91da48506ad8f6

    SHA512

    6ecfcc97126373e82f1edab47020979d7706fc2be39ca792e8f30595133cd762cd4a65a246bee9180713e40e61efa373ecfb5eb72501ee18b38f13e32e61793b

  • C:\Users\Admin\AppData\Local\Temp\7zS4DE2.tmp\[email protected]\chrome.manifest

    Filesize

    114B

    MD5

    31da3dc451da7dc92bf76587ff12a35d

    SHA1

    c07f86044f6ddbcf8f91fa232d1c601376d7e3ff

    SHA256

    c386ec4734dcab45f129b7c8bb716086b842eaa1738d9d42b02f6f8dbb61a3d2

    SHA512

    8468056772b145888c89d7bc9979c249872ee903eb558cc388c46e50f9f4f38b72cf15d68bb165578515f78b5d20cf4e42e75c46e183203147bb0fc89a8868f4

  • C:\Users\Admin\AppData\Local\Temp\7zS4DE2.tmp\[email protected]\content\indexeddb.js

    Filesize

    1KB

    MD5

    0b70af1c7e4f29a2aa55065d5b0f0a89

    SHA1

    bfff5aa59afa0a2a77852dc4b78f4975a45dbc36

    SHA256

    adfac05d9e20e6cca8350feba3a34139d70056cbfb34e1fee6e97ce40ea7223d

    SHA512

    efc846c938cc1b545f2e7ebc86dd6d34a5a921edaf8a5bdb6072a4540cb02ef7165ffe9aa06fc76b1a3016bde9a0cc80cf5ccf737a0124b039bd8c87ce318228

  • C:\Users\Admin\AppData\Local\Temp\7zS4DE2.tmp\[email protected]\content\jquery.js

    Filesize

    91KB

    MD5

    4bab8348a52d17428f684ad1ec3a427e

    SHA1

    56c912a8c8561070aee7b9808c5f3b2abec40063

    SHA256

    3739b485ac39b157caa066b883e4d9d3f74c50beff0b86cd8a24ce407b179a23

    SHA512

    a693069c66d8316d73a3c01ed9e6a4553c9b92d98b294f0e170cc9f9f5502c814255f5f92b93aeb07e0d6fe4613f9a1d511e1bfd965634f04e6cf18f191a7480

  • C:\Users\Admin\AppData\Local\Temp\7zS4DE2.tmp\[email protected]\content\jsext.js

    Filesize

    6KB

    MD5

    918b6380f77e737e56a3afcaa59e03c9

    SHA1

    4378ebc6c073998797d3e1459bb0773a96f7b306

    SHA256

    e1085e1b2083a59f88d0c3ff3bcd5f1b6f4346525b2407e3f6c6d6c67418ebce

    SHA512

    388c32f6d022ccc870277910a91570eb0c0180b8daf5f16acb9160cc28e3e97a865fed2a6f5dafb5b38ec24e959b127fb848e41a02145eddfd28f94241caddda

  • C:\Users\Admin\AppData\Local\Temp\7zS4DE2.tmp\[email protected]\content\lsdb.js

    Filesize

    1KB

    MD5

    9b25f8a9494171ac8a7693fbd903bf42

    SHA1

    26a0aa901ab74a6ccfdf2999e5a986ac904c1f9f

    SHA256

    0d8bfa8195ee3db13f714af332ccac84f4e91b1e87af042caba7a0dafcd5abe4

    SHA512

    4785cbbeaba25e48daffca55e4cc92dbe97c2dd035c23e34cb64fff927b83c7d872c5127f75ad7253b58cf48435640a16fe3fb1a954d3672eddf81ccf2353b6b

  • C:\Users\Admin\AppData\Local\Temp\7zS4DE2.tmp\[email protected]\content\prfdb.js

    Filesize

    1KB

    MD5

    b697ef094952b65d53e5737b8c696a18

    SHA1

    1762e5e0a6ccd9885e9380c2a1f68c7f66874fc1

    SHA256

    2f1d2bfdded83afcc2e5bd24ba19309dc7d0ddd95d8df2759ca5be953be17128

    SHA512

    6f2417869712a5ef9c5e7d2f17be8024b41dab9050476d56a28ea924f127df530a37fcad59361054c7c3b45ddd6b330fca25fdb068392f843e24b21b022717e2

  • C:\Users\Admin\AppData\Local\Temp\7zS4DE2.tmp\[email protected]\content\sqlite.js

    Filesize

    1KB

    MD5

    148538e810217cbeb1de8f8873ed7053

    SHA1

    301626c193b51abb0c981c4458b572d73ef853bf

    SHA256

    84bd5c441ee95e9a8a146b915e393e6a88d1ff90913458ef4588cb7818a67ad3

    SHA512

    620f7b39f09d9566f40a2816328951b2e09f1b6fd9118035d820b1523f451422415cc0e3d125cc00a4a0398dd48f35dcddbc6abb6934ebc3dcfff24d83d1f91b

  • C:\Users\Admin\AppData\Local\Temp\7zS4DE2.tmp\[email protected]\content\wx.xul

    Filesize

    228B

    MD5

    275f145c880ec84e0d5fd031dfb51f62

    SHA1

    628c07a2709ab5564981e030fb5ee839be96d825

    SHA256

    1b8ecf30dd9e0a384e0ff825c025348aa38a2d058fc1c1d5741e4b0473475869

    SHA512

    47bf284f4ba5c35369a8e4b9631e3044d7693b1bf58104e09e71ecaa5d4dfc327c2337e889f7ffa347dfc03d3a0484c5e1bdd14ede4e0e0da3eaa9fb013f633a

  • C:\Users\Admin\AppData\Local\Temp\7zS4DE2.tmp\[email protected]\install.rdf

    Filesize

    677B

    MD5

    fe321becfd3fb9244c12908446e1b8bc

    SHA1

    ce9ec57c4149a45b8dcded5732d6a92e1ef8fe6f

    SHA256

    7e3be8057ffe5ac02d298815aca6d4c980100aecbf3f3eb552abe6e09533848c

    SHA512

    6044042badd0d5aaeed2f732a6ff7230b09e7ac0254c09f8dce0434a932fae9b4152fac847bffe26606266a224ee2b1f261974157fbec97713aa974b4f8c425d

  • C:\Users\Admin\AppData\Local\Temp\7zS4DE2.tmp\background.html

    Filesize

    5KB

    MD5

    67e8ace0735f1335ab4ce44a1b25f928

    SHA1

    f101f301eed322243c25da980d5eada093946531

    SHA256

    9ad93104c3bd150bea07a305af50087d03b75a22e03ab829e5cc757ff5fa4068

    SHA512

    b685f7c7381dfd750e4dffe9fdb969cbdad0e31e4ffbdabd1c290a5790ac756493b8819b32e5d0e0da6cd8afd2b304e3f3eea73dd7e61568fa197f82b3880f7b

  • C:\Users\Admin\AppData\Local\Temp\7zS4DE2.tmp\bhoclass.dll

    Filesize

    137KB

    MD5

    ac13c733379328f86568f6e514c2f7f8

    SHA1

    338901240fedcef4e3892fd4c723c89154f4de05

    SHA256

    7bf09b5c2a9b6348227199c1b3951b57907ca6a5c215a04ad8d5e43232f5b562

    SHA512

    35f69a82694a2ea4268a3dde7940af6bd1c87a32d93a72723464f90e4e818805be9e80872469d1cc29150a9aac872fc78613a584baa1327dfa8478c2de5672c4

  • C:\Users\Admin\AppData\Local\Temp\7zS4DE2.tmp\content.js

    Filesize

    387B

    MD5

    a00ecd419e77b40a59181929b6ca23a5

    SHA1

    812afde30ac603c29278f7172d96de82c05edaa2

    SHA256

    46cb126d922c6001326c2ae0f91e8f87daa18538c58a6774afb7afb9e1e36254

    SHA512

    5063817f119c3276bcbbb98c05fcc632c811788ce4b80f3e1fbeec05c89dea7564d0623e688343174393008b1bfdbb3bc9b477e698a7bed88d5ff64ece2fcda0

  • C:\Users\Admin\AppData\Local\Temp\7zS4DE2.tmp\hnodapgnpppibmhbiifphohdbalikmep.crx

    Filesize

    37KB

    MD5

    1558c76844f0ea8648231852ac2deab7

    SHA1

    a6391a95d02ec16a5a645dcb0a384c28c06c679f

    SHA256

    504cab6c76924e684044bd4112c9b00112fbe504712f2fab0b392b1d246b7cf6

    SHA512

    61f217ac1131346b5db345685d361b755ac0de62d7f21084c86c1ec9b80d16132cfb3ac146ad44b863f85a04b902d1457832dec6888d8de223331b5082dfa67a

  • C:\Users\Admin\AppData\Local\Temp\7zS4DE2.tmp\settings.ini

    Filesize

    599B

    MD5

    8719fb329c2a260ed178db0006b818f3

    SHA1

    876c1f0716791d047c51680fb5750477c79341a7

    SHA256

    f3d54bd5a6fd52bf5e9c4370f265e963af703037df1d00d082bbc22a1714555e

    SHA512

    5150c6be132b6175c710c71cf8c44296f71709d9b188ad94c647306425a9cf9b35a751371854dbac0fb429c764fb6ffb3764c4acdff548138f2d68e076ff382a

  • \Users\Admin\AppData\Local\Temp\7zS4DE2.tmp\setup.exe

    Filesize

    61KB

    MD5

    201d2311011ffdf6c762fd46cdeb52ab

    SHA1

    65c474ca42a337745e288be0e21f43ceaafd5efe

    SHA256

    15c0e4fd6091cda70fa308ea5ee956996f6eb23d24e44700bd5c74bf111cf2aa

    SHA512

    235d70114f391d9e7a319d94bdfc49665d147723379de7487ef76cfc968f7faa3191153b32ba1ab466caeeeeef4852381529a168c3acca9a8d5a26dfe0436f6b