Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2024, 22:45

General

  • Target

    df7653d83de57eae56ed3e6083218148e7e49f39077f77dfc64e23f645a61dd5N.exe

  • Size

    717KB

  • MD5

    2110b813c67d2714699136ce20ddf190

  • SHA1

    3a3ddae72c52df8efadfa2343755dc34be945015

  • SHA256

    df7653d83de57eae56ed3e6083218148e7e49f39077f77dfc64e23f645a61dd5

  • SHA512

    c3536217bf8cfdbd427297fd22f0c2c89242c0b78dd7166c3fdb6077a34680cb240d141c220fbe773dd1d4b6279053db7496945ed33e54c65675f3c6b746c0ac

  • SSDEEP

    12288:BKnekrL58YfLct9Eltz8BVXqEZDK0sxPP+tLA1cszripI:OLiYjC9EtgbXhZ2xPP+FAz6I

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df7653d83de57eae56ed3e6083218148e7e49f39077f77dfc64e23f645a61dd5N.exe
    "C:\Users\Admin\AppData\Local\Temp\df7653d83de57eae56ed3e6083218148e7e49f39077f77dfc64e23f645a61dd5N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2700
    • C:\Users\Admin\AppData\Local\Temp\00294823\bKhTixTaXP.exe
      "C:\Users\Admin\AppData\Local\Temp/00294823/bKhTixTaXP.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops Chrome extension
      • Installs/modifies Browser Helper Object
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Modifies registry class
      • System policy modification
      PID:2772

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\00294823\Ef9A53Wie.dll

    Filesize

    222KB

    MD5

    e9b27306a18f18b88945cdf066de2fc9

    SHA1

    4d18490fbb336e261301a967047065dd561cc2f2

    SHA256

    a9880b90d24af3786886306aefe5c79ff3cb2fb7b36ee5fb7bf2af85f240d63c

    SHA512

    f255e8bfb13cfa070b31f47b12a4aacf9ab75a6a8191b6b83740d02c3f007b6d5255a5c2c12bc7b599996742973d2faccb5463d96d16c7aba40e34776823c706

  • C:\Users\Admin\AppData\Local\Temp\00294823\Ef9A53Wie.tlb

    Filesize

    2KB

    MD5

    39d776f73d1d3f771aaa8c3561367c3a

    SHA1

    eef842aa02927bd7fbe7d569c5446ef1a2ea065f

    SHA256

    c2156787eeb818e587529572599fa124773c71330fb93e1c79f4cb9141090941

    SHA512

    3174095accbf422730e60f61523dec01a9a4519cb4642a641c5f547d530ad41f5386d383b90f7daf34f1f36635775929e99d7fe0030aa24cee30f4de8376eeb3

  • C:\Users\Admin\AppData\Local\Temp\00294823\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    1b53c596cfb1aa2209446ff64c17dabd

    SHA1

    2542da14728dcdbe1763f1ee39fe9ceae38ad414

    SHA256

    a7dfea4bf7e1d46a8b8e64ccfb2cf35017e3a5b350eead26d6671254d2b3c46f

    SHA512

    be54481675c38ef6a41697cf8cd3ab5a0b126922b192732a9c587dd8905b74b66c79eb0c849f62bbe8934979a894be63734b0ad59ffae295f5797cbfaa327030

  • C:\Users\Admin\AppData\Local\Temp\00294823\[email protected]\chrome.manifest

    Filesize

    112B

    MD5

    b4781a4d13b49031619fe631355d3bdb

    SHA1

    7e282f02fec331ca4a3c4fe003f1b8ec82759ae0

    SHA256

    da675ca8cc22d90567df5d3a67e7db063b921b0fcc246be4309afa56fd22a899

    SHA512

    05ee4ea712ed2920fe62068b9bd33d79c888b2a882443eb316cb9a745a3b1d4f3e55fb1fec590f73eb2771e6a545a6549c1da43825fad3b12a2169bc82fc2127

  • C:\Users\Admin\AppData\Local\Temp\00294823\[email protected]\content\bg.js

    Filesize

    9KB

    MD5

    bb8ca2b1948a8a89ab41148d92dd16ee

    SHA1

    58dd918e70fa640a535f14dd5989be3047eecfac

    SHA256

    ab40ff4487087bd0f4eed3b2a611c84a5e71aed998fe93a35b0e5a6727d7383c

    SHA512

    a2e386823d7e93eaf2c9557b4664c381d08867ada8f09ee219a045fb8cfd7f37eaca724697b5eaa961f203ec7b7fdc5a89098786e9231736fd76efa5d15f8714

  • C:\Users\Admin\AppData\Local\Temp\00294823\[email protected]\install.rdf

    Filesize

    614B

    MD5

    ab7bdafc16f5ad709fcbac27922ec1b4

    SHA1

    8c83a9e4dade9294c74c08bc45fe88ede0468abf

    SHA256

    756da2580505dadb4aee4179257c180401570c8fa92e49b6f2b37435fe26e397

    SHA512

    9093c2e2ccc479e7ea1a2ff07cd0bf9bfdf14e2dca9f0f3a924b3b803d3fbe47bee928c6e1b1ece7fb47959396730b0df0f5c6d03c32a077f7ead3ccc526be77

  • C:\Users\Admin\AppData\Local\Temp\00294823\bKhTixTaXP.dat

    Filesize

    5KB

    MD5

    229c3de426c483c602488c60ab058614

    SHA1

    a0ef5ed9ec2454165dbacb7289f16fe3c538694a

    SHA256

    db3a9ccd4ba3cb9fca7da712448d18ce16492f29ea0a20b4bea34fb7b67f7f8e

    SHA512

    00f6e215a802ac1b74d38e481faeea219095bb8fbe671faf421b203086da2cfb5d4777d9d3c407a6cf4cacea556c741e04f6068703f76c8244b7427e60cddc2e

  • C:\Users\Admin\AppData\Local\Temp\00294823\kiechkldickghobeccnbebcfnclmbdcj\background.html

    Filesize

    147B

    MD5

    5648c4f6583c9568cc1a78d4ab36313f

    SHA1

    ba35d49fc906631b9cc42336fd8a7dd92f7475bc

    SHA256

    25296978a3341058edd780026331a6e731d975ff159f4d64fbfcd7f50cc7feef

    SHA512

    be687b8e660db5f6f8a53d798dd68d726bd2c0df18e6c5792aefbd69b518a8538e7e276d95ff6406adc50d606c939df3286596fce92513479bc9cf0d16fd0bc2

  • C:\Users\Admin\AppData\Local\Temp\00294823\kiechkldickghobeccnbebcfnclmbdcj\content.js

    Filesize

    197B

    MD5

    5f9891607f65f433b0690bae7088b2c1

    SHA1

    b4edb7579dca34dcd00bca5d2c13cbc5c8fac0de

    SHA256

    fb01e87250ac9985ed08d97f2f99937a52998ea9faebdc88e4071d6517e1ea6b

    SHA512

    76018b39e4b62ff9ea92709d12b0255f33e8402dfc649ed403382eebc22fb37c347c403534a7792e6b5de0ed0a5d97a09b69f0ffc39031cb0d4c7d79e9440c7c

  • C:\Users\Admin\AppData\Local\Temp\00294823\kiechkldickghobeccnbebcfnclmbdcj\lsdb.js

    Filesize

    559B

    MD5

    209b7ae0b6d8c3f9687c979d03b08089

    SHA1

    6449f8bff917115eef4e7488fae61942a869200f

    SHA256

    e3cf0049af8b9f6cb4f0223ccb8438f4b0c75863684c944450015868a0c45704

    SHA512

    1b38d5509283ef25de550b43ef2535dee1a13eff12ad5093f513165a47eec631bcc993242e2ce640f36c61974431ae2555bd6e2a97aba91eb689b7cd4bf25a25

  • C:\Users\Admin\AppData\Local\Temp\00294823\kiechkldickghobeccnbebcfnclmbdcj\manifest.json

    Filesize

    510B

    MD5

    6c10d4e7bbf964b24c79f80a8d0b8ab6

    SHA1

    f8929aeb8ebe23059e44bb292e3cdd5b5c1b7830

    SHA256

    1be4491bd8a036f753ceb9048910546e92d40b7bb7d6a898874671c58945cb4c

    SHA512

    46921313abc82e549bcd80055d80f747b46096a6240a9461c7492bb99e323096ff7cba81ea44f526f6383496b6bf3f38b9cb8cf769f768d43ead5896f16b387c

  • C:\Users\Admin\AppData\Local\Temp\00294823\kiechkldickghobeccnbebcfnclmbdcj\pdCHTyiijK.js

    Filesize

    5KB

    MD5

    36c2cbf3d93ab830d879d4f8daf433e9

    SHA1

    cf2d66ff8f47d1b49be47e46221bca335ed96ed5

    SHA256

    66be792a8f42b08521d71620c4bd218362161155f6170d3ffa1530d5fe5cfa27

    SHA512

    e11360d68c22cfb88ddc1c3e5e3ba284ba3e03440d05bd0107ddb55505c0150c3c6b932b93be05909cfe6d92671cb3a432ac779cda034760088e282e5eb723b9

  • C:\Users\Admin\AppData\Local\Temp\00294823\kiechkldickghobeccnbebcfnclmbdcj\sqlite.js

    Filesize

    1KB

    MD5

    f1fceff4e95e82e215d0df5cc5744640

    SHA1

    65ecc7df282f88ef23d688fbaff5f8ff1c397929

    SHA256

    014498ceff05c1a11d01af981c390999794d3d53719ebecca3f2a8ab1b4813b4

    SHA512

    1aa4bb8bd0ba81a658fee6e444847f860e2b8af0d435e809a15210de0207c931195c42c2d541030dcd78ff8554fdde2a5a5cd2fea18df512c80a4efff4ff42b1

  • \Users\Admin\AppData\Local\Temp\00294823\bKhTixTaXP.exe

    Filesize

    334KB

    MD5

    8300c91b40229b42301aebc6d8859907

    SHA1

    0b55e56a6add6b4dd4ceff475a0018a203d02a5a

    SHA256

    f54a6814ac06c70ef5b738eca4855e49039783d96b70ba1ae461bd90877e53b5

    SHA512

    0863750da143e1707513f4a2efe1ad6cf81f5a819c7d5496d1629745afffcf72338aa9de90479d5e0936e848f9b260c434fd369027c56be175814086cafd4d8f