Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2024, 07:44

General

  • Target

    bd58bc4f56e58f5423ad2ac3d4ee4de55bfb0bfa070383419447c69c436113bbN.exe

  • Size

    722KB

  • MD5

    237685d5d8bd47414cb85b4ce59c42b0

  • SHA1

    4db49d962f629eb11414869d86d11b17514693ac

  • SHA256

    bd58bc4f56e58f5423ad2ac3d4ee4de55bfb0bfa070383419447c69c436113bb

  • SHA512

    6df2fe3cd1cf1e4b2ca6d6601d38ad95c3646fe1a9468261b072bc3f97b59892440d3c9919766bc88f1fb47ac741106b1d960057a4a2f13157664434459657db

  • SSDEEP

    12288:h1OgLdaOqo99/rsFEt5hDG0SAMs9jR/jeRJKu9TJdwYGZtyjTje5jOSpJO:h1OYdaOqOBsFEt5hDG0SAMs9jR/jaJn/

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd58bc4f56e58f5423ad2ac3d4ee4de55bfb0bfa070383419447c69c436113bbN.exe
    "C:\Users\Admin\AppData\Local\Temp\bd58bc4f56e58f5423ad2ac3d4ee4de55bfb0bfa070383419447c69c436113bbN.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2512
    • C:\Users\Admin\AppData\Local\Temp\7zSDC3B.tmp\KF4Z.exe
      .\KF4Z.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops Chrome extension
      • Installs/modifies Browser Helper Object
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Modifies registry class
      • System policy modification
      PID:2412

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\7zSDC3B.tmp\KF4Z.dat

          Filesize

          6KB

          MD5

          1aeca48069143c0e3c679deb265091a5

          SHA1

          4d16126b1f48c06ef44518f0af9b5789388f9b92

          SHA256

          991121fe2b4daf17ff098aa7afbe5b5aec9b6acea94ce71ef24f0a55c6308278

          SHA512

          6a25c8ba9fd3ffed1f81fe30e0f64bddd567132ec27f7462cb85995b665ba9a5283a47b175acc9d96d1875ff2aa33d955e7f82620ecd56a5d1315b8dd0def481

        • C:\Users\Admin\AppData\Local\Temp\7zSDC3B.tmp\[email protected]\bootstrap.js

          Filesize

          2KB

          MD5

          1b53c596cfb1aa2209446ff64c17dabd

          SHA1

          2542da14728dcdbe1763f1ee39fe9ceae38ad414

          SHA256

          a7dfea4bf7e1d46a8b8e64ccfb2cf35017e3a5b350eead26d6671254d2b3c46f

          SHA512

          be54481675c38ef6a41697cf8cd3ab5a0b126922b192732a9c587dd8905b74b66c79eb0c849f62bbe8934979a894be63734b0ad59ffae295f5797cbfaa327030

        • C:\Users\Admin\AppData\Local\Temp\7zSDC3B.tmp\[email protected]\chrome.manifest

          Filesize

          100B

          MD5

          0eec148a316591d60475c1265ab15850

          SHA1

          2b5ed382490c002fe5694e72155881f6bbda73ae

          SHA256

          4c16ba5f03ed7a153194756f61fb3620cb789696ea1c4110d54f0047a897d88e

          SHA512

          cdbff050b900df2b42df6a76f9a88972db0172183b1bcf4e54f5303f02fcbde8d3e2774e0e666c91ac19b1d6926756aec5b3ed7abf48d3d3cf09839b64a2de1e

        • C:\Users\Admin\AppData\Local\Temp\7zSDC3B.tmp\[email protected]\content\bg.js

          Filesize

          8KB

          MD5

          8abb7ea86c9ec312bc6a11d203ac952d

          SHA1

          30e7cf23eafc293d4a146350b976aa657ef69f49

          SHA256

          0588877e8957dc419817f52e556d5cbca079ad00ea13794eabb370bcd1c051d6

          SHA512

          e38aae58dfeea4c693aa07b4161ad10677e13997a8cc5c13c0ddbc4a3d453c384ecd4472a8cb2e9f6bbeec0a5ff0847a83e3a09647d8ed4dd75708394e45935a

        • C:\Users\Admin\AppData\Local\Temp\7zSDC3B.tmp\[email protected]\install.rdf

          Filesize

          609B

          MD5

          2f1cac128400341d5ca0b4e26f79be54

          SHA1

          84c2a44594a5e089f756aae1e0796383d09e6589

          SHA256

          4678f65f587be44865a736ad38fafcd10cc0cc836b77029b585a958a32927b10

          SHA512

          159368bda5828f49d7920be4fe24af5a444b43b5922d533fdc61eb322e93c7bdd4661864fe8eeeae7542e6951fa91607f11a5213534a94fadc28f095cb59ab39

        • C:\Users\Admin\AppData\Local\Temp\7zSDC3B.tmp\joo.dll

          Filesize

          222KB

          MD5

          e9b27306a18f18b88945cdf066de2fc9

          SHA1

          4d18490fbb336e261301a967047065dd561cc2f2

          SHA256

          a9880b90d24af3786886306aefe5c79ff3cb2fb7b36ee5fb7bf2af85f240d63c

          SHA512

          f255e8bfb13cfa070b31f47b12a4aacf9ab75a6a8191b6b83740d02c3f007b6d5255a5c2c12bc7b599996742973d2faccb5463d96d16c7aba40e34776823c706

        • C:\Users\Admin\AppData\Local\Temp\7zSDC3B.tmp\joo.tlb

          Filesize

          2KB

          MD5

          39d776f73d1d3f771aaa8c3561367c3a

          SHA1

          eef842aa02927bd7fbe7d569c5446ef1a2ea065f

          SHA256

          c2156787eeb818e587529572599fa124773c71330fb93e1c79f4cb9141090941

          SHA512

          3174095accbf422730e60f61523dec01a9a4519cb4642a641c5f547d530ad41f5386d383b90f7daf34f1f36635775929e99d7fe0030aa24cee30f4de8376eeb3

        • C:\Users\Admin\AppData\Local\Temp\7zSDC3B.tmp\nacobahoajdiindgilllafkgcipalbec\KIET.js

          Filesize

          4KB

          MD5

          2bcf3dd703b940a0e4ba98de648b4ede

          SHA1

          379e0bd1cbf098d49fecba1a6963748e2e92df84

          SHA256

          adbd7ef1114300b8f738c616cefdf3e92895b730112b96e58f39ef26d5f9b5ba

          SHA512

          b6ba281f5261ca33f305a028b709ecbb12b695f2977f2281cce44ed38159d1d18bc1c2d28101e9f324d2c22778ebe65373d6f6cb5c63a2582248ae9ba5b043e4

        • C:\Users\Admin\AppData\Local\Temp\7zSDC3B.tmp\nacobahoajdiindgilllafkgcipalbec\background.html

          Filesize

          141B

          MD5

          1b7ab828b32d14abb07abd0cf782d55a

          SHA1

          08741066de85fd93cb1435795672cee67f0e6897

          SHA256

          33eda0831ee17c933e4eb2690723c838397b17b985b2595a3586582ded8a1335

          SHA512

          323a49417da685c235e831d93cb299f00742ac8cfc353bcc9f17e9c46b9fd78bb9d54e07619107f4d2044e905b550561fbce58cb989e016d56d10df5d121bd79

        • C:\Users\Admin\AppData\Local\Temp\7zSDC3B.tmp\nacobahoajdiindgilllafkgcipalbec\content.js

          Filesize

          197B

          MD5

          5f9891607f65f433b0690bae7088b2c1

          SHA1

          b4edb7579dca34dcd00bca5d2c13cbc5c8fac0de

          SHA256

          fb01e87250ac9985ed08d97f2f99937a52998ea9faebdc88e4071d6517e1ea6b

          SHA512

          76018b39e4b62ff9ea92709d12b0255f33e8402dfc649ed403382eebc22fb37c347c403534a7792e6b5de0ed0a5d97a09b69f0ffc39031cb0d4c7d79e9440c7c

        • C:\Users\Admin\AppData\Local\Temp\7zSDC3B.tmp\nacobahoajdiindgilllafkgcipalbec\lsdb.js

          Filesize

          559B

          MD5

          209b7ae0b6d8c3f9687c979d03b08089

          SHA1

          6449f8bff917115eef4e7488fae61942a869200f

          SHA256

          e3cf0049af8b9f6cb4f0223ccb8438f4b0c75863684c944450015868a0c45704

          SHA512

          1b38d5509283ef25de550b43ef2535dee1a13eff12ad5093f513165a47eec631bcc993242e2ce640f36c61974431ae2555bd6e2a97aba91eb689b7cd4bf25a25

        • C:\Users\Admin\AppData\Local\Temp\7zSDC3B.tmp\nacobahoajdiindgilllafkgcipalbec\manifest.json

          Filesize

          508B

          MD5

          6c969d22fb0608971c5e5c00e0219f1b

          SHA1

          9755b22a04bff0aaea11c1efc5db7ee1f4cfb506

          SHA256

          804fd9a0912df52bc91c892675fa0a3edeb76c341cd651630f36d191e3f9e78d

          SHA512

          dc6498e5ef985614f0a8f7787b224f8bd06f43564575d2b31bff9041c97e6953905893476dbaa0fb63f36a7839383ab856dbd290a54d72c77c7c16b1f42435fa

        • C:\Users\Admin\AppData\Local\Temp\7zSDC3B.tmp\nacobahoajdiindgilllafkgcipalbec\sqlite.js

          Filesize

          1KB

          MD5

          af2e1c7ca82bbee5117a45fcd4abca27

          SHA1

          ec6d9b4ed484c0b6602b4e29f679abd267476721

          SHA256

          50aaddd216579514eebb165898efa75890f8cec3e116f22fb0f22c7255fd9042

          SHA512

          54c97cd6ce1ba629b5c677ecf5fb76e0d2186975e293cbd0a67fc9a303385c4003feb7f165ba476ddcf32fe2d7dfd1a319147bd44cf293ea0982b2f706283d89

        • \Users\Admin\AppData\Local\Temp\7zSDC3B.tmp\KF4Z.exe

          Filesize

          334KB

          MD5

          8300c91b40229b42301aebc6d8859907

          SHA1

          0b55e56a6add6b4dd4ceff475a0018a203d02a5a

          SHA256

          f54a6814ac06c70ef5b738eca4855e49039783d96b70ba1ae461bd90877e53b5

          SHA512

          0863750da143e1707513f4a2efe1ad6cf81f5a819c7d5496d1629745afffcf72338aa9de90479d5e0936e848f9b260c434fd369027c56be175814086cafd4d8f