Analysis

  • max time kernel
    121s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    07-11-2024 23:36

General

  • Target

    617036f5c8ef6a426e1b02347d163d6edf266e19060f87983be4444f6cdc0561.exe

  • Size

    717KB

  • MD5

    c6f3e7b9ce31b3e810a0f734baccbb6b

  • SHA1

    3d3850d0d76472eede875fc540e8288aed969bd5

  • SHA256

    617036f5c8ef6a426e1b02347d163d6edf266e19060f87983be4444f6cdc0561

  • SHA512

    d41fe2264aade2e12fa544fff51a7d2f5a8e13680ef8f85c27f5541824878fdcb893f27c429ee40fda841d1f1ea8ed53db0b057d06f54fd8fb15440973fcc9a4

  • SSDEEP

    12288:aKnekrL585h1Vqirj9s9q9b4Qigq0hzIzLDm2J2PGPbwZ6DJ5gihGnVPat9YOX:TLi5jbKU9bfaeKLnJDPkcDJDAVAX

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 63 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\617036f5c8ef6a426e1b02347d163d6edf266e19060f87983be4444f6cdc0561.exe
    "C:\Users\Admin\AppData\Local\Temp\617036f5c8ef6a426e1b02347d163d6edf266e19060f87983be4444f6cdc0561.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1580
    • C:\Users\Admin\AppData\Local\Temp\00294823\aRyjd_V.exe
      "C:\Users\Admin\AppData\Local\Temp/00294823/aRyjd_V.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops Chrome extension
      • Installs/modifies Browser Helper Object
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Modifies registry class
      • System policy modification
      PID:2720

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\00294823\HIx2xT.dll

    Filesize

    222KB

    MD5

    e9b27306a18f18b88945cdf066de2fc9

    SHA1

    4d18490fbb336e261301a967047065dd561cc2f2

    SHA256

    a9880b90d24af3786886306aefe5c79ff3cb2fb7b36ee5fb7bf2af85f240d63c

    SHA512

    f255e8bfb13cfa070b31f47b12a4aacf9ab75a6a8191b6b83740d02c3f007b6d5255a5c2c12bc7b599996742973d2faccb5463d96d16c7aba40e34776823c706

  • C:\Users\Admin\AppData\Local\Temp\00294823\HIx2xT.tlb

    Filesize

    2KB

    MD5

    39d776f73d1d3f771aaa8c3561367c3a

    SHA1

    eef842aa02927bd7fbe7d569c5446ef1a2ea065f

    SHA256

    c2156787eeb818e587529572599fa124773c71330fb93e1c79f4cb9141090941

    SHA512

    3174095accbf422730e60f61523dec01a9a4519cb4642a641c5f547d530ad41f5386d383b90f7daf34f1f36635775929e99d7fe0030aa24cee30f4de8376eeb3

  • C:\Users\Admin\AppData\Local\Temp\00294823\aRyjd_V.dat

    Filesize

    5KB

    MD5

    01c6b3c6a94f6dea4a670e54dc55099c

    SHA1

    9ad86a1770dee6e6ddd0462e32c6c622d5360a5c

    SHA256

    858e45cfdec238b8f124581b61a254c8be7db86910e1c7b25bbf31078cce9e04

    SHA512

    6149313cb7978a7d531ee5de0d737d2054d75c962f9cf18a5313eff26242d57684770eb8b3d8c1c8d937fc1baab53c0969fea38468b0b96b6bd1e18ec71479f6

  • C:\Users\Admin\AppData\Local\Temp\00294823\aRyjd_V.exe

    Filesize

    334KB

    MD5

    8300c91b40229b42301aebc6d8859907

    SHA1

    0b55e56a6add6b4dd4ceff475a0018a203d02a5a

    SHA256

    f54a6814ac06c70ef5b738eca4855e49039783d96b70ba1ae461bd90877e53b5

    SHA512

    0863750da143e1707513f4a2efe1ad6cf81f5a819c7d5496d1629745afffcf72338aa9de90479d5e0936e848f9b260c434fd369027c56be175814086cafd4d8f

  • C:\Users\Admin\AppData\Local\Temp\00294823\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    1b53c596cfb1aa2209446ff64c17dabd

    SHA1

    2542da14728dcdbe1763f1ee39fe9ceae38ad414

    SHA256

    a7dfea4bf7e1d46a8b8e64ccfb2cf35017e3a5b350eead26d6671254d2b3c46f

    SHA512

    be54481675c38ef6a41697cf8cd3ab5a0b126922b192732a9c587dd8905b74b66c79eb0c849f62bbe8934979a894be63734b0ad59ffae295f5797cbfaa327030

  • C:\Users\Admin\AppData\Local\Temp\00294823\[email protected]\chrome.manifest

    Filesize

    106B

    MD5

    7b9eee6403b4f5aa6a7933cfb96e38ea

    SHA1

    ab0dc5cb48956b76e26e5e7e7514f0a7e48d9a87

    SHA256

    dc3eabc01f41a4bcd0a2145c823ac5f6e3239c15361dd70db2eb5c4faec4a35e

    SHA512

    2bb0d5f857fb4366de1aa7dd3d34ac79dca4e509f873f900d426c0050233e93214a23b4f7c6b1f4bab1cf951710e723f7d8e0a94d7913c509f6194d1b6057735

  • C:\Users\Admin\AppData\Local\Temp\00294823\[email protected]\content\bg.js

    Filesize

    9KB

    MD5

    86e47bbb4a31480e43dc5fdd40ab1fc1

    SHA1

    a8f026c5097b26eee33c79253c23bab87fd1f7de

    SHA256

    426a5630d9a4bd2e795ae76292f7089b9347643496fccde75d1303b1efd856bf

    SHA512

    54a66c6bc2153d1b817565cd1de0efc87a31b830b26d87f02a7d3bee4e6613883a7f952b5c4743b59a52217eeb81e7a5e82e3b81efd3e1b493d6cfb44552f716

  • C:\Users\Admin\AppData\Local\Temp\00294823\[email protected]\install.rdf

    Filesize

    608B

    MD5

    95a9b8e07a97100bae7c99d72d0b5c8b

    SHA1

    fa2910551cc484604d4c094e1113b5a529245dcd

    SHA256

    c2ae49a7c66d915188b74a5fbac733cdee2271d734b882d67501a25f8f3f6a2c

    SHA512

    87c35336354c4deebd1a51d59ce3ed9abfd392248c49d45812353ac3135da5c9c6b0bb8f9ab4f63e43451ab7c0758034434e621789f37bdc4996e8c58f5c13aa

  • C:\Users\Admin\AppData\Local\Temp\00294823\pifaakhghfodfmocdaoifmcmpkdfdckn\CrJbSGp.js

    Filesize

    5KB

    MD5

    e9312a88426d98d26aae50b13ecdb6bc

    SHA1

    81ebb514dd8d1044946b6a7cc88430f4bb822b77

    SHA256

    1321fd10c6ac009919beaa5a27263553b1120cda47737692a2110f72c74971cb

    SHA512

    2e8065f9b2319ffc0b7730fa45b64508ae264c70479009361821d9366d090bf84635ece1ea6f92dff9117932577b7970d502eb3db872169a5de29609c023b6ea

  • C:\Users\Admin\AppData\Local\Temp\00294823\pifaakhghfodfmocdaoifmcmpkdfdckn\background.html

    Filesize

    144B

    MD5

    351de86275e55c36af87d7102c1c7f13

    SHA1

    f8ca8e27a261b39914c0354851baae98ac7c36c0

    SHA256

    cca4e6505d3b204ca013e326affe2c790ef56ab7a14f85a3309a28bc30f5a8eb

    SHA512

    6d4163d7e0dd777287f3f288e4190816a1f56b767d326ee6b1ac30228b95135d27bfbea2f3ef860739f025c547e5d720acec74bd44a643bd24f77219503b0776

  • C:\Users\Admin\AppData\Local\Temp\00294823\pifaakhghfodfmocdaoifmcmpkdfdckn\content.js

    Filesize

    197B

    MD5

    5f9891607f65f433b0690bae7088b2c1

    SHA1

    b4edb7579dca34dcd00bca5d2c13cbc5c8fac0de

    SHA256

    fb01e87250ac9985ed08d97f2f99937a52998ea9faebdc88e4071d6517e1ea6b

    SHA512

    76018b39e4b62ff9ea92709d12b0255f33e8402dfc649ed403382eebc22fb37c347c403534a7792e6b5de0ed0a5d97a09b69f0ffc39031cb0d4c7d79e9440c7c

  • C:\Users\Admin\AppData\Local\Temp\00294823\pifaakhghfodfmocdaoifmcmpkdfdckn\lsdb.js

    Filesize

    559B

    MD5

    209b7ae0b6d8c3f9687c979d03b08089

    SHA1

    6449f8bff917115eef4e7488fae61942a869200f

    SHA256

    e3cf0049af8b9f6cb4f0223ccb8438f4b0c75863684c944450015868a0c45704

    SHA512

    1b38d5509283ef25de550b43ef2535dee1a13eff12ad5093f513165a47eec631bcc993242e2ce640f36c61974431ae2555bd6e2a97aba91eb689b7cd4bf25a25

  • C:\Users\Admin\AppData\Local\Temp\00294823\pifaakhghfodfmocdaoifmcmpkdfdckn\manifest.json

    Filesize

    554B

    MD5

    1442a9e536e94d6b50798ae27e8d2fce

    SHA1

    f060dd8cf1f7abaf6d1e4c3ef8110845d803a0ea

    SHA256

    d1652678db28a88503ed4a52d8e4fad2160af4a355c5b36738299f5b54294c2d

    SHA512

    aadced78ea820eb6ea8157f89da089f10a5f10b0f8b3cf43589acd14e0fc512fc3c338763ca3dbb1781073f094bfb2a9011b6f367a41f73675a63beda17e98c2

  • C:\Users\Admin\AppData\Local\Temp\00294823\pifaakhghfodfmocdaoifmcmpkdfdckn\newtab.html

    Filesize

    377B

    MD5

    3f7de07e5dc144b3bdc98e22f7b33fd1

    SHA1

    1e8ab39c43bf19c9a8fd0ecd657e4a60f1cc9c5b

    SHA256

    0b91a72d58b9e36ba4688ea8ab535c697137138a7b8c04eb918921102b841555

    SHA512

    9a86d9dc93d2589138beb57f62ac5c7b1fdeaedc840ce1c270ac4d6d8aa35d676f7b604fee30512eef86c6b4e7b9b57f904d238a085ad967407d94a2f7b6cf02

  • C:\Users\Admin\AppData\Local\Temp\00294823\pifaakhghfodfmocdaoifmcmpkdfdckn\sqlite.js

    Filesize

    1KB

    MD5

    1e9a23c47a2e4244dab6dcd92a4e90a8

    SHA1

    3c9288424c3c504f8fb690e4ac31457ad1d1d8d7

    SHA256

    419ea77805a281b9067a4b306652f7460170304e94ed2c6b5b7163c7f59dfd8c

    SHA512

    7b4d9119477c9e7cafea48c9d7de318c86134ff91303b3618bd55ed4dafd965371602bf088fbb105b26dc03f1d56034699a3c2e7434f5cfce9c6c7cab78dd201