Overview
overview
9Static
static
9New folder...ew.exe
windows7-x64
7New folder...ew.exe
windows10-2004-x64
7New folder...ew.exe
windows7-x64
9New folder...ew.exe
windows10-2004-x64
9New folder...ss.exe
windows7-x64
7New folder...ss.exe
windows10-2004-x64
7New folder...ew.exe
windows7-x64
9New folder...ew.exe
windows10-2004-x64
9New folder...ox.exe
windows7-x64
7New folder...ox.exe
windows10-2004-x64
7New folder...ew.exe
windows7-x64
9New folder...ew.exe
windows10-2004-x64
9New folder...ew.exe
windows7-x64
9New folder...ew.exe
windows10-2004-x64
9New folder...ew.exe
windows7-x64
7New folder...ew.exe
windows10-2004-x64
7New folder...pv.exe
windows7-x64
9New folder...pv.exe
windows10-2004-x64
9New folder...pv.exe
windows7-x64
6New folder...pv.exe
windows10-2004-x64
6New folder...ss.exe
windows7-x64
9New folder...ss.exe
windows10-2004-x64
9New folder...pv.exe
windows7-x64
3New folder...pv.exe
windows10-2004-x64
3New folder...oi.bat
windows7-x64
9New folder...oi.bat
windows10-2004-x64
9Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
10-11-2024 02:23
Behavioral task
behavioral1
Sample
New folder (4)/free robbux/BrowsingHistoryView.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
New folder (4)/free robbux/BrowsingHistoryView.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
New folder (4)/free robbux/ChromeHistoryView.exe
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
New folder (4)/free robbux/ChromeHistoryView.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
New folder (4)/free robbux/ChromePass.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
New folder (4)/free robbux/ChromePass.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
New folder (4)/free robbux/OperaPassView.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
New folder (4)/free robbux/OperaPassView.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
New folder (4)/free robbux/PasswordFox.exe
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
New folder (4)/free robbux/PasswordFox.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
New folder (4)/free robbux/RouterPassView.exe
Resource
win7-20241023-en
Behavioral task
behavioral12
Sample
New folder (4)/free robbux/RouterPassView.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
New folder (4)/free robbux/SkypeLogView.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
New folder (4)/free robbux/SkypeLogView.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
New folder (4)/free robbux/WebBrowserPassView.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
New folder (4)/free robbux/WebBrowserPassView.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
New folder (4)/free robbux/iepv.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
New folder (4)/free robbux/iepv.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
New folder (4)/free robbux/mailpv.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
New folder (4)/free robbux/mailpv.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
New folder (4)/free robbux/mspass.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
New folder (4)/free robbux/mspass.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
New folder (4)/free robbux/pspv.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
New folder (4)/free robbux/pspv.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
New folder (4)/free robbux/robuxboi.bat
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
New folder (4)/free robbux/robuxboi.bat
Resource
win10v2004-20241007-en
General
-
Target
New folder (4)/free robbux/ChromeHistoryView.exe
-
Size
166KB
-
MD5
2907f996b66c0d6865c1d018c40a3e3c
-
SHA1
0abb66d16df4f548a27c601256dcd4a13f29d6ec
-
SHA256
7763a894a09e9ec525acce501c2fd219c87d2a3c74d02afbbc687fb6e5ade65d
-
SHA512
72e78a6e1efc58ba434c67a0d0357c4da23643d04bb59fd69d6d7ed6339eee6a24726f8fffc0b370cb44333b09c756ebd3b1b4865cc44124efdb79f0306d7145
-
SSDEEP
3072:w7JeQvVTseGHB4WODZdh0+CARAzaA3tSg+hxOxuwicmAUamMFir:w78isVhibzCARcaCB+r8tDmAUam
Malware Config
Signatures
-
Detected Nirsoft tools 1 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
Processes:
resource yara_rule behavioral3/memory/2156-1-0x0000000000400000-0x000000000044F000-memory.dmp Nirsoft -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral3/memory/2156-0-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral3/memory/2156-1-0x0000000000400000-0x000000000044F000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ChromeHistoryView.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ChromeHistoryView.exe