Resubmissions
14-02-2025 01:10
250214-bjsnnayne1 1014-02-2025 01:00
250214-bc5pmsymhw 1013-02-2025 05:01
250213-fnkwtstpgw 1013-02-2025 04:24
250213-e1kk6atmaz 1013-02-2025 04:08
250213-eqe8patkgx 812-02-2025 23:56
250212-3yzt3azrdx 1012-02-2025 23:44
250212-3rgd5szmbm 1012-02-2025 23:19
250212-3a9dlazkep 1012-02-2025 13:32
250212-qs211ssrfr 10Analysis
-
max time kernel
240s -
max time network
244s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12-02-2025 13:32
Static task
static1
Behavioral task
behavioral1
Sample
4363463463464363463463463.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4363463463464363463463463.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral3
Sample
New Text Document mod.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
New Text Document mod.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral5
Sample
New Text Document mod.exe
Resource
win7-20241010-en
General
-
Target
New Text Document mod.exe
-
Size
8KB
-
MD5
69994ff2f00eeca9335ccd502198e05b
-
SHA1
b13a15a5bea65b711b835ce8eccd2a699a99cead
-
SHA256
2e2e035ece4accdee838ecaacdc263fa526939597954d18d1320d73c8bf810c2
-
SHA512
ced53147894ed2dfc980bcb50767d9734ba8021f85842a53bb4bb4c502d51b4e9884f5f74c4dd2b70b53cafbe2441376675f7bd0f19bb20a3becb091a34fb9f3
-
SSDEEP
96:y7ov9wc1dN1Unh3EHJ40CUJCrQt0LpCBIW12nEtgpH9GIkQYQoBNw9fnmK5iLjTv:yZyTFJfCB20LsBIW12n/eIkQ2BNg5S1
Malware Config
Signatures
-
Downloads MZ/PE file 1 IoCs
flow pid Process 10 1628 New Text Document mod.exe -
Executes dropped EXE 1 IoCs
pid Process 1944 extension_dropper.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 42 IoCs
description ioc Process File opened for modification C:\PROGRA~3\WEBVIE~1\popup.100f6462.js extension_dropper.exe File created C:\PROGRA~3\WEBVIE~1\popup.html extension_dropper.exe File created C:\PROGRA~3\WEBVIE~1\client-hub-main-world.26398054.js extension_dropper.exe File opened for modification C:\PROGRA~3\WEBVIE~1\contents.d42e7fcf.js extension_dropper.exe File opened for modification C:\PROGRA~3\WEBVIE~1\grabber.e414ca58.js extension_dropper.exe File created C:\PROGRA~3\WEBVIE~1\iframe.739970f9.js extension_dropper.exe File opened for modification C:\PROGRA~3\WEBVIE~1\iframe.739970f9.js extension_dropper.exe File created C:\PROGRA~3\WEBVIE~1\main-world.af72fae2.js extension_dropper.exe File opened for modification C:\PROGRA~3\WEBVIE~1\popup.html extension_dropper.exe File opened for modification C:\PROGRA~3\WEBVIE~1\client-hub-main-world.26398054.js extension_dropper.exe File opened for modification C:\PROGRA~3\WEBVIE~1\main-world.af72fae2.js extension_dropper.exe File created C:\PROGRA~3\WEBVIE~1\porter.66760f70.js extension_dropper.exe File opened for modification C:\PROGRA~3\WEBVIE~1\static\BACKGR~1\index.js extension_dropper.exe File opened for modification C:\PROGRA~3\WEBVIE~1\any-url-query-text.8d96bb67.js extension_dropper.exe File opened for modification C:\PROGRA~3\WEBVIE~1\hides.19587cd2.js extension_dropper.exe File opened for modification C:\PROGRA~3\WEBVIE~1\redirect.aba114e6.js extension_dropper.exe File created C:\PROGRA~3\WEBVIE~1\static\BACKGR~1\index.js extension_dropper.exe File created C:\PROGRA~3\WEBVIE~1\grabber.e414ca58.js extension_dropper.exe File opened for modification C:\PROGRA~3\WEBVIE~1\icon16.plasmo.6c567d50.png extension_dropper.exe File created C:\PROGRA~3\WEBVIE~1\icon32.plasmo.76b92899.png extension_dropper.exe File created C:\PROGRA~3\WEBVIE~1\icon64.plasmo.8bb5e6e0.png extension_dropper.exe File created C:\PROGRA~3\WEBVIE~1\redirect.aba114e6.js extension_dropper.exe File opened for modification C:\PROGRA~3\WEBVIE~1\script-injector.92f3fc68.js extension_dropper.exe File created C:\PROGRA~3\WEBVIE~1\icon128.plasmo.3c1ed2d2.png extension_dropper.exe File created C:\PROGRA~3\WEBVIE~1\manifest.json extension_dropper.exe File opened for modification C:\PROGRA~3\WEBVIE~1\porter.66760f70.js extension_dropper.exe File created C:\PROGRA~3\WEBVIE~1\handle-main-world.93005d24.js extension_dropper.exe File created C:\PROGRA~3\WEBVIE~1\icon16.plasmo.6c567d50.png extension_dropper.exe File opened for modification C:\PROGRA~3\WEBVIE~1\icon48.plasmo.aced7582.png extension_dropper.exe File created C:\PROGRA~3\WEBVIE~1\script-injector.92f3fc68.js extension_dropper.exe File created C:\PROGRA~3\WEBVIE~1\tracktor.39faf6eb.js extension_dropper.exe File opened for modification C:\PROGRA~3\WEBVIE~1\tracktor.39faf6eb.js extension_dropper.exe File opened for modification C:\PROGRA~3\WEBVIE~1\handle-main-world.93005d24.js extension_dropper.exe File created C:\PROGRA~3\WEBVIE~1\hides.19587cd2.js extension_dropper.exe File opened for modification C:\PROGRA~3\WEBVIE~1\icon32.plasmo.76b92899.png extension_dropper.exe File created C:\PROGRA~3\WEBVIE~1\icon48.plasmo.aced7582.png extension_dropper.exe File created C:\PROGRA~3\WEBVIE~1\any-url-query-text.8d96bb67.js extension_dropper.exe File created C:\PROGRA~3\WEBVIE~1\contents.d42e7fcf.js extension_dropper.exe File opened for modification C:\PROGRA~3\WEBVIE~1\icon128.plasmo.3c1ed2d2.png extension_dropper.exe File opened for modification C:\PROGRA~3\WEBVIE~1\icon64.plasmo.8bb5e6e0.png extension_dropper.exe File opened for modification C:\PROGRA~3\WEBVIE~1\manifest.json extension_dropper.exe File created C:\PROGRA~3\WEBVIE~1\popup.100f6462.js extension_dropper.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language extension_dropper.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1944 extension_dropper.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1628 New Text Document mod.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1628 wrote to memory of 1944 1628 New Text Document mod.exe 31 PID 1628 wrote to memory of 1944 1628 New Text Document mod.exe 31 PID 1628 wrote to memory of 1944 1628 New Text Document mod.exe 31 PID 1628 wrote to memory of 1944 1628 New Text Document mod.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\New Text Document mod.exe"C:\Users\Admin\AppData\Local\Temp\New Text Document mod.exe"1⤵
- Downloads MZ/PE file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\a\extension_dropper.exe"C:\Users\Admin\AppData\Local\Temp\a\extension_dropper.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
840KB
MD59c60fbd4a1b10aa8307dcea3e5953710
SHA12c4d485267af959fadcc544022049366cf136760
SHA256261a4df76a8b4214340ec6142b5cbf5760dcd7a3d3da698fce55ffbdd791267b
SHA512ec54c6df3923c8e8b94e890fbb9c766215adce84cb6af6cdd3249a508719c5b9148b1b09c4b8dc9ebbb4f2f3232c30ef54eec6b4bd9532200cd24ac0bba2bf97
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1.1MB
MD5b4c1cb38678259fbbce4f5a1fbb3043a
SHA125af8f1e94b1e7a1a2c63af74c4040dddf80db55
SHA256021c69f25f7cfeef0cd36094039940b1bdef3c98b9ee1937cdde8f1d4628ed4c
SHA5125c440f7c5abe5163e730af786536ec0c00fb78ac69ebca560d8dadb5d78517bf02ae04e2b7949b0073dbd138683ea665d917aed9bfa9761c7e235061861d90e4