Analysis

  • max time kernel
    189s
  • max time network
    206s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 23:03

General

  • Target

    8c1f5b4d3b21ee66aafaa4a1a6f5820965cebdbb6c6e6d969bfe86934b5cdb6c.exe

  • Size

    2.1MB

  • MD5

    e28d53131d508c8f93bd2375318b2f29

  • SHA1

    b3c38d176d5cd956ead8cdd7a0b4a266607c8340

  • SHA256

    8c1f5b4d3b21ee66aafaa4a1a6f5820965cebdbb6c6e6d969bfe86934b5cdb6c

  • SHA512

    de15b7998049eda49d5951aca39e8352ce77301a5fdc9ea0f55861495ab8180be92c233022c1a543cfa93df658da20b3cc14f04cf6fe3b74d40d6518394f7dc3

  • SSDEEP

    49152:h1OssYIGWkf6jd9YMhKKumq+4oAczj/i6jgvb7GvKSB:h1Ovdd9YMhKgq+4fs

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 5 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 9 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 8 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8c1f5b4d3b21ee66aafaa4a1a6f5820965cebdbb6c6e6d969bfe86934b5cdb6c.exe
    "C:\Users\Admin\AppData\Local\Temp\8c1f5b4d3b21ee66aafaa4a1a6f5820965cebdbb6c6e6d969bfe86934b5cdb6c.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4612
    • C:\Users\Admin\AppData\Local\Temp\7zS5505.tmp\8kXZqlXP1RaODFD.exe
      .\8kXZqlXP1RaODFD.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops Chrome extension
      • Installs/modifies Browser Helper Object
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:2536
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32.exe /s "C:\Program Files (x86)\GGoSave\BlPOjeU8MgDbSs.x64.dll"
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1620
        • C:\Windows\system32\regsvr32.exe
          /s "C:\Program Files (x86)\GGoSave\BlPOjeU8MgDbSs.x64.dll"
          4⤵
          • Loads dropped DLL
          • Installs/modifies Browser Helper Object
          PID:3712

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\GGoSave\BlPOjeU8MgDbSs.dat

    Filesize

    6KB

    MD5

    e62707dedb29586f2b9339b66eb11b77

    SHA1

    18bdab5c9cc7e9b037314b441d19dd05bbc3593b

    SHA256

    6f4a93225b3203ba191c6bf5263bd96b860771703e376bee4ede133ca13927a6

    SHA512

    6b3ad796e2b0d8628f00c19215ac6b7291ea370c6eae31624db74be0fe96e3bf869ca48a27df391592162a42eb929bc8dea917629eaacb3a694ec5ca6260c19f

  • C:\Program Files (x86)\GGoSave\BlPOjeU8MgDbSs.dll

    Filesize

    623KB

    MD5

    103866fff4628ada4be6e5235b2ebf5d

    SHA1

    86ca018b33c7cdb953371ee1e290313b9a54a251

    SHA256

    963728f71b4ecee9380a18f5bbc6930256be6018a8087a9964f98ba3e17b7a7c

    SHA512

    2a8f9ce8854bab77b801eb146934e267de3cca83727a8a7c13885b41c75a0b563fdd0cb1683f78057fc6833b22d9d14c5ef0d3707753293d59d4b61f7a9744c3

  • C:\Program Files (x86)\GGoSave\BlPOjeU8MgDbSs.x64.dll

    Filesize

    700KB

    MD5

    401087ab67c6d917bf08d82f011d9eee

    SHA1

    d13dbf241d214d6036f8c6276e0e305fc2ac2b8a

    SHA256

    fada9f28483ab94341359011d5ab92a6fa2418d010aa3eb1c485c19db15e62f5

    SHA512

    4d952fc0a2ef968997d62d901a731193105da2f4541abf4eb3e5c99e247edc7ffb15ae55a8d0e5d228ae704b0a7ff7dca24e14312f778896d834971e7f3d8af6

  • C:\Program Files (x86)\GGoSave\BlPOjeU8MgDbSs.x64.dll

    Filesize

    700KB

    MD5

    401087ab67c6d917bf08d82f011d9eee

    SHA1

    d13dbf241d214d6036f8c6276e0e305fc2ac2b8a

    SHA256

    fada9f28483ab94341359011d5ab92a6fa2418d010aa3eb1c485c19db15e62f5

    SHA512

    4d952fc0a2ef968997d62d901a731193105da2f4541abf4eb3e5c99e247edc7ffb15ae55a8d0e5d228ae704b0a7ff7dca24e14312f778896d834971e7f3d8af6

  • C:\Program Files (x86)\GGoSave\BlPOjeU8MgDbSs.x64.dll

    Filesize

    700KB

    MD5

    401087ab67c6d917bf08d82f011d9eee

    SHA1

    d13dbf241d214d6036f8c6276e0e305fc2ac2b8a

    SHA256

    fada9f28483ab94341359011d5ab92a6fa2418d010aa3eb1c485c19db15e62f5

    SHA512

    4d952fc0a2ef968997d62d901a731193105da2f4541abf4eb3e5c99e247edc7ffb15ae55a8d0e5d228ae704b0a7ff7dca24e14312f778896d834971e7f3d8af6

  • C:\Users\Admin\AppData\Local\Temp\7zS5505.tmp\8kXZqlXP1RaODFD.dat

    Filesize

    6KB

    MD5

    e62707dedb29586f2b9339b66eb11b77

    SHA1

    18bdab5c9cc7e9b037314b441d19dd05bbc3593b

    SHA256

    6f4a93225b3203ba191c6bf5263bd96b860771703e376bee4ede133ca13927a6

    SHA512

    6b3ad796e2b0d8628f00c19215ac6b7291ea370c6eae31624db74be0fe96e3bf869ca48a27df391592162a42eb929bc8dea917629eaacb3a694ec5ca6260c19f

  • C:\Users\Admin\AppData\Local\Temp\7zS5505.tmp\8kXZqlXP1RaODFD.exe

    Filesize

    629KB

    MD5

    150107c0a55484355ce5881240cca669

    SHA1

    35d2f6723091fc4af5c4a00645b6b0f43efd4a06

    SHA256

    c422b33bee8c0b6664a7462093734aea98026ebf7cc9dc65589572213f576f0e

    SHA512

    eb189951a9a89c54c8d7b3a9fcfb97777bd55088186814597ba13e9f985f846e313b5fcd1566de56060ef8cdfb815ed2a77f5c41c02d1c666c47691b1c0aba04

  • C:\Users\Admin\AppData\Local\Temp\7zS5505.tmp\8kXZqlXP1RaODFD.exe

    Filesize

    629KB

    MD5

    150107c0a55484355ce5881240cca669

    SHA1

    35d2f6723091fc4af5c4a00645b6b0f43efd4a06

    SHA256

    c422b33bee8c0b6664a7462093734aea98026ebf7cc9dc65589572213f576f0e

    SHA512

    eb189951a9a89c54c8d7b3a9fcfb97777bd55088186814597ba13e9f985f846e313b5fcd1566de56060ef8cdfb815ed2a77f5c41c02d1c666c47691b1c0aba04

  • C:\Users\Admin\AppData\Local\Temp\7zS5505.tmp\BlPOjeU8MgDbSs.dll

    Filesize

    623KB

    MD5

    103866fff4628ada4be6e5235b2ebf5d

    SHA1

    86ca018b33c7cdb953371ee1e290313b9a54a251

    SHA256

    963728f71b4ecee9380a18f5bbc6930256be6018a8087a9964f98ba3e17b7a7c

    SHA512

    2a8f9ce8854bab77b801eb146934e267de3cca83727a8a7c13885b41c75a0b563fdd0cb1683f78057fc6833b22d9d14c5ef0d3707753293d59d4b61f7a9744c3

  • C:\Users\Admin\AppData\Local\Temp\7zS5505.tmp\BlPOjeU8MgDbSs.tlb

    Filesize

    3KB

    MD5

    3c920faafd032eeda08e4166860d4318

    SHA1

    26451ee3659c4a217f42ebd07f254679ab452f3a

    SHA256

    3377d0af1044505271c64fc342e22a7a24b757e5471657f656ac743373e22857

    SHA512

    327668001f94842eee3ff1dc44c70ddca5da3a0bb49aeea6b3162608b07496456e78bcb3de0462e5e375b349e813f13fd02e61b9e389b1d954cea2628c3c4a6e

  • C:\Users\Admin\AppData\Local\Temp\7zS5505.tmp\BlPOjeU8MgDbSs.x64.dll

    Filesize

    700KB

    MD5

    401087ab67c6d917bf08d82f011d9eee

    SHA1

    d13dbf241d214d6036f8c6276e0e305fc2ac2b8a

    SHA256

    fada9f28483ab94341359011d5ab92a6fa2418d010aa3eb1c485c19db15e62f5

    SHA512

    4d952fc0a2ef968997d62d901a731193105da2f4541abf4eb3e5c99e247edc7ffb15ae55a8d0e5d228ae704b0a7ff7dca24e14312f778896d834971e7f3d8af6

  • C:\Users\Admin\AppData\Local\Temp\7zS5505.tmp\blpgghpanlpicjggkljbpiogklaoaapj\background.html

    Filesize

    145B

    MD5

    eafb69feb88411ff98261e22a67f12e6

    SHA1

    92b3b49d21c2fd9650f2cbbbec2a052cf6f4126b

    SHA256

    3b93b87d45f29ca2db99b757722e43779e38a7a95fb3d0a2355d34db918dcc9e

    SHA512

    63e1384cb37bc50e1a81c1af8bdedc917de88d8775e87c57888b0cb2c750e330164d13d8807ac7b7796e9a449cf3624b20e92d45e4a68dc49a87a2df0351f4a8

  • C:\Users\Admin\AppData\Local\Temp\7zS5505.tmp\blpgghpanlpicjggkljbpiogklaoaapj\content.js

    Filesize

    144B

    MD5

    fca19198fd8af21016a8b1dec7980002

    SHA1

    fd01a47d14004e17a625efe66cc46a06c786cf40

    SHA256

    332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a

    SHA512

    60f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47

  • C:\Users\Admin\AppData\Local\Temp\7zS5505.tmp\blpgghpanlpicjggkljbpiogklaoaapj\lsdb.js

    Filesize

    531B

    MD5

    36d98318ab2b3b2585a30984db328afb

    SHA1

    f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5

    SHA256

    ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7

    SHA512

    6f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a

  • C:\Users\Admin\AppData\Local\Temp\7zS5505.tmp\blpgghpanlpicjggkljbpiogklaoaapj\manifest.json

    Filesize

    499B

    MD5

    f280c5b0e5962c3cc88886d712df31b0

    SHA1

    23a6e758c55cc173c0c01fe86b6f6f3998be4d79

    SHA256

    42181dce58104d2dfb1dae4dbbee0bcb8f996d34e051189e412077b46ba84c23

    SHA512

    bcb4bcb9b3aad8a5561b8572a7701eb9017cbb9911066d0088baf08715d70efca806c489c7f8083bddf9749c70e501004ddb60e3236735a136077da881a41bf6

  • C:\Users\Admin\AppData\Local\Temp\7zS5505.tmp\blpgghpanlpicjggkljbpiogklaoaapj\o8uW6ZXS.js

    Filesize

    5KB

    MD5

    0bf6670143c38c9b43530bcbb9aeb774

    SHA1

    7b68d387f2894b8c4dd577cf93910c05f389fb5c

    SHA256

    1d328445604211e3ecacd4cdae9cf48986e94919fbcb360a38c7ce12c6f8c6b8

    SHA512

    029e401098c97c0c6e0e685dcd09e5bed42a0ce5ed9ca15fdf37bc67f1ad0c91ea618019c0ad245c0be672c91c1040a0bfe00a386ddd57ff211cac438e8c59b0

  • C:\Users\Admin\AppData\Local\Temp\7zS5505.tmp\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    df13f711e20e9c80171846d4f2f7ae06

    SHA1

    56d29cda58427efe0e21d3880d39eb1b0ef60bee

    SHA256

    6c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4

    SHA512

    6c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e

  • C:\Users\Admin\AppData\Local\Temp\7zS5505.tmp\[email protected]\chrome.manifest

    Filesize

    35B

    MD5

    746749256c0d80917cc53c9bc78f4b33

    SHA1

    77f54661fca7467cab0253d6c3ce37b7f14f829a

    SHA256

    c0a5562833c1bee5deaebfa509916774c9deb7308122011c9d7fb7bf301a6c33

    SHA512

    2a3f0b1b5e623b54e6edf0cf8ac0dfd7619a63914e0b470e93118e8adc4a198c3604bf2935c4aef042dc2751b74d1a38e24c1df6579557007b3add22cecc18d3

  • C:\Users\Admin\AppData\Local\Temp\7zS5505.tmp\[email protected]\content\bg.js

    Filesize

    7KB

    MD5

    52b2d1ec9c91480f0ae76f85d4c3e5ec

    SHA1

    c9213ca18ba55d4caa1582692184f430502ab79c

    SHA256

    ec1b0e91d5f466e3c9a0362596b1c885351ca99dc6fedd8ac6f9ab3d5995a93d

    SHA512

    e438f8b1f0ea9219c789b21210d291ce272a4b7d515d42aca3f8f14207bf4a34bccedc3835ef1fd991daf14f47cf2a7a8d632816ec0310803c0fa818ec290fd8

  • C:\Users\Admin\AppData\Local\Temp\7zS5505.tmp\[email protected]\install.rdf

    Filesize

    594B

    MD5

    160bd6dd567076953b421ff4cf4ad2bb

    SHA1

    0579b6bdb5653787d883fa7548c255fd0156bf6b

    SHA256

    6352667c0e774d16a743d182a4ef6d2387c20175583e71fdea6ac7cb2cf0f07d

    SHA512

    07d5be6efe9998d8710449550baf7a3d8cf91476a8c613e744c8a8c93d84c3b9c03f490eb899ec800da400cab1d37cd86d64eac4000f0277ad9a2deb95fb06e0

  • memory/1620-149-0x0000000000000000-mapping.dmp

  • memory/2536-132-0x0000000000000000-mapping.dmp

  • memory/3712-152-0x0000000000000000-mapping.dmp