Analysis
-
max time kernel
189s -
max time network
206s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 23:03
Static task
static1
Behavioral task
behavioral1
Sample
8c1f5b4d3b21ee66aafaa4a1a6f5820965cebdbb6c6e6d969bfe86934b5cdb6c.exe
Resource
win7-20220812-en
General
-
Target
8c1f5b4d3b21ee66aafaa4a1a6f5820965cebdbb6c6e6d969bfe86934b5cdb6c.exe
-
Size
2.1MB
-
MD5
e28d53131d508c8f93bd2375318b2f29
-
SHA1
b3c38d176d5cd956ead8cdd7a0b4a266607c8340
-
SHA256
8c1f5b4d3b21ee66aafaa4a1a6f5820965cebdbb6c6e6d969bfe86934b5cdb6c
-
SHA512
de15b7998049eda49d5951aca39e8352ce77301a5fdc9ea0f55861495ab8180be92c233022c1a543cfa93df658da20b3cc14f04cf6fe3b74d40d6518394f7dc3
-
SSDEEP
49152:h1OssYIGWkf6jd9YMhKKumq+4oAczj/i6jgvb7GvKSB:h1Ovdd9YMhKgq+4fs
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2536 8kXZqlXP1RaODFD.exe -
Loads dropped DLL 3 IoCs
pid Process 2536 8kXZqlXP1RaODFD.exe 1620 regsvr32.exe 3712 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 5 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\blpgghpanlpicjggkljbpiogklaoaapj\2.0\manifest.json 8kXZqlXP1RaODFD.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\blpgghpanlpicjggkljbpiogklaoaapj\2.0\manifest.json 8kXZqlXP1RaODFD.exe File created C:\Users\DefaultAccount\AppData\Local\Google\Chrome\User Data\Default\Extensions\blpgghpanlpicjggkljbpiogklaoaapj\2.0\manifest.json 8kXZqlXP1RaODFD.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\blpgghpanlpicjggkljbpiogklaoaapj\2.0\manifest.json 8kXZqlXP1RaODFD.exe File created C:\Users\WDAGUtilityAccount\AppData\Local\Google\Chrome\User Data\Default\Extensions\blpgghpanlpicjggkljbpiogklaoaapj\2.0\manifest.json 8kXZqlXP1RaODFD.exe -
Installs/modifies Browser Helper Object 2 TTPs 9 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ 8kXZqlXP1RaODFD.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{DBC80044-A445-435B-BC74-9C25C1C588A9} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects 8kXZqlXP1RaODFD.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA} 8kXZqlXP1RaODFD.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} 8kXZqlXP1RaODFD.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files (x86)\GGoSave\BlPOjeU8MgDbSs.dll 8kXZqlXP1RaODFD.exe File opened for modification C:\Program Files (x86)\GGoSave\BlPOjeU8MgDbSs.dll 8kXZqlXP1RaODFD.exe File created C:\Program Files (x86)\GGoSave\BlPOjeU8MgDbSs.tlb 8kXZqlXP1RaODFD.exe File opened for modification C:\Program Files (x86)\GGoSave\BlPOjeU8MgDbSs.tlb 8kXZqlXP1RaODFD.exe File created C:\Program Files (x86)\GGoSave\BlPOjeU8MgDbSs.dat 8kXZqlXP1RaODFD.exe File opened for modification C:\Program Files (x86)\GGoSave\BlPOjeU8MgDbSs.dat 8kXZqlXP1RaODFD.exe File created C:\Program Files (x86)\GGoSave\BlPOjeU8MgDbSs.x64.dll 8kXZqlXP1RaODFD.exe File opened for modification C:\Program Files (x86)\GGoSave\BlPOjeU8MgDbSs.x64.dll 8kXZqlXP1RaODFD.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4612 wrote to memory of 2536 4612 8c1f5b4d3b21ee66aafaa4a1a6f5820965cebdbb6c6e6d969bfe86934b5cdb6c.exe 82 PID 4612 wrote to memory of 2536 4612 8c1f5b4d3b21ee66aafaa4a1a6f5820965cebdbb6c6e6d969bfe86934b5cdb6c.exe 82 PID 4612 wrote to memory of 2536 4612 8c1f5b4d3b21ee66aafaa4a1a6f5820965cebdbb6c6e6d969bfe86934b5cdb6c.exe 82 PID 2536 wrote to memory of 1620 2536 8kXZqlXP1RaODFD.exe 83 PID 2536 wrote to memory of 1620 2536 8kXZqlXP1RaODFD.exe 83 PID 2536 wrote to memory of 1620 2536 8kXZqlXP1RaODFD.exe 83 PID 1620 wrote to memory of 3712 1620 regsvr32.exe 84 PID 1620 wrote to memory of 3712 1620 regsvr32.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c1f5b4d3b21ee66aafaa4a1a6f5820965cebdbb6c6e6d969bfe86934b5cdb6c.exe"C:\Users\Admin\AppData\Local\Temp\8c1f5b4d3b21ee66aafaa4a1a6f5820965cebdbb6c6e6d969bfe86934b5cdb6c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Users\Admin\AppData\Local\Temp\7zS5505.tmp\8kXZqlXP1RaODFD.exe.\8kXZqlXP1RaODFD.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\GGoSave\BlPOjeU8MgDbSs.x64.dll"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\GGoSave\BlPOjeU8MgDbSs.x64.dll"4⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
PID:3712
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5e62707dedb29586f2b9339b66eb11b77
SHA118bdab5c9cc7e9b037314b441d19dd05bbc3593b
SHA2566f4a93225b3203ba191c6bf5263bd96b860771703e376bee4ede133ca13927a6
SHA5126b3ad796e2b0d8628f00c19215ac6b7291ea370c6eae31624db74be0fe96e3bf869ca48a27df391592162a42eb929bc8dea917629eaacb3a694ec5ca6260c19f
-
Filesize
623KB
MD5103866fff4628ada4be6e5235b2ebf5d
SHA186ca018b33c7cdb953371ee1e290313b9a54a251
SHA256963728f71b4ecee9380a18f5bbc6930256be6018a8087a9964f98ba3e17b7a7c
SHA5122a8f9ce8854bab77b801eb146934e267de3cca83727a8a7c13885b41c75a0b563fdd0cb1683f78057fc6833b22d9d14c5ef0d3707753293d59d4b61f7a9744c3
-
Filesize
700KB
MD5401087ab67c6d917bf08d82f011d9eee
SHA1d13dbf241d214d6036f8c6276e0e305fc2ac2b8a
SHA256fada9f28483ab94341359011d5ab92a6fa2418d010aa3eb1c485c19db15e62f5
SHA5124d952fc0a2ef968997d62d901a731193105da2f4541abf4eb3e5c99e247edc7ffb15ae55a8d0e5d228ae704b0a7ff7dca24e14312f778896d834971e7f3d8af6
-
Filesize
700KB
MD5401087ab67c6d917bf08d82f011d9eee
SHA1d13dbf241d214d6036f8c6276e0e305fc2ac2b8a
SHA256fada9f28483ab94341359011d5ab92a6fa2418d010aa3eb1c485c19db15e62f5
SHA5124d952fc0a2ef968997d62d901a731193105da2f4541abf4eb3e5c99e247edc7ffb15ae55a8d0e5d228ae704b0a7ff7dca24e14312f778896d834971e7f3d8af6
-
Filesize
700KB
MD5401087ab67c6d917bf08d82f011d9eee
SHA1d13dbf241d214d6036f8c6276e0e305fc2ac2b8a
SHA256fada9f28483ab94341359011d5ab92a6fa2418d010aa3eb1c485c19db15e62f5
SHA5124d952fc0a2ef968997d62d901a731193105da2f4541abf4eb3e5c99e247edc7ffb15ae55a8d0e5d228ae704b0a7ff7dca24e14312f778896d834971e7f3d8af6
-
Filesize
6KB
MD5e62707dedb29586f2b9339b66eb11b77
SHA118bdab5c9cc7e9b037314b441d19dd05bbc3593b
SHA2566f4a93225b3203ba191c6bf5263bd96b860771703e376bee4ede133ca13927a6
SHA5126b3ad796e2b0d8628f00c19215ac6b7291ea370c6eae31624db74be0fe96e3bf869ca48a27df391592162a42eb929bc8dea917629eaacb3a694ec5ca6260c19f
-
Filesize
629KB
MD5150107c0a55484355ce5881240cca669
SHA135d2f6723091fc4af5c4a00645b6b0f43efd4a06
SHA256c422b33bee8c0b6664a7462093734aea98026ebf7cc9dc65589572213f576f0e
SHA512eb189951a9a89c54c8d7b3a9fcfb97777bd55088186814597ba13e9f985f846e313b5fcd1566de56060ef8cdfb815ed2a77f5c41c02d1c666c47691b1c0aba04
-
Filesize
629KB
MD5150107c0a55484355ce5881240cca669
SHA135d2f6723091fc4af5c4a00645b6b0f43efd4a06
SHA256c422b33bee8c0b6664a7462093734aea98026ebf7cc9dc65589572213f576f0e
SHA512eb189951a9a89c54c8d7b3a9fcfb97777bd55088186814597ba13e9f985f846e313b5fcd1566de56060ef8cdfb815ed2a77f5c41c02d1c666c47691b1c0aba04
-
Filesize
623KB
MD5103866fff4628ada4be6e5235b2ebf5d
SHA186ca018b33c7cdb953371ee1e290313b9a54a251
SHA256963728f71b4ecee9380a18f5bbc6930256be6018a8087a9964f98ba3e17b7a7c
SHA5122a8f9ce8854bab77b801eb146934e267de3cca83727a8a7c13885b41c75a0b563fdd0cb1683f78057fc6833b22d9d14c5ef0d3707753293d59d4b61f7a9744c3
-
Filesize
3KB
MD53c920faafd032eeda08e4166860d4318
SHA126451ee3659c4a217f42ebd07f254679ab452f3a
SHA2563377d0af1044505271c64fc342e22a7a24b757e5471657f656ac743373e22857
SHA512327668001f94842eee3ff1dc44c70ddca5da3a0bb49aeea6b3162608b07496456e78bcb3de0462e5e375b349e813f13fd02e61b9e389b1d954cea2628c3c4a6e
-
Filesize
700KB
MD5401087ab67c6d917bf08d82f011d9eee
SHA1d13dbf241d214d6036f8c6276e0e305fc2ac2b8a
SHA256fada9f28483ab94341359011d5ab92a6fa2418d010aa3eb1c485c19db15e62f5
SHA5124d952fc0a2ef968997d62d901a731193105da2f4541abf4eb3e5c99e247edc7ffb15ae55a8d0e5d228ae704b0a7ff7dca24e14312f778896d834971e7f3d8af6
-
Filesize
145B
MD5eafb69feb88411ff98261e22a67f12e6
SHA192b3b49d21c2fd9650f2cbbbec2a052cf6f4126b
SHA2563b93b87d45f29ca2db99b757722e43779e38a7a95fb3d0a2355d34db918dcc9e
SHA51263e1384cb37bc50e1a81c1af8bdedc917de88d8775e87c57888b0cb2c750e330164d13d8807ac7b7796e9a449cf3624b20e92d45e4a68dc49a87a2df0351f4a8
-
Filesize
144B
MD5fca19198fd8af21016a8b1dec7980002
SHA1fd01a47d14004e17a625efe66cc46a06c786cf40
SHA256332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a
SHA51260f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47
-
Filesize
531B
MD536d98318ab2b3b2585a30984db328afb
SHA1f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5
SHA256ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7
SHA5126f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a
-
Filesize
499B
MD5f280c5b0e5962c3cc88886d712df31b0
SHA123a6e758c55cc173c0c01fe86b6f6f3998be4d79
SHA25642181dce58104d2dfb1dae4dbbee0bcb8f996d34e051189e412077b46ba84c23
SHA512bcb4bcb9b3aad8a5561b8572a7701eb9017cbb9911066d0088baf08715d70efca806c489c7f8083bddf9749c70e501004ddb60e3236735a136077da881a41bf6
-
Filesize
5KB
MD50bf6670143c38c9b43530bcbb9aeb774
SHA17b68d387f2894b8c4dd577cf93910c05f389fb5c
SHA2561d328445604211e3ecacd4cdae9cf48986e94919fbcb360a38c7ce12c6f8c6b8
SHA512029e401098c97c0c6e0e685dcd09e5bed42a0ce5ed9ca15fdf37bc67f1ad0c91ea618019c0ad245c0be672c91c1040a0bfe00a386ddd57ff211cac438e8c59b0
-
C:\Users\Admin\AppData\Local\Temp\7zS5505.tmp\[email protected]\bootstrap.js
Filesize2KB
MD5df13f711e20e9c80171846d4f2f7ae06
SHA156d29cda58427efe0e21d3880d39eb1b0ef60bee
SHA2566c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4
SHA5126c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e
-
C:\Users\Admin\AppData\Local\Temp\7zS5505.tmp\[email protected]\chrome.manifest
Filesize35B
MD5746749256c0d80917cc53c9bc78f4b33
SHA177f54661fca7467cab0253d6c3ce37b7f14f829a
SHA256c0a5562833c1bee5deaebfa509916774c9deb7308122011c9d7fb7bf301a6c33
SHA5122a3f0b1b5e623b54e6edf0cf8ac0dfd7619a63914e0b470e93118e8adc4a198c3604bf2935c4aef042dc2751b74d1a38e24c1df6579557007b3add22cecc18d3
-
C:\Users\Admin\AppData\Local\Temp\7zS5505.tmp\[email protected]\content\bg.js
Filesize7KB
MD552b2d1ec9c91480f0ae76f85d4c3e5ec
SHA1c9213ca18ba55d4caa1582692184f430502ab79c
SHA256ec1b0e91d5f466e3c9a0362596b1c885351ca99dc6fedd8ac6f9ab3d5995a93d
SHA512e438f8b1f0ea9219c789b21210d291ce272a4b7d515d42aca3f8f14207bf4a34bccedc3835ef1fd991daf14f47cf2a7a8d632816ec0310803c0fa818ec290fd8
-
C:\Users\Admin\AppData\Local\Temp\7zS5505.tmp\[email protected]\install.rdf
Filesize594B
MD5160bd6dd567076953b421ff4cf4ad2bb
SHA10579b6bdb5653787d883fa7548c255fd0156bf6b
SHA2566352667c0e774d16a743d182a4ef6d2387c20175583e71fdea6ac7cb2cf0f07d
SHA51207d5be6efe9998d8710449550baf7a3d8cf91476a8c613e744c8a8c93d84c3b9c03f490eb899ec800da400cab1d37cd86d64eac4000f0277ad9a2deb95fb06e0