Analysis

  • max time kernel
    35s
  • max time network
    42s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23/11/2022, 23:18

General

  • Target

    59b37138592bc873d8a75d5209c0987dc01033d74221fe2531630fedfd73809c.exe

  • Size

    2.1MB

  • MD5

    9874e492f51083b4d5ce0e5cea170815

  • SHA1

    d826d38acdaab9ed0b0f97f10b0f15eeb1dee252

  • SHA256

    59b37138592bc873d8a75d5209c0987dc01033d74221fe2531630fedfd73809c

  • SHA512

    6106c2b8c258c3206cda69ce9a45bc85ce934692a7ace4b4868af9d55549ecefac44c5897bff66fed21bdea5d3323251e23ffd6d56646c02feba854bcd2b6f32

  • SSDEEP

    49152:h1OslhvaZG1MVEtzijkTvu2x/uw4B8FHFF6k:h1OevaxMziy3B

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 3 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 11 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 8 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\59b37138592bc873d8a75d5209c0987dc01033d74221fe2531630fedfd73809c.exe
    "C:\Users\Admin\AppData\Local\Temp\59b37138592bc873d8a75d5209c0987dc01033d74221fe2531630fedfd73809c.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:364
    • C:\Users\Admin\AppData\Local\Temp\7zS7A30.tmp\TKxXYIW3r9QPa6f.exe
      .\TKxXYIW3r9QPa6f.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops Chrome extension
      • Installs/modifies Browser Helper Object
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:1812
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32.exe /s "C:\Program Files (x86)\GoSAve\5pDDnPMItXEc4W.x64.dll"
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1376
        • C:\Windows\system32\regsvr32.exe
          /s "C:\Program Files (x86)\GoSAve\5pDDnPMItXEc4W.x64.dll"
          4⤵
          • Loads dropped DLL
          • Installs/modifies Browser Helper Object
          PID:2036

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\GoSAve\5pDDnPMItXEc4W.dat

    Filesize

    6KB

    MD5

    0c4eae359dadddbc184ca7c3838e5637

    SHA1

    a5a6b5ee1619af6646fe4f4bf31d8bbfb27f71d3

    SHA256

    d26da969f6d673ee7f6962633d59a9b518da793b6ffbeb7702870db803b0667f

    SHA512

    1a7701631a091e4d241f5c7ee8cad1b93596b66a53384c537fb2407d1d7454ced558ccfcf24efa94bcbd8a3fba927e08193b90494133cdda4a11364e0aa6f787

  • C:\Program Files (x86)\GoSAve\5pDDnPMItXEc4W.x64.dll

    Filesize

    695KB

    MD5

    2af06e7424e4f53fa8ee2b8daf4cdaa3

    SHA1

    0a09aa095e38211b8fc512d2e9f8f7cf12159a19

    SHA256

    81f98c4034227951bd4ad5e6d6a823bd112602f3550fd7066a01f16b8c8aca69

    SHA512

    6bcaa8998bd7971f41bebc8433be949cf48d98c0eb70c643b7b7a1b50d2b4cf66412efb170684f36f1987c1992ba88350f815ea18a3cf50caf8ce97bbb961b16

  • C:\Users\Admin\AppData\Local\Temp\7zS7A30.tmp\5pDDnPMItXEc4W.dll

    Filesize

    618KB

    MD5

    f180a95d8673cd01ce4af0ff678fa099

    SHA1

    8592fe958436e14ef9ace437ac4445ecca22e35e

    SHA256

    d40aa49822621713e0f79f6c9a187468251fc22559cb1bbd6b5f71a94819eeb7

    SHA512

    3dda5f3133df4c00c03d8b3fb539b37e2e6b26d0384d3674cefa9595136f9eaa4b9d21c0e806a9ec3cfadfb782a30e344145abbf87bca813de056f84c6fb13c9

  • C:\Users\Admin\AppData\Local\Temp\7zS7A30.tmp\5pDDnPMItXEc4W.tlb

    Filesize

    3KB

    MD5

    8af6f42a5b16ced04702514d47052053

    SHA1

    f06e43c9710e27b38063652217874f6fc8515ea0

    SHA256

    0fc752f18e2f21a6d0b45fb9769deefe70d4690e72225037a37d1dc0553ae8ed

    SHA512

    2d1fedf6693f0347d9265436fbc17515fa9a904db54170181ca7a6d5c64a4928494a20a1eb489d646602ed2769e570bfb5835bffd241a53a8fe64d5767b9234b

  • C:\Users\Admin\AppData\Local\Temp\7zS7A30.tmp\5pDDnPMItXEc4W.x64.dll

    Filesize

    695KB

    MD5

    2af06e7424e4f53fa8ee2b8daf4cdaa3

    SHA1

    0a09aa095e38211b8fc512d2e9f8f7cf12159a19

    SHA256

    81f98c4034227951bd4ad5e6d6a823bd112602f3550fd7066a01f16b8c8aca69

    SHA512

    6bcaa8998bd7971f41bebc8433be949cf48d98c0eb70c643b7b7a1b50d2b4cf66412efb170684f36f1987c1992ba88350f815ea18a3cf50caf8ce97bbb961b16

  • C:\Users\Admin\AppData\Local\Temp\7zS7A30.tmp\TKxXYIW3r9QPa6f.dat

    Filesize

    6KB

    MD5

    0c4eae359dadddbc184ca7c3838e5637

    SHA1

    a5a6b5ee1619af6646fe4f4bf31d8bbfb27f71d3

    SHA256

    d26da969f6d673ee7f6962633d59a9b518da793b6ffbeb7702870db803b0667f

    SHA512

    1a7701631a091e4d241f5c7ee8cad1b93596b66a53384c537fb2407d1d7454ced558ccfcf24efa94bcbd8a3fba927e08193b90494133cdda4a11364e0aa6f787

  • C:\Users\Admin\AppData\Local\Temp\7zS7A30.tmp\TKxXYIW3r9QPa6f.exe

    Filesize

    634KB

    MD5

    bd1503d4eaae5e7f2a8cdbd9a88ec02a

    SHA1

    730280a7839bb46bdeeaa47797d926f8d57e1da1

    SHA256

    724380928512fc5261d5f42e64f7705fcdeae1410f24a8ec6b0a2ba783675cb4

    SHA512

    0dc06ce8e78f6b0ebbe65723791ea4ffde8a9d55534dda1b02e81f1a109fce77f26e4bdfb9fd18b5ca9f4d9ff2454e6b05eca325539148512f762b5d2f225c7b

  • C:\Users\Admin\AppData\Local\Temp\7zS7A30.tmp\TKxXYIW3r9QPa6f.exe

    Filesize

    634KB

    MD5

    bd1503d4eaae5e7f2a8cdbd9a88ec02a

    SHA1

    730280a7839bb46bdeeaa47797d926f8d57e1da1

    SHA256

    724380928512fc5261d5f42e64f7705fcdeae1410f24a8ec6b0a2ba783675cb4

    SHA512

    0dc06ce8e78f6b0ebbe65723791ea4ffde8a9d55534dda1b02e81f1a109fce77f26e4bdfb9fd18b5ca9f4d9ff2454e6b05eca325539148512f762b5d2f225c7b

  • C:\Users\Admin\AppData\Local\Temp\7zS7A30.tmp\dbinopjebbeekpfdbgehiocepljaodjm\Gz3ht.js

    Filesize

    5KB

    MD5

    152f97d9cdc014113fb14e165d7f6614

    SHA1

    501dfef6f8b1d1cb91582858e63020fd58fc7072

    SHA256

    019ef9a61a0e64a39a257b9f98b23a93f67a67d8af58e78b88a2b079a2133bc5

    SHA512

    51b8b70282f3d32d1226ba82fad572319fcabab5629a39e6f10d88f4ad74b3abee9255e9ddcfe3de3bb083c009f980630f17f54249a89bc5e848d6e17e02589d

  • C:\Users\Admin\AppData\Local\Temp\7zS7A30.tmp\dbinopjebbeekpfdbgehiocepljaodjm\background.html

    Filesize

    142B

    MD5

    58f1e49709892207d3d7211f7a64e93f

    SHA1

    53cddb5588c39e91d7f5ef440324eeecec58230a

    SHA256

    11e6ed21dca3f7d3918692917a6045b9c909ed3c643736efa5e10ce1205abb04

    SHA512

    9cf007a83fbdf9d25f2e97e6c2fb0a76c29751b3f21af32b0ffea671d09f88f22c3919da0b481bb142d6c36e314bd3eceb97f928b404f205445fc79f2173f1ed

  • C:\Users\Admin\AppData\Local\Temp\7zS7A30.tmp\dbinopjebbeekpfdbgehiocepljaodjm\content.js

    Filesize

    144B

    MD5

    fca19198fd8af21016a8b1dec7980002

    SHA1

    fd01a47d14004e17a625efe66cc46a06c786cf40

    SHA256

    332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a

    SHA512

    60f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47

  • C:\Users\Admin\AppData\Local\Temp\7zS7A30.tmp\dbinopjebbeekpfdbgehiocepljaodjm\lsdb.js

    Filesize

    531B

    MD5

    36d98318ab2b3b2585a30984db328afb

    SHA1

    f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5

    SHA256

    ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7

    SHA512

    6f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a

  • C:\Users\Admin\AppData\Local\Temp\7zS7A30.tmp\dbinopjebbeekpfdbgehiocepljaodjm\manifest.json

    Filesize

    498B

    MD5

    5d8b560f900f00e62aa129f1fd677989

    SHA1

    50d03404e935374cada2779f89c33c096ce6fb80

    SHA256

    9427cc79b9bd56a0ce543ab1cbb63264be500e5596b91a387afa5b7bebabcca2

    SHA512

    3ed280bd8c5b377df319c09069efc8f17a873bc0cba878a835b1f61eb684594741538735ff6e43feb938778859aa19b4f9ce5cbaccdca0db1b4b54d6400cb7bc

  • C:\Users\Admin\AppData\Local\Temp\7zS7A30.tmp\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    df13f711e20e9c80171846d4f2f7ae06

    SHA1

    56d29cda58427efe0e21d3880d39eb1b0ef60bee

    SHA256

    6c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4

    SHA512

    6c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e

  • C:\Users\Admin\AppData\Local\Temp\7zS7A30.tmp\[email protected]\chrome.manifest

    Filesize

    35B

    MD5

    de84e543b2b537883b78435df9730ba8

    SHA1

    1be78b3d9eb25758f5bac6e8b439e6ec42c153e0

    SHA256

    dc9cef7c9be4315e79829cce10ab7e120954ccce2ba31ff0b76c29a235c123ae

    SHA512

    11a665909d5623e13c7624482ec826bf6c82c2abe92cdeeed53194dcd13ea90b5d69db73062476409255f95a31abfbd07e2f9a9519e3af3c037ef163beb7117c

  • C:\Users\Admin\AppData\Local\Temp\7zS7A30.tmp\[email protected]\content\bg.js

    Filesize

    7KB

    MD5

    9c96051e9adc4a21a658e1e9c676d144

    SHA1

    5292f5a792a2acfa78df96b180866ca794cf6c4e

    SHA256

    e71f90ce05f7f91197db28761cddf16fe21593b9dc13ff916814a0e0e863294d

    SHA512

    bbe6bd7b5e761c84c70e6cc73dec75fda737cb4c69a12aabd7de32ae995d9ffd07e45ff57b52171320c138785f38ae1fb7b4b60e4bacbac4ee9f6de984a2c07e

  • C:\Users\Admin\AppData\Local\Temp\7zS7A30.tmp\[email protected]\install.rdf

    Filesize

    593B

    MD5

    c208b7d36f5815ffb94d18cabf445b74

    SHA1

    3d5006e67b28234c758e2fa7d91e09f65b78ac44

    SHA256

    ae8e0af35082e352d6eb18191d54f0ec2aebe3b371e89f3798085e36cdb29b39

    SHA512

    45d179b6cfe8797d225d30cb44041bef5a7620f2b21901460d2e9feecc00d664480992c89461c8c321afd4d84825e5773a0607e7ce6d3de997ee128054997069

  • \Program Files (x86)\GoSAve\5pDDnPMItXEc4W.dll

    Filesize

    618KB

    MD5

    f180a95d8673cd01ce4af0ff678fa099

    SHA1

    8592fe958436e14ef9ace437ac4445ecca22e35e

    SHA256

    d40aa49822621713e0f79f6c9a187468251fc22559cb1bbd6b5f71a94819eeb7

    SHA512

    3dda5f3133df4c00c03d8b3fb539b37e2e6b26d0384d3674cefa9595136f9eaa4b9d21c0e806a9ec3cfadfb782a30e344145abbf87bca813de056f84c6fb13c9

  • \Program Files (x86)\GoSAve\5pDDnPMItXEc4W.x64.dll

    Filesize

    695KB

    MD5

    2af06e7424e4f53fa8ee2b8daf4cdaa3

    SHA1

    0a09aa095e38211b8fc512d2e9f8f7cf12159a19

    SHA256

    81f98c4034227951bd4ad5e6d6a823bd112602f3550fd7066a01f16b8c8aca69

    SHA512

    6bcaa8998bd7971f41bebc8433be949cf48d98c0eb70c643b7b7a1b50d2b4cf66412efb170684f36f1987c1992ba88350f815ea18a3cf50caf8ce97bbb961b16

  • \Program Files (x86)\GoSAve\5pDDnPMItXEc4W.x64.dll

    Filesize

    695KB

    MD5

    2af06e7424e4f53fa8ee2b8daf4cdaa3

    SHA1

    0a09aa095e38211b8fc512d2e9f8f7cf12159a19

    SHA256

    81f98c4034227951bd4ad5e6d6a823bd112602f3550fd7066a01f16b8c8aca69

    SHA512

    6bcaa8998bd7971f41bebc8433be949cf48d98c0eb70c643b7b7a1b50d2b4cf66412efb170684f36f1987c1992ba88350f815ea18a3cf50caf8ce97bbb961b16

  • \Users\Admin\AppData\Local\Temp\7zS7A30.tmp\TKxXYIW3r9QPa6f.exe

    Filesize

    634KB

    MD5

    bd1503d4eaae5e7f2a8cdbd9a88ec02a

    SHA1

    730280a7839bb46bdeeaa47797d926f8d57e1da1

    SHA256

    724380928512fc5261d5f42e64f7705fcdeae1410f24a8ec6b0a2ba783675cb4

    SHA512

    0dc06ce8e78f6b0ebbe65723791ea4ffde8a9d55534dda1b02e81f1a109fce77f26e4bdfb9fd18b5ca9f4d9ff2454e6b05eca325539148512f762b5d2f225c7b

  • memory/364-54-0x0000000076681000-0x0000000076683000-memory.dmp

    Filesize

    8KB

  • memory/2036-78-0x000007FEFBD91000-0x000007FEFBD93000-memory.dmp

    Filesize

    8KB