Analysis
-
max time kernel
42s -
max time network
58s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23/11/2022, 23:21
Static task
static1
Behavioral task
behavioral1
Sample
5281b91ec56b2c112ecb72ef797d8e51c7ec14b0c731494e219e6014e5e117f0.exe
Resource
win7-20221111-en
General
-
Target
5281b91ec56b2c112ecb72ef797d8e51c7ec14b0c731494e219e6014e5e117f0.exe
-
Size
2.1MB
-
MD5
d3815b3ef9012a33c7d07a0ebc4293ce
-
SHA1
6ed3b91d215c269170a3588750e0df7f8f0e71d6
-
SHA256
5281b91ec56b2c112ecb72ef797d8e51c7ec14b0c731494e219e6014e5e117f0
-
SHA512
f57eb66f527f97eddfee1978a374a911838195d52f6b03d2e0a496992ea53615c99f1812338edf16ca2774827314e3c4dd7fc8fde7cb8bacbb53dfd5cfb6ed41
-
SSDEEP
49152:h1OsWYIGWkf6jd9YMhKKumq+4oAczj/i6jgvb7GvKS0:h1ORdd9YMhKgq+4fL
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2032 DtG8I1EiARpe5Jk.exe -
Loads dropped DLL 4 IoCs
pid Process 1252 5281b91ec56b2c112ecb72ef797d8e51c7ec14b0c731494e219e6014e5e117f0.exe 2032 DtG8I1EiARpe5Jk.exe 1684 regsvr32.exe 1512 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\golnbjjfadogcenhdoikminjiglidmog\2.0\manifest.json DtG8I1EiARpe5Jk.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\golnbjjfadogcenhdoikminjiglidmog\2.0\manifest.json DtG8I1EiARpe5Jk.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\golnbjjfadogcenhdoikminjiglidmog\2.0\manifest.json DtG8I1EiARpe5Jk.exe -
Installs/modifies Browser Helper Object 2 TTPs 11 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} DtG8I1EiARpe5Jk.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects DtG8I1EiARpe5Jk.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DBC80044-A445-435B-BC74-9C25C1C588A9} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{18DF081C-E8AD-4283-A596-FA578C2EBDC3} DtG8I1EiARpe5Jk.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} DtG8I1EiARpe5Jk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\ DtG8I1EiARpe5Jk.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43} regsvr32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini DtG8I1EiARpe5Jk.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol DtG8I1EiARpe5Jk.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI DtG8I1EiARpe5Jk.exe File opened for modification C:\Windows\System32\GroupPolicy DtG8I1EiARpe5Jk.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files (x86)\GooSeavve\5uRHZyybQ8qYWl.dat DtG8I1EiARpe5Jk.exe File opened for modification C:\Program Files (x86)\GooSeavve\5uRHZyybQ8qYWl.dat DtG8I1EiARpe5Jk.exe File created C:\Program Files (x86)\GooSeavve\5uRHZyybQ8qYWl.x64.dll DtG8I1EiARpe5Jk.exe File opened for modification C:\Program Files (x86)\GooSeavve\5uRHZyybQ8qYWl.x64.dll DtG8I1EiARpe5Jk.exe File created C:\Program Files (x86)\GooSeavve\5uRHZyybQ8qYWl.dll DtG8I1EiARpe5Jk.exe File opened for modification C:\Program Files (x86)\GooSeavve\5uRHZyybQ8qYWl.dll DtG8I1EiARpe5Jk.exe File created C:\Program Files (x86)\GooSeavve\5uRHZyybQ8qYWl.tlb DtG8I1EiARpe5Jk.exe File opened for modification C:\Program Files (x86)\GooSeavve\5uRHZyybQ8qYWl.tlb DtG8I1EiARpe5Jk.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2032 DtG8I1EiARpe5Jk.exe 2032 DtG8I1EiARpe5Jk.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1252 wrote to memory of 2032 1252 5281b91ec56b2c112ecb72ef797d8e51c7ec14b0c731494e219e6014e5e117f0.exe 28 PID 1252 wrote to memory of 2032 1252 5281b91ec56b2c112ecb72ef797d8e51c7ec14b0c731494e219e6014e5e117f0.exe 28 PID 1252 wrote to memory of 2032 1252 5281b91ec56b2c112ecb72ef797d8e51c7ec14b0c731494e219e6014e5e117f0.exe 28 PID 1252 wrote to memory of 2032 1252 5281b91ec56b2c112ecb72ef797d8e51c7ec14b0c731494e219e6014e5e117f0.exe 28 PID 2032 wrote to memory of 1684 2032 DtG8I1EiARpe5Jk.exe 29 PID 2032 wrote to memory of 1684 2032 DtG8I1EiARpe5Jk.exe 29 PID 2032 wrote to memory of 1684 2032 DtG8I1EiARpe5Jk.exe 29 PID 2032 wrote to memory of 1684 2032 DtG8I1EiARpe5Jk.exe 29 PID 2032 wrote to memory of 1684 2032 DtG8I1EiARpe5Jk.exe 29 PID 2032 wrote to memory of 1684 2032 DtG8I1EiARpe5Jk.exe 29 PID 2032 wrote to memory of 1684 2032 DtG8I1EiARpe5Jk.exe 29 PID 1684 wrote to memory of 1512 1684 regsvr32.exe 30 PID 1684 wrote to memory of 1512 1684 regsvr32.exe 30 PID 1684 wrote to memory of 1512 1684 regsvr32.exe 30 PID 1684 wrote to memory of 1512 1684 regsvr32.exe 30 PID 1684 wrote to memory of 1512 1684 regsvr32.exe 30 PID 1684 wrote to memory of 1512 1684 regsvr32.exe 30 PID 1684 wrote to memory of 1512 1684 regsvr32.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\5281b91ec56b2c112ecb72ef797d8e51c7ec14b0c731494e219e6014e5e117f0.exe"C:\Users\Admin\AppData\Local\Temp\5281b91ec56b2c112ecb72ef797d8e51c7ec14b0c731494e219e6014e5e117f0.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\7zSCEE4.tmp\DtG8I1EiARpe5Jk.exe.\DtG8I1EiARpe5Jk.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\GooSeavve\5uRHZyybQ8qYWl.x64.dll"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\GooSeavve\5uRHZyybQ8qYWl.x64.dll"4⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
PID:1512
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD5e9ba009e399dd16b8d83ad0c279008db
SHA1799416b00914140cb1ae75c272774e38a14005ef
SHA256dcbbf7b4ab102e0e05abc93172e3ce28b4380ce5e92bc7f1b3c480c4704e7b7d
SHA5120d11ec46525c36a8cba77d749b6f713de2dd0c3645c72da6ca462c1c6e47eec50cfde6f1edf7a7d581d02088f35121e7e7909a9791da037d2dada81d5f464cd4
-
Filesize
700KB
MD5401087ab67c6d917bf08d82f011d9eee
SHA1d13dbf241d214d6036f8c6276e0e305fc2ac2b8a
SHA256fada9f28483ab94341359011d5ab92a6fa2418d010aa3eb1c485c19db15e62f5
SHA5124d952fc0a2ef968997d62d901a731193105da2f4541abf4eb3e5c99e247edc7ffb15ae55a8d0e5d228ae704b0a7ff7dca24e14312f778896d834971e7f3d8af6
-
Filesize
623KB
MD5103866fff4628ada4be6e5235b2ebf5d
SHA186ca018b33c7cdb953371ee1e290313b9a54a251
SHA256963728f71b4ecee9380a18f5bbc6930256be6018a8087a9964f98ba3e17b7a7c
SHA5122a8f9ce8854bab77b801eb146934e267de3cca83727a8a7c13885b41c75a0b563fdd0cb1683f78057fc6833b22d9d14c5ef0d3707753293d59d4b61f7a9744c3
-
Filesize
3KB
MD53c920faafd032eeda08e4166860d4318
SHA126451ee3659c4a217f42ebd07f254679ab452f3a
SHA2563377d0af1044505271c64fc342e22a7a24b757e5471657f656ac743373e22857
SHA512327668001f94842eee3ff1dc44c70ddca5da3a0bb49aeea6b3162608b07496456e78bcb3de0462e5e375b349e813f13fd02e61b9e389b1d954cea2628c3c4a6e
-
Filesize
700KB
MD5401087ab67c6d917bf08d82f011d9eee
SHA1d13dbf241d214d6036f8c6276e0e305fc2ac2b8a
SHA256fada9f28483ab94341359011d5ab92a6fa2418d010aa3eb1c485c19db15e62f5
SHA5124d952fc0a2ef968997d62d901a731193105da2f4541abf4eb3e5c99e247edc7ffb15ae55a8d0e5d228ae704b0a7ff7dca24e14312f778896d834971e7f3d8af6
-
Filesize
7KB
MD5e9ba009e399dd16b8d83ad0c279008db
SHA1799416b00914140cb1ae75c272774e38a14005ef
SHA256dcbbf7b4ab102e0e05abc93172e3ce28b4380ce5e92bc7f1b3c480c4704e7b7d
SHA5120d11ec46525c36a8cba77d749b6f713de2dd0c3645c72da6ca462c1c6e47eec50cfde6f1edf7a7d581d02088f35121e7e7909a9791da037d2dada81d5f464cd4
-
Filesize
629KB
MD5150107c0a55484355ce5881240cca669
SHA135d2f6723091fc4af5c4a00645b6b0f43efd4a06
SHA256c422b33bee8c0b6664a7462093734aea98026ebf7cc9dc65589572213f576f0e
SHA512eb189951a9a89c54c8d7b3a9fcfb97777bd55088186814597ba13e9f985f846e313b5fcd1566de56060ef8cdfb815ed2a77f5c41c02d1c666c47691b1c0aba04
-
Filesize
629KB
MD5150107c0a55484355ce5881240cca669
SHA135d2f6723091fc4af5c4a00645b6b0f43efd4a06
SHA256c422b33bee8c0b6664a7462093734aea98026ebf7cc9dc65589572213f576f0e
SHA512eb189951a9a89c54c8d7b3a9fcfb97777bd55088186814597ba13e9f985f846e313b5fcd1566de56060ef8cdfb815ed2a77f5c41c02d1c666c47691b1c0aba04
-
Filesize
6KB
MD5fb6fdfd8010392720ee92f35307edf9e
SHA1690d6bec331d3ada25a8faf9838c1b573d025381
SHA256551bf1624448e3cc9503e48f308cb7726b286d9be5166421260191b96abe59cc
SHA5120f12a9373c0d92160bfef8e47f1ce49b7c46318f2909c76bb0793e7da9f82194f169454accddddfc14e552cf69e15a286b33083ad34eea8bc1a8c58b1bdde7da
-
Filesize
141B
MD5948cfeaa91ac4e901eca7f537cc6bc15
SHA1d59cdd2d9ffaad18cc9e32d39af2325534352ed4
SHA256b64819bbeb4980fb1f0bdfd869b245d708e5feb0f859d461dff8ad00fb14d5fb
SHA51215106654bf4c0d52d2de9eb4e93ba186714ce26aff8bec4a754fcc175a0efdc6e486ae7a34ae6053bef3179bb2ffec2e146ab10f7b8b8d4ed24ffaecbc4e3a61
-
Filesize
144B
MD5fca19198fd8af21016a8b1dec7980002
SHA1fd01a47d14004e17a625efe66cc46a06c786cf40
SHA256332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a
SHA51260f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47
-
Filesize
531B
MD536d98318ab2b3b2585a30984db328afb
SHA1f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5
SHA256ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7
SHA5126f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a
-
Filesize
501B
MD520572081519d5e0955744441438bd212
SHA1cd285afde68bacf708770b94bda7c35b14c79730
SHA2560d8911bdb85e3c5fdaafbbcbd6c9721e64887d49c0a6ad3415649009ec63ee7d
SHA5124bb973132720ee465daec1ee6e8db0dffb07937487783ea95b60b98597b9e815168ed66f5fba4745cf4a5920c688582444a9144445d63347be17bc8c219c172c
-
C:\Users\Admin\AppData\Local\Temp\7zSCEE4.tmp\[email protected]\bootstrap.js
Filesize2KB
MD5df13f711e20e9c80171846d4f2f7ae06
SHA156d29cda58427efe0e21d3880d39eb1b0ef60bee
SHA2566c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4
SHA5126c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e
-
C:\Users\Admin\AppData\Local\Temp\7zSCEE4.tmp\[email protected]\chrome.manifest
Filesize35B
MD5f765cabde9b8b71a0692a57fddfac993
SHA114c5946e7db8ccc413bb101a964233a76d2daf2a
SHA256632ae69a7b40a8ef38d2cab471f3b9402e634895393b5e3ce7d81ea2356694f8
SHA5127ceff139e4cbac21163dc33160349b003fb5fc2f7cabd8157e5f5a40fb091be20ed639867adac9f17fcde2242386b069d81e066282b5e91c2d5a69ff8c948b1c
-
C:\Users\Admin\AppData\Local\Temp\7zSCEE4.tmp\[email protected]\content\bg.js
Filesize9KB
MD5eb6f97854f89eacadfd6798f91045851
SHA1e73336ab5cbf6ae8165f98dcd780b3fff4ab8f4d
SHA256a7ef4f634a6f5c168735e79386aa1ce0763678c0a307e414c7cde5076dfbe1f2
SHA512109e546c0cce9fed3d6282969be8a9712ba2e0fc87296663542a342929c3d030599614e66dd4ffc4f08941e7356df6179642399449c9a6a4010a75de908c49f0
-
C:\Users\Admin\AppData\Local\Temp\7zSCEE4.tmp\[email protected]\install.rdf
Filesize601B
MD5670ec13d8e2081c334fecbb28f6fdd62
SHA1208b3c99d0a95ded1dfa4feb2bf6f7129cdbdab0
SHA256c768a787be58fb10def4d552e765c48691a9310ca210f2638cb0f9a45e39392c
SHA512a07182197de33858ecec925b861609a01b1b170371f07c47ad66a98bca8275675363443309f27fd91dafc1c3847198d66538a2f829ef2c66f6e7f83989546bca
-
Filesize
623KB
MD5103866fff4628ada4be6e5235b2ebf5d
SHA186ca018b33c7cdb953371ee1e290313b9a54a251
SHA256963728f71b4ecee9380a18f5bbc6930256be6018a8087a9964f98ba3e17b7a7c
SHA5122a8f9ce8854bab77b801eb146934e267de3cca83727a8a7c13885b41c75a0b563fdd0cb1683f78057fc6833b22d9d14c5ef0d3707753293d59d4b61f7a9744c3
-
Filesize
700KB
MD5401087ab67c6d917bf08d82f011d9eee
SHA1d13dbf241d214d6036f8c6276e0e305fc2ac2b8a
SHA256fada9f28483ab94341359011d5ab92a6fa2418d010aa3eb1c485c19db15e62f5
SHA5124d952fc0a2ef968997d62d901a731193105da2f4541abf4eb3e5c99e247edc7ffb15ae55a8d0e5d228ae704b0a7ff7dca24e14312f778896d834971e7f3d8af6
-
Filesize
700KB
MD5401087ab67c6d917bf08d82f011d9eee
SHA1d13dbf241d214d6036f8c6276e0e305fc2ac2b8a
SHA256fada9f28483ab94341359011d5ab92a6fa2418d010aa3eb1c485c19db15e62f5
SHA5124d952fc0a2ef968997d62d901a731193105da2f4541abf4eb3e5c99e247edc7ffb15ae55a8d0e5d228ae704b0a7ff7dca24e14312f778896d834971e7f3d8af6
-
Filesize
629KB
MD5150107c0a55484355ce5881240cca669
SHA135d2f6723091fc4af5c4a00645b6b0f43efd4a06
SHA256c422b33bee8c0b6664a7462093734aea98026ebf7cc9dc65589572213f576f0e
SHA512eb189951a9a89c54c8d7b3a9fcfb97777bd55088186814597ba13e9f985f846e313b5fcd1566de56060ef8cdfb815ed2a77f5c41c02d1c666c47691b1c0aba04