Analysis
-
max time kernel
207s -
max time network
208s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 23:46
Static task
static1
Behavioral task
behavioral1
Sample
0e3bf40951b7e73f46670ca0aff6537dacf2642716b9c456716e865af0afdb66.exe
Resource
win7-20221111-en
General
-
Target
0e3bf40951b7e73f46670ca0aff6537dacf2642716b9c456716e865af0afdb66.exe
-
Size
2.1MB
-
MD5
7742763dbabebe6a87b5440ef38281da
-
SHA1
e88ad90a6196d1aba779d5430b8dab59519c92bc
-
SHA256
0e3bf40951b7e73f46670ca0aff6537dacf2642716b9c456716e865af0afdb66
-
SHA512
af474e1d775d1a2b616ebbd34fbc9e5f2f950487d8256783565257e67db5584f45c18a612185bd4d9a1309066392b0c23bbe22c2c89cdf13999dcd6d3dc21574
-
SSDEEP
49152:h1OsmYIGWkf6jd9YMhKKumq+4oAczj/i6jgvb7GvKSS:h1OBdd9YMhKgq+4fD
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4296 wJjc5RNQnAeeUqC.exe -
Loads dropped DLL 3 IoCs
pid Process 4296 wJjc5RNQnAeeUqC.exe 1684 regsvr32.exe 4912 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 5 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\mkoimjoanmlhfblfkkimaphcpfnafbao\2.0\manifest.json wJjc5RNQnAeeUqC.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\mkoimjoanmlhfblfkkimaphcpfnafbao\2.0\manifest.json wJjc5RNQnAeeUqC.exe File created C:\Users\DefaultAccount\AppData\Local\Google\Chrome\User Data\Default\Extensions\mkoimjoanmlhfblfkkimaphcpfnafbao\2.0\manifest.json wJjc5RNQnAeeUqC.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\mkoimjoanmlhfblfkkimaphcpfnafbao\2.0\manifest.json wJjc5RNQnAeeUqC.exe File created C:\Users\WDAGUtilityAccount\AppData\Local\Google\Chrome\User Data\Default\Extensions\mkoimjoanmlhfblfkkimaphcpfnafbao\2.0\manifest.json wJjc5RNQnAeeUqC.exe -
Installs/modifies Browser Helper Object 2 TTPs 9 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects wJjc5RNQnAeeUqC.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ wJjc5RNQnAeeUqC.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} wJjc5RNQnAeeUqC.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA} wJjc5RNQnAeeUqC.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{DBC80044-A445-435B-BC74-9C25C1C588A9} regsvr32.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files (x86)\GaoSavE\bXzwCqUNzPBzW2.x64.dll wJjc5RNQnAeeUqC.exe File opened for modification C:\Program Files (x86)\GaoSavE\bXzwCqUNzPBzW2.x64.dll wJjc5RNQnAeeUqC.exe File created C:\Program Files (x86)\GaoSavE\bXzwCqUNzPBzW2.dll wJjc5RNQnAeeUqC.exe File opened for modification C:\Program Files (x86)\GaoSavE\bXzwCqUNzPBzW2.dll wJjc5RNQnAeeUqC.exe File created C:\Program Files (x86)\GaoSavE\bXzwCqUNzPBzW2.tlb wJjc5RNQnAeeUqC.exe File opened for modification C:\Program Files (x86)\GaoSavE\bXzwCqUNzPBzW2.tlb wJjc5RNQnAeeUqC.exe File created C:\Program Files (x86)\GaoSavE\bXzwCqUNzPBzW2.dat wJjc5RNQnAeeUqC.exe File opened for modification C:\Program Files (x86)\GaoSavE\bXzwCqUNzPBzW2.dat wJjc5RNQnAeeUqC.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3852 wrote to memory of 4296 3852 0e3bf40951b7e73f46670ca0aff6537dacf2642716b9c456716e865af0afdb66.exe 82 PID 3852 wrote to memory of 4296 3852 0e3bf40951b7e73f46670ca0aff6537dacf2642716b9c456716e865af0afdb66.exe 82 PID 3852 wrote to memory of 4296 3852 0e3bf40951b7e73f46670ca0aff6537dacf2642716b9c456716e865af0afdb66.exe 82 PID 4296 wrote to memory of 1684 4296 wJjc5RNQnAeeUqC.exe 87 PID 4296 wrote to memory of 1684 4296 wJjc5RNQnAeeUqC.exe 87 PID 4296 wrote to memory of 1684 4296 wJjc5RNQnAeeUqC.exe 87 PID 1684 wrote to memory of 4912 1684 regsvr32.exe 88 PID 1684 wrote to memory of 4912 1684 regsvr32.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e3bf40951b7e73f46670ca0aff6537dacf2642716b9c456716e865af0afdb66.exe"C:\Users\Admin\AppData\Local\Temp\0e3bf40951b7e73f46670ca0aff6537dacf2642716b9c456716e865af0afdb66.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Users\Admin\AppData\Local\Temp\7zS6E3B.tmp\wJjc5RNQnAeeUqC.exe.\wJjc5RNQnAeeUqC.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\GaoSavE\bXzwCqUNzPBzW2.x64.dll"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\GaoSavE\bXzwCqUNzPBzW2.x64.dll"4⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
PID:4912
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD555a918508cfd051c367a85301e2caa8a
SHA1d9326ffdb79024952ea10edfab72ef136945aab0
SHA256458f017f7978e3b030d989fb228b98062329c7c8e3ff60f4428cf6cbc201de9d
SHA512379d11a4c380e22c65901f0beb9eca01196fe082979813f936aa3f3de51a0192d55dcc8f7549dba9a71a9c907edba3a0637979f2472dd6139286be14f204e999
-
Filesize
623KB
MD5103866fff4628ada4be6e5235b2ebf5d
SHA186ca018b33c7cdb953371ee1e290313b9a54a251
SHA256963728f71b4ecee9380a18f5bbc6930256be6018a8087a9964f98ba3e17b7a7c
SHA5122a8f9ce8854bab77b801eb146934e267de3cca83727a8a7c13885b41c75a0b563fdd0cb1683f78057fc6833b22d9d14c5ef0d3707753293d59d4b61f7a9744c3
-
Filesize
700KB
MD5401087ab67c6d917bf08d82f011d9eee
SHA1d13dbf241d214d6036f8c6276e0e305fc2ac2b8a
SHA256fada9f28483ab94341359011d5ab92a6fa2418d010aa3eb1c485c19db15e62f5
SHA5124d952fc0a2ef968997d62d901a731193105da2f4541abf4eb3e5c99e247edc7ffb15ae55a8d0e5d228ae704b0a7ff7dca24e14312f778896d834971e7f3d8af6
-
Filesize
700KB
MD5401087ab67c6d917bf08d82f011d9eee
SHA1d13dbf241d214d6036f8c6276e0e305fc2ac2b8a
SHA256fada9f28483ab94341359011d5ab92a6fa2418d010aa3eb1c485c19db15e62f5
SHA5124d952fc0a2ef968997d62d901a731193105da2f4541abf4eb3e5c99e247edc7ffb15ae55a8d0e5d228ae704b0a7ff7dca24e14312f778896d834971e7f3d8af6
-
Filesize
700KB
MD5401087ab67c6d917bf08d82f011d9eee
SHA1d13dbf241d214d6036f8c6276e0e305fc2ac2b8a
SHA256fada9f28483ab94341359011d5ab92a6fa2418d010aa3eb1c485c19db15e62f5
SHA5124d952fc0a2ef968997d62d901a731193105da2f4541abf4eb3e5c99e247edc7ffb15ae55a8d0e5d228ae704b0a7ff7dca24e14312f778896d834971e7f3d8af6
-
C:\Users\Admin\AppData\Local\Temp\7zS6E3B.tmp\[email protected]\bootstrap.js
Filesize2KB
MD5df13f711e20e9c80171846d4f2f7ae06
SHA156d29cda58427efe0e21d3880d39eb1b0ef60bee
SHA2566c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4
SHA5126c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e
-
C:\Users\Admin\AppData\Local\Temp\7zS6E3B.tmp\[email protected]\chrome.manifest
Filesize35B
MD54f96e42856f4923df23a61203d27dcbf
SHA19286b30495fca299b7c9125d16b67c51b7b204ff
SHA256768840697eb53dc5638c184cf5cb973c7138d64e0b60be85a71c681a824ec94a
SHA5126ab30da144039662b8aa796359ae1ae285874df3d45374da019c7251680df62780a8e44da7c6691a081b22bf7e5ecef118f6c449ccfa4a51f8c1f5e6bafafe3e
-
C:\Users\Admin\AppData\Local\Temp\7zS6E3B.tmp\[email protected]\content\bg.js
Filesize7KB
MD5eaa5d20a27c57ff9c467e2c1053aa610
SHA1bfd67c75c6e31b874e0041c02874017d7493fdc1
SHA2566060f445f0f181db5f9424e4f6f2323bc7feea5455f43f31ddab53ddf1b8abbb
SHA512414fa3ce4d71d8793dc60bacf220b4e1cf79dfb41548349c941c019dde6732c3adb91d8fe64ccc3de2b6f7ebd94918098a60ad9ead260d2eb12737f3be2d4a5f
-
C:\Users\Admin\AppData\Local\Temp\7zS6E3B.tmp\[email protected]\install.rdf
Filesize598B
MD562eb71e6190d6cd7bc9373e5cc6584bd
SHA1ac73bd895ed9ae601aecc886e330245cab5b3390
SHA256a6ba2f96a5ebd23d64ac29ef38f82bf40db0b479f7a06a8e92507c0b598c24b2
SHA512b684b9b9526972c88c0d88c41cdd8a2f1e8b737cfca6f4fed107b2851fdc5a94ad6fa5a3c4884c28a526ce1b06daa4ad0b9255f16242941921d0dd3b37cb447a
-
Filesize
623KB
MD5103866fff4628ada4be6e5235b2ebf5d
SHA186ca018b33c7cdb953371ee1e290313b9a54a251
SHA256963728f71b4ecee9380a18f5bbc6930256be6018a8087a9964f98ba3e17b7a7c
SHA5122a8f9ce8854bab77b801eb146934e267de3cca83727a8a7c13885b41c75a0b563fdd0cb1683f78057fc6833b22d9d14c5ef0d3707753293d59d4b61f7a9744c3
-
Filesize
3KB
MD53c920faafd032eeda08e4166860d4318
SHA126451ee3659c4a217f42ebd07f254679ab452f3a
SHA2563377d0af1044505271c64fc342e22a7a24b757e5471657f656ac743373e22857
SHA512327668001f94842eee3ff1dc44c70ddca5da3a0bb49aeea6b3162608b07496456e78bcb3de0462e5e375b349e813f13fd02e61b9e389b1d954cea2628c3c4a6e
-
Filesize
700KB
MD5401087ab67c6d917bf08d82f011d9eee
SHA1d13dbf241d214d6036f8c6276e0e305fc2ac2b8a
SHA256fada9f28483ab94341359011d5ab92a6fa2418d010aa3eb1c485c19db15e62f5
SHA5124d952fc0a2ef968997d62d901a731193105da2f4541abf4eb3e5c99e247edc7ffb15ae55a8d0e5d228ae704b0a7ff7dca24e14312f778896d834971e7f3d8af6
-
Filesize
5KB
MD50ec5c62f9e5e891773bd52f103e61a5d
SHA1155c62007e0abe026675c259c9b24c2535daecac
SHA25612ac78a28faa58f1173b7a7571e31fcd82cc939eca2b3efb9eee5fb0a0121c8b
SHA51284705017e79adcc745af2fe91ba7b70ac7d97a361fea8aa0ee98f0506bc5a9d610dc3bebf67dd68b8b19fe213caec5f8f67d0329e14722fb1a1aa455acf9b066
-
Filesize
147B
MD572d9db85539f8179a270c69f45c1ebbf
SHA15154bfb70665ad98b08d8b8c8d6bcc537d9763f8
SHA256b92e2f4be5cc9515b77b16760c4a4aafa3da7a25b3ae5957531da286f231d0a3
SHA512962b7c11f76e66c5c7533748e9ca01e0e7a36e524ca6dd57fe07d8c37fe3b65ef688c441df2b0f064673476e3b2ff1bd0c3b7fc5bc68a817bee74df1efcfe088
-
Filesize
144B
MD5fca19198fd8af21016a8b1dec7980002
SHA1fd01a47d14004e17a625efe66cc46a06c786cf40
SHA256332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a
SHA51260f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47
-
Filesize
531B
MD536d98318ab2b3b2585a30984db328afb
SHA1f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5
SHA256ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7
SHA5126f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a
-
Filesize
499B
MD539df6273d4716eb35fd63f3c78a87c00
SHA11a0cebf00841d2ddd862085aa77ca1b7f847d7e3
SHA2562b835696a33325e5b9aafb0fea99976285ae6e13841cbf3ec81c6553cdef858f
SHA512695e0b83651752c4f2415da9fcda93b3629374cd61cf5de5e7a336864bf021ef3efe9214667dc85f5b9426dd6e517338d49e170c3063f7535e7f3be0d96b70e0
-
Filesize
6KB
MD555a918508cfd051c367a85301e2caa8a
SHA1d9326ffdb79024952ea10edfab72ef136945aab0
SHA256458f017f7978e3b030d989fb228b98062329c7c8e3ff60f4428cf6cbc201de9d
SHA512379d11a4c380e22c65901f0beb9eca01196fe082979813f936aa3f3de51a0192d55dcc8f7549dba9a71a9c907edba3a0637979f2472dd6139286be14f204e999
-
Filesize
629KB
MD5150107c0a55484355ce5881240cca669
SHA135d2f6723091fc4af5c4a00645b6b0f43efd4a06
SHA256c422b33bee8c0b6664a7462093734aea98026ebf7cc9dc65589572213f576f0e
SHA512eb189951a9a89c54c8d7b3a9fcfb97777bd55088186814597ba13e9f985f846e313b5fcd1566de56060ef8cdfb815ed2a77f5c41c02d1c666c47691b1c0aba04
-
Filesize
629KB
MD5150107c0a55484355ce5881240cca669
SHA135d2f6723091fc4af5c4a00645b6b0f43efd4a06
SHA256c422b33bee8c0b6664a7462093734aea98026ebf7cc9dc65589572213f576f0e
SHA512eb189951a9a89c54c8d7b3a9fcfb97777bd55088186814597ba13e9f985f846e313b5fcd1566de56060ef8cdfb815ed2a77f5c41c02d1c666c47691b1c0aba04