Analysis

  • max time kernel
    207s
  • max time network
    208s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 23:46

General

  • Target

    0e3bf40951b7e73f46670ca0aff6537dacf2642716b9c456716e865af0afdb66.exe

  • Size

    2.1MB

  • MD5

    7742763dbabebe6a87b5440ef38281da

  • SHA1

    e88ad90a6196d1aba779d5430b8dab59519c92bc

  • SHA256

    0e3bf40951b7e73f46670ca0aff6537dacf2642716b9c456716e865af0afdb66

  • SHA512

    af474e1d775d1a2b616ebbd34fbc9e5f2f950487d8256783565257e67db5584f45c18a612185bd4d9a1309066392b0c23bbe22c2c89cdf13999dcd6d3dc21574

  • SSDEEP

    49152:h1OsmYIGWkf6jd9YMhKKumq+4oAczj/i6jgvb7GvKSS:h1OBdd9YMhKgq+4fD

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 5 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 9 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 8 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e3bf40951b7e73f46670ca0aff6537dacf2642716b9c456716e865af0afdb66.exe
    "C:\Users\Admin\AppData\Local\Temp\0e3bf40951b7e73f46670ca0aff6537dacf2642716b9c456716e865af0afdb66.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3852
    • C:\Users\Admin\AppData\Local\Temp\7zS6E3B.tmp\wJjc5RNQnAeeUqC.exe
      .\wJjc5RNQnAeeUqC.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops Chrome extension
      • Installs/modifies Browser Helper Object
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:4296
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32.exe /s "C:\Program Files (x86)\GaoSavE\bXzwCqUNzPBzW2.x64.dll"
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1684
        • C:\Windows\system32\regsvr32.exe
          /s "C:\Program Files (x86)\GaoSavE\bXzwCqUNzPBzW2.x64.dll"
          4⤵
          • Loads dropped DLL
          • Installs/modifies Browser Helper Object
          PID:4912

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\GaoSavE\bXzwCqUNzPBzW2.dat

    Filesize

    6KB

    MD5

    55a918508cfd051c367a85301e2caa8a

    SHA1

    d9326ffdb79024952ea10edfab72ef136945aab0

    SHA256

    458f017f7978e3b030d989fb228b98062329c7c8e3ff60f4428cf6cbc201de9d

    SHA512

    379d11a4c380e22c65901f0beb9eca01196fe082979813f936aa3f3de51a0192d55dcc8f7549dba9a71a9c907edba3a0637979f2472dd6139286be14f204e999

  • C:\Program Files (x86)\GaoSavE\bXzwCqUNzPBzW2.dll

    Filesize

    623KB

    MD5

    103866fff4628ada4be6e5235b2ebf5d

    SHA1

    86ca018b33c7cdb953371ee1e290313b9a54a251

    SHA256

    963728f71b4ecee9380a18f5bbc6930256be6018a8087a9964f98ba3e17b7a7c

    SHA512

    2a8f9ce8854bab77b801eb146934e267de3cca83727a8a7c13885b41c75a0b563fdd0cb1683f78057fc6833b22d9d14c5ef0d3707753293d59d4b61f7a9744c3

  • C:\Program Files (x86)\GaoSavE\bXzwCqUNzPBzW2.x64.dll

    Filesize

    700KB

    MD5

    401087ab67c6d917bf08d82f011d9eee

    SHA1

    d13dbf241d214d6036f8c6276e0e305fc2ac2b8a

    SHA256

    fada9f28483ab94341359011d5ab92a6fa2418d010aa3eb1c485c19db15e62f5

    SHA512

    4d952fc0a2ef968997d62d901a731193105da2f4541abf4eb3e5c99e247edc7ffb15ae55a8d0e5d228ae704b0a7ff7dca24e14312f778896d834971e7f3d8af6

  • C:\Program Files (x86)\GaoSavE\bXzwCqUNzPBzW2.x64.dll

    Filesize

    700KB

    MD5

    401087ab67c6d917bf08d82f011d9eee

    SHA1

    d13dbf241d214d6036f8c6276e0e305fc2ac2b8a

    SHA256

    fada9f28483ab94341359011d5ab92a6fa2418d010aa3eb1c485c19db15e62f5

    SHA512

    4d952fc0a2ef968997d62d901a731193105da2f4541abf4eb3e5c99e247edc7ffb15ae55a8d0e5d228ae704b0a7ff7dca24e14312f778896d834971e7f3d8af6

  • C:\Program Files (x86)\GaoSavE\bXzwCqUNzPBzW2.x64.dll

    Filesize

    700KB

    MD5

    401087ab67c6d917bf08d82f011d9eee

    SHA1

    d13dbf241d214d6036f8c6276e0e305fc2ac2b8a

    SHA256

    fada9f28483ab94341359011d5ab92a6fa2418d010aa3eb1c485c19db15e62f5

    SHA512

    4d952fc0a2ef968997d62d901a731193105da2f4541abf4eb3e5c99e247edc7ffb15ae55a8d0e5d228ae704b0a7ff7dca24e14312f778896d834971e7f3d8af6

  • C:\Users\Admin\AppData\Local\Temp\7zS6E3B.tmp\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    df13f711e20e9c80171846d4f2f7ae06

    SHA1

    56d29cda58427efe0e21d3880d39eb1b0ef60bee

    SHA256

    6c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4

    SHA512

    6c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e

  • C:\Users\Admin\AppData\Local\Temp\7zS6E3B.tmp\[email protected]\chrome.manifest

    Filesize

    35B

    MD5

    4f96e42856f4923df23a61203d27dcbf

    SHA1

    9286b30495fca299b7c9125d16b67c51b7b204ff

    SHA256

    768840697eb53dc5638c184cf5cb973c7138d64e0b60be85a71c681a824ec94a

    SHA512

    6ab30da144039662b8aa796359ae1ae285874df3d45374da019c7251680df62780a8e44da7c6691a081b22bf7e5ecef118f6c449ccfa4a51f8c1f5e6bafafe3e

  • C:\Users\Admin\AppData\Local\Temp\7zS6E3B.tmp\[email protected]\content\bg.js

    Filesize

    7KB

    MD5

    eaa5d20a27c57ff9c467e2c1053aa610

    SHA1

    bfd67c75c6e31b874e0041c02874017d7493fdc1

    SHA256

    6060f445f0f181db5f9424e4f6f2323bc7feea5455f43f31ddab53ddf1b8abbb

    SHA512

    414fa3ce4d71d8793dc60bacf220b4e1cf79dfb41548349c941c019dde6732c3adb91d8fe64ccc3de2b6f7ebd94918098a60ad9ead260d2eb12737f3be2d4a5f

  • C:\Users\Admin\AppData\Local\Temp\7zS6E3B.tmp\[email protected]\install.rdf

    Filesize

    598B

    MD5

    62eb71e6190d6cd7bc9373e5cc6584bd

    SHA1

    ac73bd895ed9ae601aecc886e330245cab5b3390

    SHA256

    a6ba2f96a5ebd23d64ac29ef38f82bf40db0b479f7a06a8e92507c0b598c24b2

    SHA512

    b684b9b9526972c88c0d88c41cdd8a2f1e8b737cfca6f4fed107b2851fdc5a94ad6fa5a3c4884c28a526ce1b06daa4ad0b9255f16242941921d0dd3b37cb447a

  • C:\Users\Admin\AppData\Local\Temp\7zS6E3B.tmp\bXzwCqUNzPBzW2.dll

    Filesize

    623KB

    MD5

    103866fff4628ada4be6e5235b2ebf5d

    SHA1

    86ca018b33c7cdb953371ee1e290313b9a54a251

    SHA256

    963728f71b4ecee9380a18f5bbc6930256be6018a8087a9964f98ba3e17b7a7c

    SHA512

    2a8f9ce8854bab77b801eb146934e267de3cca83727a8a7c13885b41c75a0b563fdd0cb1683f78057fc6833b22d9d14c5ef0d3707753293d59d4b61f7a9744c3

  • C:\Users\Admin\AppData\Local\Temp\7zS6E3B.tmp\bXzwCqUNzPBzW2.tlb

    Filesize

    3KB

    MD5

    3c920faafd032eeda08e4166860d4318

    SHA1

    26451ee3659c4a217f42ebd07f254679ab452f3a

    SHA256

    3377d0af1044505271c64fc342e22a7a24b757e5471657f656ac743373e22857

    SHA512

    327668001f94842eee3ff1dc44c70ddca5da3a0bb49aeea6b3162608b07496456e78bcb3de0462e5e375b349e813f13fd02e61b9e389b1d954cea2628c3c4a6e

  • C:\Users\Admin\AppData\Local\Temp\7zS6E3B.tmp\bXzwCqUNzPBzW2.x64.dll

    Filesize

    700KB

    MD5

    401087ab67c6d917bf08d82f011d9eee

    SHA1

    d13dbf241d214d6036f8c6276e0e305fc2ac2b8a

    SHA256

    fada9f28483ab94341359011d5ab92a6fa2418d010aa3eb1c485c19db15e62f5

    SHA512

    4d952fc0a2ef968997d62d901a731193105da2f4541abf4eb3e5c99e247edc7ffb15ae55a8d0e5d228ae704b0a7ff7dca24e14312f778896d834971e7f3d8af6

  • C:\Users\Admin\AppData\Local\Temp\7zS6E3B.tmp\mkoimjoanmlhfblfkkimaphcpfnafbao\SALUcDhSDF.js

    Filesize

    5KB

    MD5

    0ec5c62f9e5e891773bd52f103e61a5d

    SHA1

    155c62007e0abe026675c259c9b24c2535daecac

    SHA256

    12ac78a28faa58f1173b7a7571e31fcd82cc939eca2b3efb9eee5fb0a0121c8b

    SHA512

    84705017e79adcc745af2fe91ba7b70ac7d97a361fea8aa0ee98f0506bc5a9d610dc3bebf67dd68b8b19fe213caec5f8f67d0329e14722fb1a1aa455acf9b066

  • C:\Users\Admin\AppData\Local\Temp\7zS6E3B.tmp\mkoimjoanmlhfblfkkimaphcpfnafbao\background.html

    Filesize

    147B

    MD5

    72d9db85539f8179a270c69f45c1ebbf

    SHA1

    5154bfb70665ad98b08d8b8c8d6bcc537d9763f8

    SHA256

    b92e2f4be5cc9515b77b16760c4a4aafa3da7a25b3ae5957531da286f231d0a3

    SHA512

    962b7c11f76e66c5c7533748e9ca01e0e7a36e524ca6dd57fe07d8c37fe3b65ef688c441df2b0f064673476e3b2ff1bd0c3b7fc5bc68a817bee74df1efcfe088

  • C:\Users\Admin\AppData\Local\Temp\7zS6E3B.tmp\mkoimjoanmlhfblfkkimaphcpfnafbao\content.js

    Filesize

    144B

    MD5

    fca19198fd8af21016a8b1dec7980002

    SHA1

    fd01a47d14004e17a625efe66cc46a06c786cf40

    SHA256

    332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a

    SHA512

    60f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47

  • C:\Users\Admin\AppData\Local\Temp\7zS6E3B.tmp\mkoimjoanmlhfblfkkimaphcpfnafbao\lsdb.js

    Filesize

    531B

    MD5

    36d98318ab2b3b2585a30984db328afb

    SHA1

    f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5

    SHA256

    ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7

    SHA512

    6f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a

  • C:\Users\Admin\AppData\Local\Temp\7zS6E3B.tmp\mkoimjoanmlhfblfkkimaphcpfnafbao\manifest.json

    Filesize

    499B

    MD5

    39df6273d4716eb35fd63f3c78a87c00

    SHA1

    1a0cebf00841d2ddd862085aa77ca1b7f847d7e3

    SHA256

    2b835696a33325e5b9aafb0fea99976285ae6e13841cbf3ec81c6553cdef858f

    SHA512

    695e0b83651752c4f2415da9fcda93b3629374cd61cf5de5e7a336864bf021ef3efe9214667dc85f5b9426dd6e517338d49e170c3063f7535e7f3be0d96b70e0

  • C:\Users\Admin\AppData\Local\Temp\7zS6E3B.tmp\wJjc5RNQnAeeUqC.dat

    Filesize

    6KB

    MD5

    55a918508cfd051c367a85301e2caa8a

    SHA1

    d9326ffdb79024952ea10edfab72ef136945aab0

    SHA256

    458f017f7978e3b030d989fb228b98062329c7c8e3ff60f4428cf6cbc201de9d

    SHA512

    379d11a4c380e22c65901f0beb9eca01196fe082979813f936aa3f3de51a0192d55dcc8f7549dba9a71a9c907edba3a0637979f2472dd6139286be14f204e999

  • C:\Users\Admin\AppData\Local\Temp\7zS6E3B.tmp\wJjc5RNQnAeeUqC.exe

    Filesize

    629KB

    MD5

    150107c0a55484355ce5881240cca669

    SHA1

    35d2f6723091fc4af5c4a00645b6b0f43efd4a06

    SHA256

    c422b33bee8c0b6664a7462093734aea98026ebf7cc9dc65589572213f576f0e

    SHA512

    eb189951a9a89c54c8d7b3a9fcfb97777bd55088186814597ba13e9f985f846e313b5fcd1566de56060ef8cdfb815ed2a77f5c41c02d1c666c47691b1c0aba04

  • C:\Users\Admin\AppData\Local\Temp\7zS6E3B.tmp\wJjc5RNQnAeeUqC.exe

    Filesize

    629KB

    MD5

    150107c0a55484355ce5881240cca669

    SHA1

    35d2f6723091fc4af5c4a00645b6b0f43efd4a06

    SHA256

    c422b33bee8c0b6664a7462093734aea98026ebf7cc9dc65589572213f576f0e

    SHA512

    eb189951a9a89c54c8d7b3a9fcfb97777bd55088186814597ba13e9f985f846e313b5fcd1566de56060ef8cdfb815ed2a77f5c41c02d1c666c47691b1c0aba04

  • memory/1684-150-0x0000000000000000-mapping.dmp

  • memory/4296-133-0x0000000000000000-mapping.dmp

  • memory/4912-153-0x0000000000000000-mapping.dmp