Analysis

  • max time kernel
    109s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 14:43

General

  • Target

    29f2a07314a26b7b88ea90a3fb5f6374387c7c97f080d922872048f36453c628.exe

  • Size

    2.1MB

  • MD5

    93a97b2d856567ef4298d3a093b0b9b1

  • SHA1

    ab051d92ac14447baf8bef10e63c0ceff17f70c0

  • SHA256

    29f2a07314a26b7b88ea90a3fb5f6374387c7c97f080d922872048f36453c628

  • SHA512

    15d051c22073347febd250717ed40048fa47550ab175eed9ffc140c206078e9c89076f8a469b964559264c4307572f0252f1f60162512be6fc08a8315ac0455e

  • SSDEEP

    49152:okg1wkrm2q74IdJk20oCqltz2h9ntGuF3HHovVpL4l:w1wkC2q7zdJx3/CYuJHOjk

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs 4 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 8 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 8 IoCs
  • Modifies Internet Explorer settings 1 TTPs 8 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\29f2a07314a26b7b88ea90a3fb5f6374387c7c97f080d922872048f36453c628.exe
    "C:\Users\Admin\AppData\Local\Temp\29f2a07314a26b7b88ea90a3fb5f6374387c7c97f080d922872048f36453c628.exe"
    1⤵
    • Loads dropped DLL
    • Installs/modifies Browser Helper Object
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1484
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32.exe /s "C:\Program Files (x86)\Adblocker\ujG9Uc3.x64.dll"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:680
      • C:\Windows\system32\regsvr32.exe
        /s "C:\Program Files (x86)\Adblocker\ujG9Uc3.x64.dll"
        3⤵
        • Registers COM server for autorun
        • Loads dropped DLL
        • Installs/modifies Browser Helper Object
        • Modifies Internet Explorer settings
        • Modifies registry class
        PID:1528

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Browser Extensions

1
T1176

Defense Evasion

Modify Registry

3
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Adblocker\ujG9Uc3.dat
    Filesize

    3KB

    MD5

    43edc0dce2cc0b3a5df383be36cd8297

    SHA1

    1888a430377138253a09891d4449b3d25d25546a

    SHA256

    084bcb6dc6eadd8efd15bd99b1a60507b5f82dfb4702ec2659511d522ed9c108

    SHA512

    e1cb61587024672f794c49e16bcc933a08fcd65c63fc9d91bc7abc9bbd76ae68f9a167ba0c2d2d35a0d0990040946c59ff992d593068ee917152f03675add73f

  • C:\Program Files (x86)\Adblocker\ujG9Uc3.tlb
    Filesize

    3KB

    MD5

    f13b83dd097c20e5158af7317cd82a94

    SHA1

    2d3d4473e92358b3fec12cff3789fae2ed9bcd51

    SHA256

    0a1142fdfd7b7c92852ecc676455ef9c100b7c4150f5f7c4a690aca2115a1920

    SHA512

    71e8cb120266803119228ee25ce650a97adf6e9a03a4ec033a6a3b6b743baae3286fa91e04cb7c3c4573ec6807ed30e2329b6a81e1474a09234265316473f0ee

  • C:\Program Files (x86)\Adblocker\ujG9Uc3.x64.dll
    Filesize

    690KB

    MD5

    7f4e5aed48ad9c75a88177e0b3e1ef71

    SHA1

    6840657f75e173d9024b32f52080505800d181b8

    SHA256

    e51368f1382e9a00d9059728c1e23914b3ecfc50cbbe927370adf009cd08aac1

    SHA512

    fb41c9e758909d0546dd554230eb04812e708f069b423db587b37c4f8c5745399c959c1bfd850ec474f918217314bb64604ad8ab04780730040e732959b7f671

  • \Program Files (x86)\Adblocker\ujG9Uc3.dll
    Filesize

    614KB

    MD5

    9b667841fa6680b733d5b79bc9bd4cb4

    SHA1

    c476a5e8c8ab32927862184a274a1fa9524ab9c7

    SHA256

    bef8ef321da36b6230869d492cc4223bc4e921cbe8e2e0d286ab41ed6ebf4e5b

    SHA512

    b94ab8efb79d791769e394a9fded3dfffc50d57cb865f63f1a873948f400b4cc9313befae2d2059e0b2ea810eac2c554bd34aa694452a168e7ceff9e7d42e7ab

  • \Program Files (x86)\Adblocker\ujG9Uc3.x64.dll
    Filesize

    690KB

    MD5

    7f4e5aed48ad9c75a88177e0b3e1ef71

    SHA1

    6840657f75e173d9024b32f52080505800d181b8

    SHA256

    e51368f1382e9a00d9059728c1e23914b3ecfc50cbbe927370adf009cd08aac1

    SHA512

    fb41c9e758909d0546dd554230eb04812e708f069b423db587b37c4f8c5745399c959c1bfd850ec474f918217314bb64604ad8ab04780730040e732959b7f671

  • \Program Files (x86)\Adblocker\ujG9Uc3.x64.dll
    Filesize

    690KB

    MD5

    7f4e5aed48ad9c75a88177e0b3e1ef71

    SHA1

    6840657f75e173d9024b32f52080505800d181b8

    SHA256

    e51368f1382e9a00d9059728c1e23914b3ecfc50cbbe927370adf009cd08aac1

    SHA512

    fb41c9e758909d0546dd554230eb04812e708f069b423db587b37c4f8c5745399c959c1bfd850ec474f918217314bb64604ad8ab04780730040e732959b7f671

  • memory/680-80-0x0000000000000000-mapping.dmp
  • memory/1484-65-0x0000000000701000-0x0000000000705000-memory.dmp
    Filesize

    16KB

  • memory/1484-76-0x0000000000701000-0x0000000000705000-memory.dmp
    Filesize

    16KB

  • memory/1484-67-0x0000000000701000-0x0000000000705000-memory.dmp
    Filesize

    16KB

  • memory/1484-68-0x0000000000701000-0x0000000000705000-memory.dmp
    Filesize

    16KB

  • memory/1484-69-0x0000000000701000-0x0000000000705000-memory.dmp
    Filesize

    16KB

  • memory/1484-71-0x0000000000701000-0x0000000000705000-memory.dmp
    Filesize

    16KB

  • memory/1484-70-0x0000000000701000-0x0000000000705000-memory.dmp
    Filesize

    16KB

  • memory/1484-72-0x0000000000701000-0x0000000000705000-memory.dmp
    Filesize

    16KB

  • memory/1484-73-0x0000000000701000-0x0000000000705000-memory.dmp
    Filesize

    16KB

  • memory/1484-74-0x0000000000701000-0x0000000000705000-memory.dmp
    Filesize

    16KB

  • memory/1484-75-0x0000000000701000-0x0000000000705000-memory.dmp
    Filesize

    16KB

  • memory/1484-66-0x0000000000701000-0x0000000000705000-memory.dmp
    Filesize

    16KB

  • memory/1484-77-0x0000000000701000-0x0000000000705000-memory.dmp
    Filesize

    16KB

  • memory/1484-78-0x0000000000701000-0x0000000000705000-memory.dmp
    Filesize

    16KB

  • memory/1484-54-0x0000000074E61000-0x0000000074E63000-memory.dmp
    Filesize

    8KB

  • memory/1484-64-0x0000000000701000-0x0000000000705000-memory.dmp
    Filesize

    16KB

  • memory/1484-63-0x0000000000701000-0x0000000000705000-memory.dmp
    Filesize

    16KB

  • memory/1484-62-0x0000000000701000-0x0000000000705000-memory.dmp
    Filesize

    16KB

  • memory/1484-55-0x00000000007E0000-0x0000000000882000-memory.dmp
    Filesize

    648KB

  • memory/1484-60-0x0000000000701000-0x0000000000705000-memory.dmp
    Filesize

    16KB

  • memory/1484-61-0x0000000000701000-0x0000000000705000-memory.dmp
    Filesize

    16KB

  • memory/1528-85-0x000007FEFB9C1000-0x000007FEFB9C3000-memory.dmp
    Filesize

    8KB

  • memory/1528-84-0x0000000000000000-mapping.dmp