Analysis

  • max time kernel
    66s
  • max time network
    100s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 14:36

General

  • Target

    35d6d23dcbacb5c8a56391f2bfb87ff03f7a04f25ac23701bcfda9b9ebdac972.exe

  • Size

    2.6MB

  • MD5

    3d8635844d1d85c713e43aa5447892da

  • SHA1

    ad800d66cf444dfe9c30b38892a463c5059ec737

  • SHA256

    35d6d23dcbacb5c8a56391f2bfb87ff03f7a04f25ac23701bcfda9b9ebdac972

  • SHA512

    4ba2b0555f4fa13cc3b07798b72fb82a927234830666ed0f0f22fe12f89203ecb857c2162c969c6e39ef81deffa36481727f4eb974fd99571457b176f38a3926

  • SSDEEP

    49152:GNHmbN57+3zROrNKAxQLLVsYWOAxbk9klssP2Oifyz7FAEejFma8:jx5242GQ9Kssfrj

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs 4 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 3 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 8 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Program Files directory 8 IoCs
  • Modifies Internet Explorer settings 1 TTPs 8 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\35d6d23dcbacb5c8a56391f2bfb87ff03f7a04f25ac23701bcfda9b9ebdac972.exe
    "C:\Users\Admin\AppData\Local\Temp\35d6d23dcbacb5c8a56391f2bfb87ff03f7a04f25ac23701bcfda9b9ebdac972.exe"
    1⤵
    • Loads dropped DLL
    • Drops Chrome extension
    • Installs/modifies Browser Helper Object
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2024
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32.exe /s "C:\Program Files (x86)\SaveClicker\av5sGc.x64.dll"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1120
      • C:\Windows\system32\regsvr32.exe
        /s "C:\Program Files (x86)\SaveClicker\av5sGc.x64.dll"
        3⤵
        • Registers COM server for autorun
        • Loads dropped DLL
        • Installs/modifies Browser Helper Object
        • Modifies Internet Explorer settings
        • Modifies registry class
        PID:1900

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\SaveClicker\av5sGc.dat
    Filesize

    4KB

    MD5

    378f612a731edf14c06961a83cdd8771

    SHA1

    82f44b2de0072594a30e48aab31743417f926e8d

    SHA256

    b56ec43627566ac2296c4f0b92fda3ca51f617dad0fd9f24890f4414c939be5e

    SHA512

    eed7eebc28b227b3866b127a06b29646547dc1df54543183108feea451f6ed5e17190f41d6c9b2e363f447712306d13d5aff0f603b2b37ddb6764bc49537f911

  • C:\Program Files (x86)\SaveClicker\av5sGc.tlb
    Filesize

    3KB

    MD5

    8844036f19677bdb4c605f95b8e35c71

    SHA1

    54c162cba6a8e9c97ff630eabdd9f091fed3e0f8

    SHA256

    c1e650b67e3a09532103a4f1114ce74fbc783fa1de4106c18966b6ad3ecee943

    SHA512

    c731684798263fce7856599059b9f6773a2593b81940d3f1f6c17edb8f0a344ba5fd4d9d556982f0d12cc189904c1ff04d1831a49d7dd6ed7a230b340dce6916

  • C:\Program Files (x86)\SaveClicker\av5sGc.x64.dll
    Filesize

    688KB

    MD5

    d07082b313f2048d6de092f5d2228aab

    SHA1

    acf58e08f2902339f3b8a0f653dc6a6dfec85f77

    SHA256

    b4084282a5149ad3553159628d98baec116a3447306c563dd83d03a91e5b883d

    SHA512

    c57ae6d325b25fde1175ccbca1f5fba1a5cee37a29d3034e1376d244915d7b1d85d2c05f08d8b56c8c06beefeeb8eb98af364b60def5357dcd468c9d013cc40d

  • \Program Files (x86)\SaveClicker\av5sGc.dll
    Filesize

    614KB

    MD5

    cab8782981889392a56a5a56718d4c24

    SHA1

    411c952e93521df349387e33a116a476c1f9d523

    SHA256

    f281bfb67cdc444d8b4230001daca219281a5dcc15dc769c71c7c584a36dfc04

    SHA512

    dc2d538af76ee5dab34203e4562e7983167de0f93b9a4b84b811b090c5ad6cbf1091c4be6e1d2891f7a4131b4240348af25c2c3582573439eab71f83bd68c75d

  • \Program Files (x86)\SaveClicker\av5sGc.x64.dll
    Filesize

    688KB

    MD5

    d07082b313f2048d6de092f5d2228aab

    SHA1

    acf58e08f2902339f3b8a0f653dc6a6dfec85f77

    SHA256

    b4084282a5149ad3553159628d98baec116a3447306c563dd83d03a91e5b883d

    SHA512

    c57ae6d325b25fde1175ccbca1f5fba1a5cee37a29d3034e1376d244915d7b1d85d2c05f08d8b56c8c06beefeeb8eb98af364b60def5357dcd468c9d013cc40d

  • \Program Files (x86)\SaveClicker\av5sGc.x64.dll
    Filesize

    688KB

    MD5

    d07082b313f2048d6de092f5d2228aab

    SHA1

    acf58e08f2902339f3b8a0f653dc6a6dfec85f77

    SHA256

    b4084282a5149ad3553159628d98baec116a3447306c563dd83d03a91e5b883d

    SHA512

    c57ae6d325b25fde1175ccbca1f5fba1a5cee37a29d3034e1376d244915d7b1d85d2c05f08d8b56c8c06beefeeb8eb98af364b60def5357dcd468c9d013cc40d

  • memory/1120-80-0x0000000000000000-mapping.dmp
  • memory/1900-85-0x000007FEFC091000-0x000007FEFC093000-memory.dmp
    Filesize

    8KB

  • memory/1900-84-0x0000000000000000-mapping.dmp
  • memory/2024-65-0x00000000006D2000-0x00000000006D6000-memory.dmp
    Filesize

    16KB

  • memory/2024-78-0x00000000006D2000-0x00000000006D6000-memory.dmp
    Filesize

    16KB

  • memory/2024-69-0x00000000006D2000-0x00000000006D6000-memory.dmp
    Filesize

    16KB

  • memory/2024-70-0x00000000006D2000-0x00000000006D6000-memory.dmp
    Filesize

    16KB

  • memory/2024-71-0x00000000006D2000-0x00000000006D6000-memory.dmp
    Filesize

    16KB

  • memory/2024-73-0x00000000006D2000-0x00000000006D6000-memory.dmp
    Filesize

    16KB

  • memory/2024-72-0x00000000006D2000-0x00000000006D6000-memory.dmp
    Filesize

    16KB

  • memory/2024-74-0x00000000006D2000-0x00000000006D6000-memory.dmp
    Filesize

    16KB

  • memory/2024-75-0x00000000006D2000-0x00000000006D6000-memory.dmp
    Filesize

    16KB

  • memory/2024-77-0x00000000006D2000-0x00000000006D6000-memory.dmp
    Filesize

    16KB

  • memory/2024-76-0x00000000006D2000-0x00000000006D6000-memory.dmp
    Filesize

    16KB

  • memory/2024-67-0x00000000006D2000-0x00000000006D6000-memory.dmp
    Filesize

    16KB

  • memory/2024-68-0x00000000006D2000-0x00000000006D6000-memory.dmp
    Filesize

    16KB

  • memory/2024-66-0x00000000006D2000-0x00000000006D6000-memory.dmp
    Filesize

    16KB

  • memory/2024-54-0x0000000076691000-0x0000000076693000-memory.dmp
    Filesize

    8KB

  • memory/2024-64-0x00000000006D2000-0x00000000006D6000-memory.dmp
    Filesize

    16KB

  • memory/2024-63-0x00000000006D2000-0x00000000006D6000-memory.dmp
    Filesize

    16KB

  • memory/2024-62-0x00000000006D2000-0x00000000006D6000-memory.dmp
    Filesize

    16KB

  • memory/2024-61-0x00000000006D2000-0x00000000006D6000-memory.dmp
    Filesize

    16KB

  • memory/2024-60-0x00000000006D2000-0x00000000006D6000-memory.dmp
    Filesize

    16KB

  • memory/2024-55-0x0000000000ED0000-0x0000000000F73000-memory.dmp
    Filesize

    652KB