Analysis

  • max time kernel
    152s
  • max time network
    174s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 14:37

General

  • Target

    349bfa61264cd1e30ee0af1687e49ed75165687ae4130577e13d9cc9ce3782bf.exe

  • Size

    1.5MB

  • MD5

    7046e209ff5847b23b8bd04e2d6f76fe

  • SHA1

    0ae796deb864a47f171f93583efaa7c2f5fa5434

  • SHA256

    349bfa61264cd1e30ee0af1687e49ed75165687ae4130577e13d9cc9ce3782bf

  • SHA512

    9e915f3a1dd9df55b8841ef45766b904594bda0ae28a4708d7be934148a0adf4445be8241ce7751dbea92f19e1d2756084938f380746a8a437c58e99c74669aa

  • SSDEEP

    24576:HS6fJHL4IpoUYaj/ybNICQZrTkuof0JQdTJ9o3oatIexCNdvvgYPw:H74DBajAUZrvofbQoaSeydv4Y4

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Registers COM server for autorun 1 TTPs 4 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 8 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 8 IoCs
  • Modifies Internet Explorer settings 1 TTPs 8 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\349bfa61264cd1e30ee0af1687e49ed75165687ae4130577e13d9cc9ce3782bf.exe
    "C:\Users\Admin\AppData\Local\Temp\349bfa61264cd1e30ee0af1687e49ed75165687ae4130577e13d9cc9ce3782bf.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2576
    • C:\Users\Admin\AppData\Local\Temp\358838cb\L8I.exe
      "C:\Users\Admin\AppData\Local\Temp/358838cb/L8I.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Drops file in Program Files directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:5112
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32.exe /s "C:\Program Files (x86)\Adblocker\vZ.x64.dll"
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2032
        • C:\Windows\system32\regsvr32.exe
          /s "C:\Program Files (x86)\Adblocker\vZ.x64.dll"
          4⤵
          • Registers COM server for autorun
          • Loads dropped DLL
          • Installs/modifies Browser Helper Object
          • Modifies Internet Explorer settings
          • Modifies registry class
          PID:4020

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Adblocker\vZ.dat

    Filesize

    4KB

    MD5

    291f0a380f0f4bbcb7e8bedd60d3af78

    SHA1

    934fcff906f474218ae2328a92adbd09da33f582

    SHA256

    0868b1d66fd18ffb5fc6b94ff2ef87cf17748032b7de32b01da2439409b5a5d0

    SHA512

    b1b6647c5606ff0f1ae159145924c04b786c95d125d2843142f68547aba6721f4992e59a62b4334e26785dbf7882850b37737422ef301261b22b1d2c9525fff3

  • C:\Program Files (x86)\Adblocker\vZ.dll

    Filesize

    325KB

    MD5

    d316153e6feea98b96650c4f05e2f31a

    SHA1

    21ef422afe7f9bcbd86f0381b296a8f2d2f66fe4

    SHA256

    c22e935a2b45bf48d94ee2f268b163d73b1b0c6c10f5ef6737591ec3da7c1578

    SHA512

    9a9752d3cb544c3cbad053aa93e44e95892094099181a15b40b8dcf200180eb72eadd4fb1cd6792434d20e60d9ae433370a47ed19753317078e51e616438514c

  • C:\Program Files (x86)\Adblocker\vZ.tlb

    Filesize

    3KB

    MD5

    736f8e927a2bc98863a50a76ac7a0973

    SHA1

    fe78f86dc43442192b9f4e56dfdb35e36d23cfbb

    SHA256

    b7fb683bbb4c444b7121ad4cb00a4b8f247ea32ee367a4d0bc6ea05e6803c45f

    SHA512

    321e777413ee96dd05b3c412fd90b0e78ea8a9550a8d7af27d7a1530302833c97eb7e41b018e7bb89e82c8987e2527094b88ac94b74a3b5cc4b8bea1a0ef287e

  • C:\Program Files (x86)\Adblocker\vZ.x64.dll

    Filesize

    389KB

    MD5

    7cd46176b71eda0ecb89413ed185e606

    SHA1

    58f24d30eb5251a553ec7dac81f3fc2398e3e63e

    SHA256

    b959f8550304467338e0b2975acf36b6c530e575d3cc6847f82fa7576fb86bb7

    SHA512

    217eee22ebf8ca536e49378a6c831f71e0bdf6ef637d14395e8e765a9f2e1b98bbda0a9bf273592dc9665d9e63f72aa58fd9dbd66ede56f8855ee500c67becdd

  • C:\Program Files (x86)\Adblocker\vZ.x64.dll

    Filesize

    389KB

    MD5

    7cd46176b71eda0ecb89413ed185e606

    SHA1

    58f24d30eb5251a553ec7dac81f3fc2398e3e63e

    SHA256

    b959f8550304467338e0b2975acf36b6c530e575d3cc6847f82fa7576fb86bb7

    SHA512

    217eee22ebf8ca536e49378a6c831f71e0bdf6ef637d14395e8e765a9f2e1b98bbda0a9bf273592dc9665d9e63f72aa58fd9dbd66ede56f8855ee500c67becdd

  • C:\Program Files (x86)\Adblocker\vZ.x64.dll

    Filesize

    389KB

    MD5

    7cd46176b71eda0ecb89413ed185e606

    SHA1

    58f24d30eb5251a553ec7dac81f3fc2398e3e63e

    SHA256

    b959f8550304467338e0b2975acf36b6c530e575d3cc6847f82fa7576fb86bb7

    SHA512

    217eee22ebf8ca536e49378a6c831f71e0bdf6ef637d14395e8e765a9f2e1b98bbda0a9bf273592dc9665d9e63f72aa58fd9dbd66ede56f8855ee500c67becdd

  • C:\Users\Admin\AppData\Local\Temp\358838cb\L8I.dat

    Filesize

    4KB

    MD5

    291f0a380f0f4bbcb7e8bedd60d3af78

    SHA1

    934fcff906f474218ae2328a92adbd09da33f582

    SHA256

    0868b1d66fd18ffb5fc6b94ff2ef87cf17748032b7de32b01da2439409b5a5d0

    SHA512

    b1b6647c5606ff0f1ae159145924c04b786c95d125d2843142f68547aba6721f4992e59a62b4334e26785dbf7882850b37737422ef301261b22b1d2c9525fff3

  • C:\Users\Admin\AppData\Local\Temp\358838cb\L8I.exe

    Filesize

    564KB

    MD5

    0e40283546a07f8655a29d2dd0eb47b2

    SHA1

    708483119bf61e380a38df9b3d951ed9fef578d5

    SHA256

    175bc9c1241f15ae0a43f6b12fdc01337cb824c9b5ce6a51fdcbea7c4c98e323

    SHA512

    56adfd58ee0314b77d8351b6ec266ade8f0f59ccf6ac48f6641531733cc9b2b836f18a0ec2952d7e6a30bd18a320c3d1d796f6619e93ae449c6ccf3195514926

  • C:\Users\Admin\AppData\Local\Temp\358838cb\L8I.exe

    Filesize

    564KB

    MD5

    0e40283546a07f8655a29d2dd0eb47b2

    SHA1

    708483119bf61e380a38df9b3d951ed9fef578d5

    SHA256

    175bc9c1241f15ae0a43f6b12fdc01337cb824c9b5ce6a51fdcbea7c4c98e323

    SHA512

    56adfd58ee0314b77d8351b6ec266ade8f0f59ccf6ac48f6641531733cc9b2b836f18a0ec2952d7e6a30bd18a320c3d1d796f6619e93ae449c6ccf3195514926

  • C:\Users\Admin\AppData\Local\Temp\358838cb\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    df13f711e20e9c80171846d4f2f7ae06

    SHA1

    56d29cda58427efe0e21d3880d39eb1b0ef60bee

    SHA256

    6c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4

    SHA512

    6c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e

  • C:\Users\Admin\AppData\Local\Temp\358838cb\[email protected]\chrome.manifest

    Filesize

    23B

    MD5

    85818ae9fbc4cda30d4273a7e9bc5096

    SHA1

    bb586e344120fbbb5ffa45447346ad60d5a0f98c

    SHA256

    90ad9cf2ce74b9d34df508b691b3f310c1d36529d82e0e6c463b0d1dc5174d26

    SHA512

    9f74119597fb5cdf79a5a9076b19693cd22c3aa48f3da7c89e5f235b62fcb080c8afcef03adc466f9ccaf8027e602d93f2e3aae5e99ee9855f25eb7c7344b941

  • C:\Users\Admin\AppData\Local\Temp\358838cb\[email protected]\content\bg.js

    Filesize

    31KB

    MD5

    df5ab56cdd7a79263efea83a1aea1d02

    SHA1

    36db4ad5c01ed856871ea692d38d7d96dbd38f11

    SHA256

    0918afeeef72e8ba7a3565c6462626b013e3a01f57e12b7d46723ca4970b2b4f

    SHA512

    982c419ce22cea13b3430ee094ec45a7f169e47242b62534585f471817bdf74675f705d200c1072b46674911044771cc5e7b079232822b5f684c92d4ac4eeaa9

  • C:\Users\Admin\AppData\Local\Temp\358838cb\[email protected]\install.rdf

    Filesize

    598B

    MD5

    a0dfabff8f525638f890efcf4d0b8c7a

    SHA1

    db31f3294765b3d367bb7b887537db86e72e614b

    SHA256

    30eb081aeea55743b11763af706d1a2782758352154303207ae86d95a9028937

    SHA512

    f37692911f504591cf86ce53332f9d62ae4b89126b902f4a59d383bd0156e055573bef86372c4c043b5ceecbdc18977e2381af13feff2fb1f91e3445138fecb2

  • C:\Users\Admin\AppData\Local\Temp\358838cb\vZ.dll

    Filesize

    325KB

    MD5

    d316153e6feea98b96650c4f05e2f31a

    SHA1

    21ef422afe7f9bcbd86f0381b296a8f2d2f66fe4

    SHA256

    c22e935a2b45bf48d94ee2f268b163d73b1b0c6c10f5ef6737591ec3da7c1578

    SHA512

    9a9752d3cb544c3cbad053aa93e44e95892094099181a15b40b8dcf200180eb72eadd4fb1cd6792434d20e60d9ae433370a47ed19753317078e51e616438514c

  • C:\Users\Admin\AppData\Local\Temp\358838cb\vZ.tlb

    Filesize

    3KB

    MD5

    736f8e927a2bc98863a50a76ac7a0973

    SHA1

    fe78f86dc43442192b9f4e56dfdb35e36d23cfbb

    SHA256

    b7fb683bbb4c444b7121ad4cb00a4b8f247ea32ee367a4d0bc6ea05e6803c45f

    SHA512

    321e777413ee96dd05b3c412fd90b0e78ea8a9550a8d7af27d7a1530302833c97eb7e41b018e7bb89e82c8987e2527094b88ac94b74a3b5cc4b8bea1a0ef287e

  • C:\Users\Admin\AppData\Local\Temp\358838cb\vZ.x64.dll

    Filesize

    389KB

    MD5

    7cd46176b71eda0ecb89413ed185e606

    SHA1

    58f24d30eb5251a553ec7dac81f3fc2398e3e63e

    SHA256

    b959f8550304467338e0b2975acf36b6c530e575d3cc6847f82fa7576fb86bb7

    SHA512

    217eee22ebf8ca536e49378a6c831f71e0bdf6ef637d14395e8e765a9f2e1b98bbda0a9bf273592dc9665d9e63f72aa58fd9dbd66ede56f8855ee500c67becdd

  • memory/2032-144-0x0000000000000000-mapping.dmp

  • memory/4020-147-0x0000000000000000-mapping.dmp

  • memory/5112-132-0x0000000000000000-mapping.dmp