Analysis

  • max time kernel
    26s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 15:45

General

  • Target

    da495fe5b4fdd1f8e9f3d56bfc716cc888bd7d1eeeb141eec1f37a9932d1e54e.exe

  • Size

    3.6MB

  • MD5

    1968b72bd158f86b2f6dbeeaaf7cfe0e

  • SHA1

    bd6b9a30f47cd1c96dc2b0245ff340daac8f9b01

  • SHA256

    da495fe5b4fdd1f8e9f3d56bfc716cc888bd7d1eeeb141eec1f37a9932d1e54e

  • SHA512

    7e7bdcbbbb9f4520227eef7876a3174d68ce8b3362a810d96bb5a6066e56bafe3d41c94237824616b0ea1e037f4b407bf73fc249c8b03a6ccf6a72a24687e402

  • SSDEEP

    49152:FbAct+TfLFAsAp0Xw2VnzmhK6Dhtc0LKXnss6MogyE3837l0WN0kzXJAhkCWLxlU:Fbr+TSjp0Xx8E4GXneYy4837lRjJLCo

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs 4 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 8 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 8 IoCs
  • Modifies Internet Explorer settings 1 TTPs 8 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\da495fe5b4fdd1f8e9f3d56bfc716cc888bd7d1eeeb141eec1f37a9932d1e54e.exe
    "C:\Users\Admin\AppData\Local\Temp\da495fe5b4fdd1f8e9f3d56bfc716cc888bd7d1eeeb141eec1f37a9932d1e54e.exe"
    1⤵
    • Loads dropped DLL
    • Installs/modifies Browser Helper Object
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1480
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32.exe /s "C:\Program Files (x86)\YoutubeAdaBlocKe\Nxp9czrDRmXBnZ.x64.dll"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1600
      • C:\Windows\system32\regsvr32.exe
        /s "C:\Program Files (x86)\YoutubeAdaBlocKe\Nxp9czrDRmXBnZ.x64.dll"
        3⤵
        • Registers COM server for autorun
        • Loads dropped DLL
        • Installs/modifies Browser Helper Object
        • Modifies Internet Explorer settings
        • Modifies registry class
        PID:1396

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\YoutubeAdaBlocKe\Nxp9czrDRmXBnZ.dat

    Filesize

    4KB

    MD5

    04d9aa4df41a309b5f352aca98ddd8cd

    SHA1

    0b662bca9cb1f8b604edcd3be030a55a55878b34

    SHA256

    b50593229c4e048b0deec7665093d2bbd60d3eb0f12897e0360be406ab37415a

    SHA512

    4106a7c056e683c52d7327d1c469f4257bc19f61a5fc24e7fb4a7eef9924116b44434e40ff7cd634a28717cd28a647fb7a8543700521737700ff7d89fb67b368

  • C:\Program Files (x86)\YoutubeAdaBlocKe\Nxp9czrDRmXBnZ.tlb

    Filesize

    3KB

    MD5

    3ff54cd86d4f83c32a7abdf699d46513

    SHA1

    f586008206097b653fc939018e630cccadda21e2

    SHA256

    95be1a1cc30ebbebb797a365a2058e5320d062b49497fbab5423d96f9846573f

    SHA512

    9ba366b7f6ba215ea079122f5b9b9c32abb1a73dd2bebd6270c91163450d7d7160d3709160b8990d3ba57a76d287ab853ccf6589d67c4016cc8a82b279607aa8

  • C:\Program Files (x86)\YoutubeAdaBlocKe\Nxp9czrDRmXBnZ.x64.dll

    Filesize

    695KB

    MD5

    5de3306036cde10139ff0f99154bef07

    SHA1

    08ec3d698a0e6ddf89433f9f73f07afcc4defee0

    SHA256

    c51bb32074fed6342304383f2127fe72f8bfa123742fa4b651a3f2a8c9a485ec

    SHA512

    ac7a4c3a094e0be6d1a4e44fbdb14934123c02fbdf2a28c467b80babcff963a23c5f21107ae588c94413f269660fe5259728df290d15dff259608c54cb76a248

  • \Program Files (x86)\YoutubeAdaBlocKe\Nxp9czrDRmXBnZ.dll

    Filesize

    616KB

    MD5

    adf713a93e396a4e70845a61c1b166fb

    SHA1

    c13f8f34eaa96431a1f28d404f44c29401869242

    SHA256

    1cb4d0d74ec9ad9b27a08685f5282d0a0179c1b01ca27394b1fe08145f331ece

    SHA512

    e9874e3ca84f4f82fe95979c20454c26f253038aa06c4b72dd02cd3ad207477292508ebe5fa2071450b849e285b1e73c42198e0eb24bac25d43314ed88a3a8d7

  • \Program Files (x86)\YoutubeAdaBlocKe\Nxp9czrDRmXBnZ.x64.dll

    Filesize

    695KB

    MD5

    5de3306036cde10139ff0f99154bef07

    SHA1

    08ec3d698a0e6ddf89433f9f73f07afcc4defee0

    SHA256

    c51bb32074fed6342304383f2127fe72f8bfa123742fa4b651a3f2a8c9a485ec

    SHA512

    ac7a4c3a094e0be6d1a4e44fbdb14934123c02fbdf2a28c467b80babcff963a23c5f21107ae588c94413f269660fe5259728df290d15dff259608c54cb76a248

  • \Program Files (x86)\YoutubeAdaBlocKe\Nxp9czrDRmXBnZ.x64.dll

    Filesize

    695KB

    MD5

    5de3306036cde10139ff0f99154bef07

    SHA1

    08ec3d698a0e6ddf89433f9f73f07afcc4defee0

    SHA256

    c51bb32074fed6342304383f2127fe72f8bfa123742fa4b651a3f2a8c9a485ec

    SHA512

    ac7a4c3a094e0be6d1a4e44fbdb14934123c02fbdf2a28c467b80babcff963a23c5f21107ae588c94413f269660fe5259728df290d15dff259608c54cb76a248

  • memory/1396-88-0x000007FEFC4E1000-0x000007FEFC4E3000-memory.dmp

    Filesize

    8KB

  • memory/1396-87-0x0000000000000000-mapping.dmp

  • memory/1480-74-0x0000000000392000-0x0000000000396000-memory.dmp

    Filesize

    16KB

  • memory/1480-79-0x0000000000392000-0x0000000000396000-memory.dmp

    Filesize

    16KB

  • memory/1480-68-0x0000000000392000-0x0000000000396000-memory.dmp

    Filesize

    16KB

  • memory/1480-70-0x0000000000392000-0x0000000000396000-memory.dmp

    Filesize

    16KB

  • memory/1480-69-0x0000000000392000-0x0000000000396000-memory.dmp

    Filesize

    16KB

  • memory/1480-71-0x0000000000392000-0x0000000000396000-memory.dmp

    Filesize

    16KB

  • memory/1480-72-0x0000000000392000-0x0000000000396000-memory.dmp

    Filesize

    16KB

  • memory/1480-73-0x0000000000392000-0x0000000000396000-memory.dmp

    Filesize

    16KB

  • memory/1480-54-0x0000000076831000-0x0000000076833000-memory.dmp

    Filesize

    8KB

  • memory/1480-75-0x0000000000392000-0x0000000000396000-memory.dmp

    Filesize

    16KB

  • memory/1480-76-0x0000000000392000-0x0000000000396000-memory.dmp

    Filesize

    16KB

  • memory/1480-78-0x0000000000392000-0x0000000000396000-memory.dmp

    Filesize

    16KB

  • memory/1480-77-0x0000000000392000-0x0000000000396000-memory.dmp

    Filesize

    16KB

  • memory/1480-67-0x0000000000392000-0x0000000000396000-memory.dmp

    Filesize

    16KB

  • memory/1480-80-0x0000000000392000-0x0000000000396000-memory.dmp

    Filesize

    16KB

  • memory/1480-66-0x0000000000392000-0x0000000000396000-memory.dmp

    Filesize

    16KB

  • memory/1480-82-0x0000000000393000-0x0000000000395000-memory.dmp

    Filesize

    8KB

  • memory/1480-55-0x0000000000C70000-0x0000000000D16000-memory.dmp

    Filesize

    664KB

  • memory/1480-65-0x0000000000392000-0x0000000000396000-memory.dmp

    Filesize

    16KB

  • memory/1480-64-0x0000000000392000-0x0000000000396000-memory.dmp

    Filesize

    16KB

  • memory/1480-63-0x0000000000392000-0x0000000000396000-memory.dmp

    Filesize

    16KB

  • memory/1480-62-0x0000000000392000-0x0000000000396000-memory.dmp

    Filesize

    16KB

  • memory/1480-61-0x0000000000392000-0x0000000000396000-memory.dmp

    Filesize

    16KB

  • memory/1480-60-0x0000000000392000-0x0000000000396000-memory.dmp

    Filesize

    16KB

  • memory/1600-83-0x0000000000000000-mapping.dmp