Analysis
-
max time kernel
239s -
max time network
336s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 15:55
Static task
static1
Behavioral task
behavioral1
Sample
ca5dc82bbb7b6173ae36224eb3e083dd5b06afbefd99e5ca65945462ce0d96e2.exe
Resource
win7-20221111-en
General
-
Target
ca5dc82bbb7b6173ae36224eb3e083dd5b06afbefd99e5ca65945462ce0d96e2.exe
-
Size
2.1MB
-
MD5
c047b68159e1f29e494a7f5baf7b0dca
-
SHA1
08506b0c1a7e1c7043b8d45275027b5cb86796cc
-
SHA256
ca5dc82bbb7b6173ae36224eb3e083dd5b06afbefd99e5ca65945462ce0d96e2
-
SHA512
65f4299c5de27184c312b94e7305593de019a2e7b07aee26c0a78f7a78bc6203fc73971429301b85adf82afdda95cf705dcd0e1d537c3277303696e9384c206f
-
SSDEEP
49152:h1OsO86V+vVy495Sb1F1z7odZ9T+BwStr:h1OFxU81F1zsVcr
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
2F7JxpvISf9HxRX.exepid process 1184 2F7JxpvISf9HxRX.exe -
Loads dropped DLL 4 IoCs
Processes:
ca5dc82bbb7b6173ae36224eb3e083dd5b06afbefd99e5ca65945462ce0d96e2.exe2F7JxpvISf9HxRX.exeregsvr32.exeregsvr32.exepid process 1492 ca5dc82bbb7b6173ae36224eb3e083dd5b06afbefd99e5ca65945462ce0d96e2.exe 1184 2F7JxpvISf9HxRX.exe 1552 regsvr32.exe 676 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 3 IoCs
Processes:
2F7JxpvISf9HxRX.exedescription ioc process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\adlpghmnemihaeddfhojdfbabnmfmpbb\2.0\manifest.json 2F7JxpvISf9HxRX.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\adlpghmnemihaeddfhojdfbabnmfmpbb\2.0\manifest.json 2F7JxpvISf9HxRX.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\adlpghmnemihaeddfhojdfbabnmfmpbb\2.0\manifest.json 2F7JxpvISf9HxRX.exe -
Installs/modifies Browser Helper Object 2 TTPs 11 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
2F7JxpvISf9HxRX.exeregsvr32.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} 2F7JxpvISf9HxRX.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects 2F7JxpvISf9HxRX.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{18DF081C-E8AD-4283-A596-FA578C2EBDC3} 2F7JxpvISf9HxRX.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\ 2F7JxpvISf9HxRX.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DBC80044-A445-435B-BC74-9C25C1C588A9} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} 2F7JxpvISf9HxRX.exe -
Drops file in System32 directory 4 IoCs
Processes:
2F7JxpvISf9HxRX.exedescription ioc process File opened for modification C:\Windows\System32\GroupPolicy 2F7JxpvISf9HxRX.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini 2F7JxpvISf9HxRX.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol 2F7JxpvISf9HxRX.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI 2F7JxpvISf9HxRX.exe -
Drops file in Program Files directory 8 IoCs
Processes:
2F7JxpvISf9HxRX.exedescription ioc process File opened for modification C:\Program Files (x86)\GoSSavee\fy1HtvdsVlkrCy.tlb 2F7JxpvISf9HxRX.exe File created C:\Program Files (x86)\GoSSavee\fy1HtvdsVlkrCy.dat 2F7JxpvISf9HxRX.exe File opened for modification C:\Program Files (x86)\GoSSavee\fy1HtvdsVlkrCy.dat 2F7JxpvISf9HxRX.exe File created C:\Program Files (x86)\GoSSavee\fy1HtvdsVlkrCy.x64.dll 2F7JxpvISf9HxRX.exe File opened for modification C:\Program Files (x86)\GoSSavee\fy1HtvdsVlkrCy.x64.dll 2F7JxpvISf9HxRX.exe File created C:\Program Files (x86)\GoSSavee\fy1HtvdsVlkrCy.dll 2F7JxpvISf9HxRX.exe File opened for modification C:\Program Files (x86)\GoSSavee\fy1HtvdsVlkrCy.dll 2F7JxpvISf9HxRX.exe File created C:\Program Files (x86)\GoSSavee\fy1HtvdsVlkrCy.tlb 2F7JxpvISf9HxRX.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
2F7JxpvISf9HxRX.exepid process 1184 2F7JxpvISf9HxRX.exe 1184 2F7JxpvISf9HxRX.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
ca5dc82bbb7b6173ae36224eb3e083dd5b06afbefd99e5ca65945462ce0d96e2.exe2F7JxpvISf9HxRX.exeregsvr32.exedescription pid process target process PID 1492 wrote to memory of 1184 1492 ca5dc82bbb7b6173ae36224eb3e083dd5b06afbefd99e5ca65945462ce0d96e2.exe 2F7JxpvISf9HxRX.exe PID 1492 wrote to memory of 1184 1492 ca5dc82bbb7b6173ae36224eb3e083dd5b06afbefd99e5ca65945462ce0d96e2.exe 2F7JxpvISf9HxRX.exe PID 1492 wrote to memory of 1184 1492 ca5dc82bbb7b6173ae36224eb3e083dd5b06afbefd99e5ca65945462ce0d96e2.exe 2F7JxpvISf9HxRX.exe PID 1492 wrote to memory of 1184 1492 ca5dc82bbb7b6173ae36224eb3e083dd5b06afbefd99e5ca65945462ce0d96e2.exe 2F7JxpvISf9HxRX.exe PID 1184 wrote to memory of 1552 1184 2F7JxpvISf9HxRX.exe regsvr32.exe PID 1184 wrote to memory of 1552 1184 2F7JxpvISf9HxRX.exe regsvr32.exe PID 1184 wrote to memory of 1552 1184 2F7JxpvISf9HxRX.exe regsvr32.exe PID 1184 wrote to memory of 1552 1184 2F7JxpvISf9HxRX.exe regsvr32.exe PID 1184 wrote to memory of 1552 1184 2F7JxpvISf9HxRX.exe regsvr32.exe PID 1184 wrote to memory of 1552 1184 2F7JxpvISf9HxRX.exe regsvr32.exe PID 1184 wrote to memory of 1552 1184 2F7JxpvISf9HxRX.exe regsvr32.exe PID 1552 wrote to memory of 676 1552 regsvr32.exe regsvr32.exe PID 1552 wrote to memory of 676 1552 regsvr32.exe regsvr32.exe PID 1552 wrote to memory of 676 1552 regsvr32.exe regsvr32.exe PID 1552 wrote to memory of 676 1552 regsvr32.exe regsvr32.exe PID 1552 wrote to memory of 676 1552 regsvr32.exe regsvr32.exe PID 1552 wrote to memory of 676 1552 regsvr32.exe regsvr32.exe PID 1552 wrote to memory of 676 1552 regsvr32.exe regsvr32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca5dc82bbb7b6173ae36224eb3e083dd5b06afbefd99e5ca65945462ce0d96e2.exe"C:\Users\Admin\AppData\Local\Temp\ca5dc82bbb7b6173ae36224eb3e083dd5b06afbefd99e5ca65945462ce0d96e2.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\7zS46F0.tmp\2F7JxpvISf9HxRX.exe.\2F7JxpvISf9HxRX.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\GoSSavee\fy1HtvdsVlkrCy.x64.dll"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\GoSSavee\fy1HtvdsVlkrCy.x64.dll"4⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
PID:676
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD502082452c422e5f372173160995829ec
SHA1b808ba17c4a737d575d914fa5f83a2ef91485e73
SHA2567e6497ef033b2cbf30bbfa8b35b1101f693d856398f66ebdf2503f79382f07df
SHA512e3919605f6d78fd051f1cb5874fabe622219bd72852fd3dd8d43354e48605b9e034da2d89d2c4e5138a54e7bf5de1b7d83363f227b6b8dad9166c26039807491
-
Filesize
697KB
MD5f104f402e22003705f93d77807b46ee2
SHA17ddf2aa31fa817c0138f3f4689752bf81d4e456d
SHA256f853bf3140935d241a3e07791af9520a7cef2e8a4f5c51a1737923759539d2fb
SHA512d968285b7566e97ff6a9d837040345e614c92c329de4334fb011e92d4d6ba5c207c09ce7267084f3de27fa3a7757416d0a1c96707f083be538ec29f2d82b423c
-
Filesize
7KB
MD502082452c422e5f372173160995829ec
SHA1b808ba17c4a737d575d914fa5f83a2ef91485e73
SHA2567e6497ef033b2cbf30bbfa8b35b1101f693d856398f66ebdf2503f79382f07df
SHA512e3919605f6d78fd051f1cb5874fabe622219bd72852fd3dd8d43354e48605b9e034da2d89d2c4e5138a54e7bf5de1b7d83363f227b6b8dad9166c26039807491
-
Filesize
634KB
MD5ea32e4aaace7cab38f05082028749e06
SHA1a1fdb11ec3aba5ae792b1546a1045dbc5506695f
SHA25661dd5bef6d96911c59420fea9a4324926309a208fb5632e44991930e41c223d0
SHA5125e3612abd5da9da165bcd293f40d68aae5414e8f1f31580826d387bec3bbf736029430e2211bc4d6e7302fea2703a909edcc49421c45fee76f5261bcb055d870
-
Filesize
634KB
MD5ea32e4aaace7cab38f05082028749e06
SHA1a1fdb11ec3aba5ae792b1546a1045dbc5506695f
SHA25661dd5bef6d96911c59420fea9a4324926309a208fb5632e44991930e41c223d0
SHA5125e3612abd5da9da165bcd293f40d68aae5414e8f1f31580826d387bec3bbf736029430e2211bc4d6e7302fea2703a909edcc49421c45fee76f5261bcb055d870
-
C:\Users\Admin\AppData\Local\Temp\7zS46F0.tmp\[email protected]\bootstrap.js
Filesize2KB
MD5df13f711e20e9c80171846d4f2f7ae06
SHA156d29cda58427efe0e21d3880d39eb1b0ef60bee
SHA2566c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4
SHA5126c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e
-
C:\Users\Admin\AppData\Local\Temp\7zS46F0.tmp\[email protected]\chrome.manifest
Filesize35B
MD506b40ad7777bdf7e80596f7cee38d575
SHA1b5181d39c163d78cf99a72ef9a221880a84f69ad
SHA256f4cf4ff266d269d31ca7a8b48f5a924a94f0a54029ab45167c8368408ea64513
SHA51205fd4bc4af899e1ebcab4cf4a447b9d8543e27e8c8551447bd83f28de6da52e38f7f993d5e2564fe77b5c2b37a0af0afed0ec055320c3ff335a25bc6a6d4e04d
-
C:\Users\Admin\AppData\Local\Temp\7zS46F0.tmp\[email protected]\content\bg.js
Filesize9KB
MD5e6f00864d45f78d95309efc81565744f
SHA1265b4f6673045368aeeaf4a5e55370f4c934bee7
SHA256245d1dece4cc273864440d8c48cda9cf63c03012fb42ec9724402e54a75e50a6
SHA5127f039271675cf349a8b61e81d725f4c75c9eed3bc4cd2b4ef2dbb1ab110dea07fcfac6c7079f8721e66d695cfafe666a59748148c8a1fb01090cd7ad077a9802
-
C:\Users\Admin\AppData\Local\Temp\7zS46F0.tmp\[email protected]\install.rdf
Filesize596B
MD57fdc11f42f72022fa7d3b3d4b6cf053c
SHA139b8ec0e85b6366b029f17157f19b68a9efcff77
SHA256e6f41c53a3d45d804dad16fdf5d58a1336ae0acac544ed72cf636a579e340a36
SHA512d7ac49e077b29c34cafbe23672293ff389fae1d33712d786c1c51ac4ed0d648daa5990220749c6ea32e22e347313d41bef51dbe70af2e45e46eda365353379ff
-
Filesize
7KB
MD5a77a622a15fee42f778ae384077cb08f
SHA19b97a0d36b2dc5012beaa920af70290e42f796d1
SHA2560db58e1b99f8644dc0919ccb6e041c3ec2d3acf212fee9d5bd8f48670c56b364
SHA5123b5ecc75ab4c65c6c846a97187789d5886bdbc5d074322fa2ed50c840790b14ed0709ad81477cee749073d07c61babe92b214237d8c7ac3db6e6557f7a036963
-
Filesize
143B
MD5e8a68a29282a1908474bdb99e8d23048
SHA139c8800612687960f7f34c48d85e145e575aacf2
SHA256e5e1dcc65c34fa7d060d199458a2d03c6a45ecf1260f09c107ecc045a8cf09ca
SHA51293de8454c1105e47f0c9d386e78de88cc02f0566f6f6dd738472e19c3acb8dfafc67c420f4327bb86c729fcccbabba56abe14f2fe433bac9b094a1dba2168bdd
-
Filesize
144B
MD5fca19198fd8af21016a8b1dec7980002
SHA1fd01a47d14004e17a625efe66cc46a06c786cf40
SHA256332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a
SHA51260f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47
-
Filesize
531B
MD536d98318ab2b3b2585a30984db328afb
SHA1f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5
SHA256ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7
SHA5126f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a
-
Filesize
500B
MD53b28436f4741a047c8d9b243ec11a121
SHA186d9f4b57fdef6457688b254e3b45f1634cd40b0
SHA256ba2a048c3039ffef1faa8f7e2229f79cd7d6eceb7a6bcc3341433b0b9e835925
SHA51247a6c6fdc99d72edcc491b48aad0d8e5151379b6c6a151c36ac29551ed21e7f9de49191bb46f470591d88272e6891b3efefddc74a6393b82485b8ccd4140adaf
-
Filesize
615KB
MD58aa164929f9ee667618bc3654b62c2e2
SHA1d916f23bb705c4b11a8ba321afde8f95336022f1
SHA256a7b1a1ed551f9f6589eb37b1b6eb478e58f59caad9763eb01d8884347fed177e
SHA5127c0c32ceb50e649629dcdc4077982b9c7a10898b693c240c5e92941e206e745561d60b9df12670376837ac762e04b7653ec5dfe7df3118acd38a99729a014c8c
-
Filesize
3KB
MD549ba76d28269851f640db7943effdc70
SHA18237f32c61d14b20faaedc108b9d41cf4bc29a7d
SHA2565a92036f4cd7aebad562c64393891568c96ee3d7fe6f978aa73768146c0257f5
SHA512750f1635dc81ba0a855d492a217d73fe4bc110dd885363c020ed7591c95a477f47a4c51db6645c8dd0d0418d46c387eda2508cdd65c9bc6c1194a3e2492b99fe
-
Filesize
697KB
MD5f104f402e22003705f93d77807b46ee2
SHA17ddf2aa31fa817c0138f3f4689752bf81d4e456d
SHA256f853bf3140935d241a3e07791af9520a7cef2e8a4f5c51a1737923759539d2fb
SHA512d968285b7566e97ff6a9d837040345e614c92c329de4334fb011e92d4d6ba5c207c09ce7267084f3de27fa3a7757416d0a1c96707f083be538ec29f2d82b423c
-
Filesize
615KB
MD58aa164929f9ee667618bc3654b62c2e2
SHA1d916f23bb705c4b11a8ba321afde8f95336022f1
SHA256a7b1a1ed551f9f6589eb37b1b6eb478e58f59caad9763eb01d8884347fed177e
SHA5127c0c32ceb50e649629dcdc4077982b9c7a10898b693c240c5e92941e206e745561d60b9df12670376837ac762e04b7653ec5dfe7df3118acd38a99729a014c8c
-
Filesize
697KB
MD5f104f402e22003705f93d77807b46ee2
SHA17ddf2aa31fa817c0138f3f4689752bf81d4e456d
SHA256f853bf3140935d241a3e07791af9520a7cef2e8a4f5c51a1737923759539d2fb
SHA512d968285b7566e97ff6a9d837040345e614c92c329de4334fb011e92d4d6ba5c207c09ce7267084f3de27fa3a7757416d0a1c96707f083be538ec29f2d82b423c
-
Filesize
697KB
MD5f104f402e22003705f93d77807b46ee2
SHA17ddf2aa31fa817c0138f3f4689752bf81d4e456d
SHA256f853bf3140935d241a3e07791af9520a7cef2e8a4f5c51a1737923759539d2fb
SHA512d968285b7566e97ff6a9d837040345e614c92c329de4334fb011e92d4d6ba5c207c09ce7267084f3de27fa3a7757416d0a1c96707f083be538ec29f2d82b423c
-
Filesize
634KB
MD5ea32e4aaace7cab38f05082028749e06
SHA1a1fdb11ec3aba5ae792b1546a1045dbc5506695f
SHA25661dd5bef6d96911c59420fea9a4324926309a208fb5632e44991930e41c223d0
SHA5125e3612abd5da9da165bcd293f40d68aae5414e8f1f31580826d387bec3bbf736029430e2211bc4d6e7302fea2703a909edcc49421c45fee76f5261bcb055d870