Analysis

  • max time kernel
    148s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 15:55

General

  • Target

    ca286f9152cf9d43a4b65e704c591d58a64f37c9567dde7f7af39f7f200f0a29.exe

  • Size

    4.0MB

  • MD5

    2fe24729cdd975952e7cf09cd8e97d85

  • SHA1

    f4e63674c4852b76231184739466b3e94cc897fc

  • SHA256

    ca286f9152cf9d43a4b65e704c591d58a64f37c9567dde7f7af39f7f200f0a29

  • SHA512

    dccbf4585c56e4bbaff511ac53422b6c598e7f2978f4fbbfd9e4c71fd95b199eb4ed9fde720852aa6128850db37a224fa65a3c6f1e48a0d385e17f0be756e8cf

  • SSDEEP

    49152:fKqE9F/nKUxRmBRVBCkGIGrqgKOVyW8Gq42kjAH3CyigAm2bNrJMyKKCctNm2c:F2pxwBRVBrGAO4W8Gp2kjAyJgAm25tM

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs 4 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 8 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 8 IoCs
  • Modifies Internet Explorer settings 1 TTPs 8 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ca286f9152cf9d43a4b65e704c591d58a64f37c9567dde7f7af39f7f200f0a29.exe
    "C:\Users\Admin\AppData\Local\Temp\ca286f9152cf9d43a4b65e704c591d58a64f37c9567dde7f7af39f7f200f0a29.exe"
    1⤵
    • Loads dropped DLL
    • Installs/modifies Browser Helper Object
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:3440
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32.exe /s "C:\Program Files (x86)\YYoutuebeAduBlocke\EizbZzAmnqhgLp.x64.dll"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:4184
      • C:\Windows\system32\regsvr32.exe
        /s "C:\Program Files (x86)\YYoutuebeAduBlocke\EizbZzAmnqhgLp.x64.dll"
        3⤵
        • Registers COM server for autorun
        • Loads dropped DLL
        • Installs/modifies Browser Helper Object
        • Modifies Internet Explorer settings
        • Modifies registry class
        PID:4628

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Browser Extensions

1
T1176

Defense Evasion

Modify Registry

3
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\YYoutuebeAduBlocke\EizbZzAmnqhgLp.dat
    Filesize

    4KB

    MD5

    18afe8b3ba1d7225fbde4b2f22a9268b

    SHA1

    fa6f6fb15a3c55922f746f84eada8d73f5046ad9

    SHA256

    0d4504d1d285bf153914886faf8b00d26e31497644de191e98a645d0db3e1815

    SHA512

    6394484f996360940c1427be690d6cb13e54c0e2f1b069d53cade19fc5c32a2329f393f7b31d88bbcf24d4a7c782ab05fd13ac647e6f8368a9af22c61ee0c039

  • C:\Program Files (x86)\YYoutuebeAduBlocke\EizbZzAmnqhgLp.dll
    Filesize

    622KB

    MD5

    73c59cc15195b405ee191c50f0e3ac08

    SHA1

    27245e3abd8cfa100f97e741e5b81f9e0f1740e9

    SHA256

    b18df3a44be8b63a1e779d583777c9a4ec3cf5be5e1814f2cf3e75b41791077b

    SHA512

    749a1a6d6e67a42f23f9d710fd5095363796b65e9a589212bd9cfcde1f811e09764f004920947a91e6818189dcce93da8f499634b76fcb422b5cfe2cb71d1dca

  • C:\Program Files (x86)\YYoutuebeAduBlocke\EizbZzAmnqhgLp.tlb
    Filesize

    3KB

    MD5

    4a115bee5243fe12bb4789b2dd3240dc

    SHA1

    e9b002e9436ebd9cd6eeeb1016219bf99fd6fa62

    SHA256

    234096310cf75df66fef0439127e636aea5444bcd4ce8cc1d6e91e3eb218c8b0

    SHA512

    3d2b6d211b6e47ad3e0860e2973b72cd72e4da552f52823f34c9881e667b5d4105388d00fb6298a9b94bd02e111a8ce18c5a3c79fc5ca78a03438fa025fb99e9

  • C:\Program Files (x86)\YYoutuebeAduBlocke\EizbZzAmnqhgLp.x64.dll
    Filesize

    699KB

    MD5

    4541758f3684e20c501490e7cea65ed7

    SHA1

    5f5caa0078a90006b39c18055678dd5cd4362c72

    SHA256

    a2baf6143f27ba3b766856c91fecda346e69fbcba0b3bae850f8b1ff014c5b5c

    SHA512

    18e0a02ad19ca39412bf966e30dd651dda623230fec49c909eabedfcd6e532c8017993d77e56d85cf35e9ea0fe7747f2d2885eea1fa9b324d2e4365ac5a39c78

  • C:\Program Files (x86)\YYoutuebeAduBlocke\EizbZzAmnqhgLp.x64.dll
    Filesize

    699KB

    MD5

    4541758f3684e20c501490e7cea65ed7

    SHA1

    5f5caa0078a90006b39c18055678dd5cd4362c72

    SHA256

    a2baf6143f27ba3b766856c91fecda346e69fbcba0b3bae850f8b1ff014c5b5c

    SHA512

    18e0a02ad19ca39412bf966e30dd651dda623230fec49c909eabedfcd6e532c8017993d77e56d85cf35e9ea0fe7747f2d2885eea1fa9b324d2e4365ac5a39c78

  • C:\Program Files (x86)\YYoutuebeAduBlocke\EizbZzAmnqhgLp.x64.dll
    Filesize

    699KB

    MD5

    4541758f3684e20c501490e7cea65ed7

    SHA1

    5f5caa0078a90006b39c18055678dd5cd4362c72

    SHA256

    a2baf6143f27ba3b766856c91fecda346e69fbcba0b3bae850f8b1ff014c5b5c

    SHA512

    18e0a02ad19ca39412bf966e30dd651dda623230fec49c909eabedfcd6e532c8017993d77e56d85cf35e9ea0fe7747f2d2885eea1fa9b324d2e4365ac5a39c78

  • memory/3440-132-0x0000000002E40000-0x0000000002EE7000-memory.dmp
    Filesize

    668KB

  • memory/4184-138-0x0000000000000000-mapping.dmp
  • memory/4628-141-0x0000000000000000-mapping.dmp