Analysis
-
max time kernel
45s -
max time network
88s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 15:54
Static task
static1
Behavioral task
behavioral1
Sample
cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe
Resource
win10v2004-20221111-en
General
-
Target
cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe
-
Size
4.3MB
-
MD5
023815e5bbb2622361efe9726391f521
-
SHA1
beefdc231b89e84c91e8835b348d23daba44553a
-
SHA256
cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753
-
SHA512
b3feff6b15dd2677b921ac3f16a808c9cf5515a8cfd805fd228e5e97be2537c1a2e690368eabbb45bca71bcf29b8dd8997ef1eac9164eaa0e30e7e374eca9c70
-
SSDEEP
98304:6O1W+GLmuEcyneLfroGvNdZ7tJZqycRUa2:6oFuEKvNZJL3l
Malware Config
Signatures
-
Registers COM server for autorun 1 TTPs 4 IoCs
Processes:
regsvr32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{00F8E516-5178-DEF8-FA15-CBBF58E1A1FE}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{00F8E516-5178-DEF8-FA15-CBBF58E1A1FE}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{00F8E516-5178-DEF8-FA15-CBBF58E1A1FE}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{00F8E516-5178-DEF8-FA15-CBBF58E1A1FE}\InprocServer32\ = "C:\\Program Files (x86)\\GoSave\\Nbo3nYj1c.x64.dll" regsvr32.exe -
Loads dropped DLL 3 IoCs
Processes:
cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exeregsvr32.exeregsvr32.exepid process 1216 cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe 656 regsvr32.exe 856 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 3 IoCs
Processes:
cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exedescription ioc process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ilioodpjnpjkgmlicfejfoopbffljpcc\2.0\manifest.json cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\ilioodpjnpjkgmlicfejfoopbffljpcc\2.0\manifest.json cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\ilioodpjnpjkgmlicfejfoopbffljpcc\2.0\manifest.json cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe -
Installs/modifies Browser Helper Object 2 TTPs 8 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exeregsvr32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{00F8E516-5178-DEF8-FA15-CBBF58E1A1FE}\ = "GoSave" cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{00F8E516-5178-DEF8-FA15-CBBF58E1A1FE}\NoExplorer = "1" cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{00F8E516-5178-DEF8-FA15-CBBF58E1A1FE} cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{00F8E516-5178-DEF8-FA15-CBBF58E1A1FE} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{00F8E516-5178-DEF8-FA15-CBBF58E1A1FE}\ = "GoSave" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{00F8E516-5178-DEF8-FA15-CBBF58E1A1FE}\NoExplorer = "1" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{00F8E516-5178-DEF8-FA15-CBBF58E1A1FE} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{00F8E516-5178-DEF8-FA15-CBBF58E1A1FE} cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe -
Drops file in System32 directory 4 IoCs
Processes:
cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exedescription ioc process File opened for modification C:\Windows\System32\GroupPolicy cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe -
Drops file in Program Files directory 8 IoCs
Processes:
cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exedescription ioc process File created C:\Program Files (x86)\GoSave\Nbo3nYj1c.x64.dll cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe File opened for modification C:\Program Files (x86)\GoSave\Nbo3nYj1c.x64.dll cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe File created C:\Program Files (x86)\GoSave\Nbo3nYj1c.dll cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe File opened for modification C:\Program Files (x86)\GoSave\Nbo3nYj1c.dll cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe File created C:\Program Files (x86)\GoSave\Nbo3nYj1c.tlb cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe File opened for modification C:\Program Files (x86)\GoSave\Nbo3nYj1c.tlb cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe File created C:\Program Files (x86)\GoSave\Nbo3nYj1c.dat cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe File opened for modification C:\Program Files (x86)\GoSave\Nbo3nYj1c.dat cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe -
Processes:
cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exeregsvr32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{00F8E516-5178-DEF8-FA15-CBBF58E1A1FE} cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe Key deleted \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{00F8E516-5178-DEF8-FA15-CBBF58E1A1FE} cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe Key deleted \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe Key deleted \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{00F8E516-5178-DEF8-FA15-CBBF58E1A1FE} regsvr32.exe Key deleted \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{00F8E516-5178-DEF8-FA15-CBBF58E1A1FE} regsvr32.exe -
Modifies registry class 64 IoCs
Processes:
regsvr32.execc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{00F8E516-5178-DEF8-FA15-CBBF58E1A1FE}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32 cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC} cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{00F8E516-5178-DEF8-FA15-CBBF58E1A1FE}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\ProxyStubClsid32 cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\GGoSave.GGoSave\ = "GoSave" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{00F8E516-5178-DEF8-FA15-CBBF58E1A1FE} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{00F8E516-5178-DEF8-FA15-CBBF58E1A1FE}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\GGoSave.GGoSave.2.0\CLSID\ = "{00F8E516-5178-DEF8-FA15-CBBF58E1A1FE}" cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{00F8E516-5178-DEF8-FA15-CBBF58E1A1FE}\ProgID cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC} cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ProxyStubClsid32 cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\GGoSave.GGoSave\CurVer\ = "GGoSave.2.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{00F8E516-5178-DEF8-FA15-CBBF58E1A1FE}\VersionIndependentProgID\ = "GGoSave" cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ProxyStubClsid32 cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ProxyStubClsid32 cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\GGoSave.GGoSave.2.0\ = "GoSave" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{00F8E516-5178-DEF8-FA15-CBBF58E1A1FE}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\GGoSave.GGoSave cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\GGoSave.GGoSave\CurVer\ = "GGoSave.2.0" cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{00F8E516-5178-DEF8-FA15-CBBF58E1A1FE}\ProgID\ = "GGoSave.2.0" cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ = "IRegistry" cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{00F8E516-5178-DEF8-FA15-CBBF58E1A1FE}\VersionIndependentProgID\ = "GGoSave" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{00F8E516-5178-DEF8-FA15-CBBF58E1A1FE}\Implemented Categories cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ = "IPlaghinMein" cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\TypeLib cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib\Version = "1.0" cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ = "IRegistry" cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib\Version = "1.0" cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\GGoSave.GGoSave.2.0\CLSID\ = "{00F8E516-5178-DEF8-FA15-CBBF58E1A1FE}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32\ = "C:\\Program Files (x86)\\GoSave\\Nbo3nYj1c.tlb" cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib\Version = "1.0" cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\ProxyStubClsid32 cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\GGoSave.GGoSave\CLSID\ = "{00F8E516-5178-DEF8-FA15-CBBF58E1A1FE}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{00F8E516-5178-DEF8-FA15-CBBF58E1A1FE}\ProgID\ = "GGoSave.2.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{00F8E516-5178-DEF8-FA15-CBBF58E1A1FE}\Programmable regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{00F8E516-5178-DEF8-FA15-CBBF58E1A1FE}\InprocServer32 cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{00F8E516-5178-DEF8-FA15-CBBF58E1A1FE}\Programmable cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{00F8E516-5178-DEF8-FA15-CBBF58E1A1FE}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{00F8E516-5178-DEF8-FA15-CBBF58E1A1FE}\InprocServer32\ThreadingModel = "Apartment" cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ = "IPlaghinMein" cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF} cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{00F8E516-5178-DEF8-FA15-CBBF58E1A1FE}\InprocServer32\ = "C:\\Program Files (x86)\\GoSave\\Nbo3nYj1c.x64.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\GGoSave.GGoSave.2.0\CLSID cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{00F8E516-5178-DEF8-FA15-CBBF58E1A1FE}\Implemented Categories\{59FB2056-D625-48D0-A944-1A85B5AB2640} cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS\ = "0" cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0} cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\TypeLib\Version = "1.0" cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ProxyStubClsid32 cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{00F8E516-5178-DEF8-FA15-CBBF58E1A1FE}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\GGoSave.GGoSave\CLSID cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\GGoSave.GGoSave\CLSID\ = "{00F8E516-5178-DEF8-FA15-CBBF58E1A1FE}" cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR\ = "C:\\Program Files (x86)\\GoSave" cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\TypeLib\Version = "1.0" cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exepid process 1216 cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe 1216 cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe 1216 cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exeregsvr32.exedescription pid process target process PID 1216 wrote to memory of 656 1216 cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe regsvr32.exe PID 1216 wrote to memory of 656 1216 cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe regsvr32.exe PID 1216 wrote to memory of 656 1216 cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe regsvr32.exe PID 1216 wrote to memory of 656 1216 cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe regsvr32.exe PID 1216 wrote to memory of 656 1216 cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe regsvr32.exe PID 1216 wrote to memory of 656 1216 cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe regsvr32.exe PID 1216 wrote to memory of 656 1216 cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe regsvr32.exe PID 656 wrote to memory of 856 656 regsvr32.exe regsvr32.exe PID 656 wrote to memory of 856 656 regsvr32.exe regsvr32.exe PID 656 wrote to memory of 856 656 regsvr32.exe regsvr32.exe PID 656 wrote to memory of 856 656 regsvr32.exe regsvr32.exe PID 656 wrote to memory of 856 656 regsvr32.exe regsvr32.exe PID 656 wrote to memory of 856 656 regsvr32.exe regsvr32.exe PID 656 wrote to memory of 856 656 regsvr32.exe regsvr32.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{00F8E516-5178-DEF8-FA15-CBBF58E1A1FE} = "1" cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe"C:\Users\Admin\AppData\Local\Temp\cc3c85b050e2c5e2a5acceaf4a6e7a98f3f7bd41b67b0d011a0f09e2f2d86753.exe"1⤵
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1216 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\GoSave\Nbo3nYj1c.x64.dll"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\GoSave\Nbo3nYj1c.x64.dll"3⤵
- Registers COM server for autorun
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies Internet Explorer settings
- Modifies registry class
PID:856
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD588b080af51fa86f03c2c8fa91007e16e
SHA140e97fc6f5ed8f3bff426c6f62be36a5b77ad9e3
SHA2564553e672b074ddf664d24746150c9e4079de911cdd580343047e1c724171eef1
SHA512a1712d4c3c132c1f45f9eacc49a6fc9864896cc86bb3ed30259718c8a0a93564739fa106fad3208819241c4b085ab634b46ae0b55228f5d786b873fd85d80197
-
Filesize
3KB
MD58b0eff5b37b07646ad8af3652b2a07d9
SHA12871ea51fc456d896e92008ba4786b1b6dafc766
SHA256ea7fe048436847add57a464f3b7e9254d572b02245139e590e826a8e6b4a1876
SHA512f369da1d407d4973b6e86997200384b11bd05a3c03a38f8378bd406e041b782ca67046b722046c01a0be7075a68cfb567ab899a491bc5f4818b7adb2d4cc5977
-
Filesize
702KB
MD56bef9cac4a41368acf66c58c0220e9f0
SHA1b3a8cad8c98fea28440a7a7dcf9ed8f17f0e8543
SHA2560cc95db9ff714315ad9f5edd95551bd3dcc558035ce1a88cd975aa5baae68183
SHA512f9b9e868b473b60743e976775a5e5be3c3c12fc355de813f5330071c72d19c84be25f24f7f7b556298cf91826416feabc1902abe72a31ee4bafdff27c56eab61
-
Filesize
621KB
MD55a952460a846f9225ade28210dafcdcc
SHA1754ca01c829a7400ed9d71f4381bcefa1a2baf8b
SHA2563072d493d8b8e4df3885fed083f22c5ea80ed02060ef1ac4134593be8d93ecab
SHA512429e27df9195d8b3c80a3d5fb1a243d6d04c8a4f7e3dc5e662f6f557c3853d9405c40b697e311bae1a4b07dfc608ad299afe4f06cadd4078f799e594535f485b
-
Filesize
702KB
MD56bef9cac4a41368acf66c58c0220e9f0
SHA1b3a8cad8c98fea28440a7a7dcf9ed8f17f0e8543
SHA2560cc95db9ff714315ad9f5edd95551bd3dcc558035ce1a88cd975aa5baae68183
SHA512f9b9e868b473b60743e976775a5e5be3c3c12fc355de813f5330071c72d19c84be25f24f7f7b556298cf91826416feabc1902abe72a31ee4bafdff27c56eab61
-
Filesize
702KB
MD56bef9cac4a41368acf66c58c0220e9f0
SHA1b3a8cad8c98fea28440a7a7dcf9ed8f17f0e8543
SHA2560cc95db9ff714315ad9f5edd95551bd3dcc558035ce1a88cd975aa5baae68183
SHA512f9b9e868b473b60743e976775a5e5be3c3c12fc355de813f5330071c72d19c84be25f24f7f7b556298cf91826416feabc1902abe72a31ee4bafdff27c56eab61