Analysis

  • max time kernel
    37s
  • max time network
    30s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 16:55

General

  • Target

    6df0fa8b714deb52b2cb2df9a850b3c58ce13b2c121c4ed01fedf6ae588e04c6.exe

  • Size

    3.6MB

  • MD5

    004d4f824a30d29ef597349953815e14

  • SHA1

    5b60af1e57e315b4df33944811d8d1124e9d9110

  • SHA256

    6df0fa8b714deb52b2cb2df9a850b3c58ce13b2c121c4ed01fedf6ae588e04c6

  • SHA512

    838375f0d2360cb2697e593c4f6736302ddff578a7df9116e08723112b0ac9b6eea287d10874dd3b37571bc645be78ad893254187fc130ac231fe9f1e4353e11

  • SSDEEP

    98304:3K6hjE5CMqSC2pn6x8DsYrIaT5za7dBBNWAHWq:3KsjWCU4rWAH

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs 4 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 8 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 8 IoCs
  • Modifies Internet Explorer settings 1 TTPs 8 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6df0fa8b714deb52b2cb2df9a850b3c58ce13b2c121c4ed01fedf6ae588e04c6.exe
    "C:\Users\Admin\AppData\Local\Temp\6df0fa8b714deb52b2cb2df9a850b3c58ce13b2c121c4ed01fedf6ae588e04c6.exe"
    1⤵
    • Loads dropped DLL
    • Installs/modifies Browser Helper Object
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:908
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32.exe /s "C:\Program Files (x86)\Adblocker\KKaa1AnAd.x64.dll"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1444
      • C:\Windows\system32\regsvr32.exe
        /s "C:\Program Files (x86)\Adblocker\KKaa1AnAd.x64.dll"
        3⤵
        • Registers COM server for autorun
        • Loads dropped DLL
        • Installs/modifies Browser Helper Object
        • Modifies Internet Explorer settings
        • Modifies registry class
        PID:944

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Adblocker\KKaa1AnAd.dat

    Filesize

    4KB

    MD5

    a356db7e20c13bcaf6efe38fe8c482e6

    SHA1

    7c9a3609e2eacf300f6400b728490d80e60fbb09

    SHA256

    c6404e81f33ecb829d8ff179de0fd556f5c9ce2cce92ffe86ab72995d1b2338d

    SHA512

    4b26dd58cf472a6d97d6e4b4e3e9fe5f07f284331ece19bfd74828766e0bc6ea0a080323482da06ed2afc75dcaaac2bbaea213b7c8d74cbbbfc06a47816b167a

  • C:\Program Files (x86)\Adblocker\KKaa1AnAd.tlb

    Filesize

    3KB

    MD5

    81264db3941e0b187881f0490ea39ecd

    SHA1

    8320d25693da84305147fa51c3a2acb26644fc8c

    SHA256

    3d3647378d406d4189f9e4692692555ebfa84d6a8ea36904fff04e09c26f6768

    SHA512

    87ead8c01ef8170fa3fb974bb4fdca8c4532dd93c81c44cc56ea5e9697bcda97fa8dfc7f90f2f482ec6d6a1c50d350d2e110fb2d4ffe54b584ca3fbfd065d392

  • C:\Program Files (x86)\Adblocker\KKaa1AnAd.x64.dll

    Filesize

    703KB

    MD5

    f40332de702148bcbc725d8537409f22

    SHA1

    aa36973eed31d6d5fcbad6fcda10d27c473c76a1

    SHA256

    b0fe61520d126c89481edc73b9544ff9c88ddae6fcd4779e69b9682919dbc42d

    SHA512

    12d8aee285d80ad37c4f7bc9ea50bf89e5afdb74e1afec51f82a84798fff5c8bcd320dc90d840cfff1462f4723321fda497a7230c8dbb766892626a10238644e

  • \Program Files (x86)\Adblocker\KKaa1AnAd.dll

    Filesize

    622KB

    MD5

    9f3a7741ae87aff6f9e528c33bb3a9e7

    SHA1

    18ad18b0bd573c4bc286b36820e6a47814fdeff4

    SHA256

    b7a107d12a6c0f0227ca88cea7c3ef46cec41a4bae93846dd6175857b823603b

    SHA512

    d06fdd64a207f4fa5bc343ade79e4161642de4782cc81cb45071532dc19fd098ae8974befed5114e2048d29c0241fca1404812b9ba065f2ea784e1f1087fd39b

  • \Program Files (x86)\Adblocker\KKaa1AnAd.x64.dll

    Filesize

    703KB

    MD5

    f40332de702148bcbc725d8537409f22

    SHA1

    aa36973eed31d6d5fcbad6fcda10d27c473c76a1

    SHA256

    b0fe61520d126c89481edc73b9544ff9c88ddae6fcd4779e69b9682919dbc42d

    SHA512

    12d8aee285d80ad37c4f7bc9ea50bf89e5afdb74e1afec51f82a84798fff5c8bcd320dc90d840cfff1462f4723321fda497a7230c8dbb766892626a10238644e

  • \Program Files (x86)\Adblocker\KKaa1AnAd.x64.dll

    Filesize

    703KB

    MD5

    f40332de702148bcbc725d8537409f22

    SHA1

    aa36973eed31d6d5fcbad6fcda10d27c473c76a1

    SHA256

    b0fe61520d126c89481edc73b9544ff9c88ddae6fcd4779e69b9682919dbc42d

    SHA512

    12d8aee285d80ad37c4f7bc9ea50bf89e5afdb74e1afec51f82a84798fff5c8bcd320dc90d840cfff1462f4723321fda497a7230c8dbb766892626a10238644e

  • memory/908-54-0x0000000075C81000-0x0000000075C83000-memory.dmp

    Filesize

    8KB

  • memory/908-56-0x0000000000750000-0x00000000007F4000-memory.dmp

    Filesize

    656KB

  • memory/944-69-0x0000000000000000-mapping.dmp

  • memory/944-70-0x000007FEFBA41000-0x000007FEFBA43000-memory.dmp

    Filesize

    8KB

  • memory/1444-65-0x0000000000000000-mapping.dmp