Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 16:53
Static task
static1
Behavioral task
behavioral1
Sample
6fa4f3e23f858ef5e8cb43d4e42e99a3724f04d8df5b1cbcc91fdc6931b5cb64.exe
Resource
win7-20220901-en
General
-
Target
6fa4f3e23f858ef5e8cb43d4e42e99a3724f04d8df5b1cbcc91fdc6931b5cb64.exe
-
Size
2.1MB
-
MD5
6d914ee59a55ae525fa9b5825cf4be89
-
SHA1
6d10a0bfe8345466d8ddcbd2b5374a89a505a047
-
SHA256
6fa4f3e23f858ef5e8cb43d4e42e99a3724f04d8df5b1cbcc91fdc6931b5cb64
-
SHA512
9fde20d76050aff909970f8666b3359e6df06be42aca7858f689afbb0b623557e475aadf92db9aae5cb343bd6e7e65ccff7047985d48194a54553ec71429e06b
-
SSDEEP
49152:h1OsMAxPqbaJ0CqWfTAeP20icuFMDoiXrBSdCIlE05XwjXr3g:h1OTAxib7CqWfTAeP2vaDhtSdpd
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
LBACfJgta846BbY.exepid process 1748 LBACfJgta846BbY.exe -
Loads dropped DLL 4 IoCs
Processes:
6fa4f3e23f858ef5e8cb43d4e42e99a3724f04d8df5b1cbcc91fdc6931b5cb64.exeLBACfJgta846BbY.exeregsvr32.exeregsvr32.exepid process 1492 6fa4f3e23f858ef5e8cb43d4e42e99a3724f04d8df5b1cbcc91fdc6931b5cb64.exe 1748 LBACfJgta846BbY.exe 672 regsvr32.exe 636 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 3 IoCs
Processes:
LBACfJgta846BbY.exedescription ioc process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\lkfelljacgnfbieefpgnjjmfigkfgifp\200\manifest.json LBACfJgta846BbY.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\lkfelljacgnfbieefpgnjjmfigkfgifp\200\manifest.json LBACfJgta846BbY.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\lkfelljacgnfbieefpgnjjmfigkfgifp\200\manifest.json LBACfJgta846BbY.exe -
Installs/modifies Browser Helper Object 2 TTPs 11 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
LBACfJgta846BbY.exeregsvr32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\ LBACfJgta846BbY.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DBC80044-A445-435B-BC74-9C25C1C588A9} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} LBACfJgta846BbY.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} LBACfJgta846BbY.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects LBACfJgta846BbY.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{18DF081C-E8AD-4283-A596-FA578C2EBDC3} LBACfJgta846BbY.exe -
Drops file in Program Files directory 8 IoCs
Processes:
LBACfJgta846BbY.exedescription ioc process File opened for modification C:\Program Files (x86)\Browser Shop\JjIzslAYSsTctK.dat LBACfJgta846BbY.exe File created C:\Program Files (x86)\Browser Shop\JjIzslAYSsTctK.x64.dll LBACfJgta846BbY.exe File opened for modification C:\Program Files (x86)\Browser Shop\JjIzslAYSsTctK.x64.dll LBACfJgta846BbY.exe File created C:\Program Files (x86)\Browser Shop\JjIzslAYSsTctK.dll LBACfJgta846BbY.exe File opened for modification C:\Program Files (x86)\Browser Shop\JjIzslAYSsTctK.dll LBACfJgta846BbY.exe File created C:\Program Files (x86)\Browser Shop\JjIzslAYSsTctK.tlb LBACfJgta846BbY.exe File opened for modification C:\Program Files (x86)\Browser Shop\JjIzslAYSsTctK.tlb LBACfJgta846BbY.exe File created C:\Program Files (x86)\Browser Shop\JjIzslAYSsTctK.dat LBACfJgta846BbY.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
LBACfJgta846BbY.exepid process 1748 LBACfJgta846BbY.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
6fa4f3e23f858ef5e8cb43d4e42e99a3724f04d8df5b1cbcc91fdc6931b5cb64.exeLBACfJgta846BbY.exeregsvr32.exedescription pid process target process PID 1492 wrote to memory of 1748 1492 6fa4f3e23f858ef5e8cb43d4e42e99a3724f04d8df5b1cbcc91fdc6931b5cb64.exe LBACfJgta846BbY.exe PID 1492 wrote to memory of 1748 1492 6fa4f3e23f858ef5e8cb43d4e42e99a3724f04d8df5b1cbcc91fdc6931b5cb64.exe LBACfJgta846BbY.exe PID 1492 wrote to memory of 1748 1492 6fa4f3e23f858ef5e8cb43d4e42e99a3724f04d8df5b1cbcc91fdc6931b5cb64.exe LBACfJgta846BbY.exe PID 1492 wrote to memory of 1748 1492 6fa4f3e23f858ef5e8cb43d4e42e99a3724f04d8df5b1cbcc91fdc6931b5cb64.exe LBACfJgta846BbY.exe PID 1748 wrote to memory of 672 1748 LBACfJgta846BbY.exe regsvr32.exe PID 1748 wrote to memory of 672 1748 LBACfJgta846BbY.exe regsvr32.exe PID 1748 wrote to memory of 672 1748 LBACfJgta846BbY.exe regsvr32.exe PID 1748 wrote to memory of 672 1748 LBACfJgta846BbY.exe regsvr32.exe PID 1748 wrote to memory of 672 1748 LBACfJgta846BbY.exe regsvr32.exe PID 1748 wrote to memory of 672 1748 LBACfJgta846BbY.exe regsvr32.exe PID 1748 wrote to memory of 672 1748 LBACfJgta846BbY.exe regsvr32.exe PID 672 wrote to memory of 636 672 regsvr32.exe regsvr32.exe PID 672 wrote to memory of 636 672 regsvr32.exe regsvr32.exe PID 672 wrote to memory of 636 672 regsvr32.exe regsvr32.exe PID 672 wrote to memory of 636 672 regsvr32.exe regsvr32.exe PID 672 wrote to memory of 636 672 regsvr32.exe regsvr32.exe PID 672 wrote to memory of 636 672 regsvr32.exe regsvr32.exe PID 672 wrote to memory of 636 672 regsvr32.exe regsvr32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fa4f3e23f858ef5e8cb43d4e42e99a3724f04d8df5b1cbcc91fdc6931b5cb64.exe"C:\Users\Admin\AppData\Local\Temp\6fa4f3e23f858ef5e8cb43d4e42e99a3724f04d8df5b1cbcc91fdc6931b5cb64.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\7zSDC7.tmp\LBACfJgta846BbY.exe.\LBACfJgta846BbY.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\Browser Shop\JjIzslAYSsTctK.x64.dll"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\Browser Shop\JjIzslAYSsTctK.x64.dll"4⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
PID:636
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5cbef069ced33e466696a9739aa70b0cb
SHA1e001758721d9d5e29107dae6cf3adb7393709ab1
SHA25688f1347363fce739b3da4a6c5b81fc2fd9b8bf240e8ad92655d8148a6a49f376
SHA5129572a46aec07fcbfe50206a2cbba3c6c4d0f0a77331da09ca84668ea0330460d31963029aaf3fde8b08b84364ef2d54ac47b3a5106f5a675912e9ff13f2a6ce8
-
Filesize
697KB
MD509b1827343abfccf344d2b04268c1b87
SHA11c60bbd56c0b33be582c3dac053e9b28b94d588b
SHA256a9181af1ead8778d27a22e862145aa5e1dd7ac40cf6e994f8c6b1ae7b58f302a
SHA512cb4ac4ff93405372a7ab65e1910d58f88a30c9b4d62c06b84fd3fd5f51ca10459c351efcc394418e27aafa27e87bd1a359d20006804da8f171b37cf2fd26f965
-
Filesize
617KB
MD5840d829dddf8d035522e4f3547f72799
SHA11f669f414a0935ef806bdb8a93d2755f00104519
SHA256a8405b5162305f768093c227ad9ece6ddd74f6dfe17fd0878a4e64e61e125d42
SHA512e447ed7f6bbaacd8523984bae1584f39c4c38e93abd43d4e25c8056143d3228a3993d7aab8fd92d2e6baf0157a1d8638a1254eed037f3eb64250b6ca586913c7
-
Filesize
3KB
MD56fb4d3c40d62e1e378e92280f2cd93a4
SHA1cdcd20abfab5c8f24b0bf2e24b43930a33b4d147
SHA256ffe3ee2134494c6e175cf01e0fc518402384a1f79a46a37f441e6e3c74183983
SHA512960ecc2ce3d9ee0a828780d0770a4966211a55c8587e36b460c3c5d2bf7a338bd538c13bb07e93b647b5c1056fc0c14f90cf59a4b13508350922cda38ab6538d
-
Filesize
697KB
MD509b1827343abfccf344d2b04268c1b87
SHA11c60bbd56c0b33be582c3dac053e9b28b94d588b
SHA256a9181af1ead8778d27a22e862145aa5e1dd7ac40cf6e994f8c6b1ae7b58f302a
SHA512cb4ac4ff93405372a7ab65e1910d58f88a30c9b4d62c06b84fd3fd5f51ca10459c351efcc394418e27aafa27e87bd1a359d20006804da8f171b37cf2fd26f965
-
Filesize
6KB
MD5cbef069ced33e466696a9739aa70b0cb
SHA1e001758721d9d5e29107dae6cf3adb7393709ab1
SHA25688f1347363fce739b3da4a6c5b81fc2fd9b8bf240e8ad92655d8148a6a49f376
SHA5129572a46aec07fcbfe50206a2cbba3c6c4d0f0a77331da09ca84668ea0330460d31963029aaf3fde8b08b84364ef2d54ac47b3a5106f5a675912e9ff13f2a6ce8
-
Filesize
634KB
MD539bca0c0295e43a1d256f93c4bc41a7d
SHA1163629228f4ad397c594ae4acc1162d2990f7d5f
SHA2562e46c5d7d549885057d92525f35b60a19cb428600a397245e5f6ce0238b5e1cd
SHA512e16570bea11aa8680f4e547f099e8c099c1654e6a3060fca871a42dffb9e256811f5aa9bba9f00dc14b218ad32b56c916987b3a270893540a0992f832bcf2a4d
-
Filesize
634KB
MD539bca0c0295e43a1d256f93c4bc41a7d
SHA1163629228f4ad397c594ae4acc1162d2990f7d5f
SHA2562e46c5d7d549885057d92525f35b60a19cb428600a397245e5f6ce0238b5e1cd
SHA512e16570bea11aa8680f4e547f099e8c099c1654e6a3060fca871a42dffb9e256811f5aa9bba9f00dc14b218ad32b56c916987b3a270893540a0992f832bcf2a4d
-
Filesize
140B
MD513d35498935976fda85ff426c1a14b33
SHA1b128c30b2785584dfab00a765fef249a080d1946
SHA256a3fd1edf449e8c9b77f4caceac2fd6c391046ce5424d706b926a6040a803861e
SHA512c3a9d9f97040a5d5e75f28b12dc78760d3e58e1068c35e0e925e5c85ec0aee772f2b9e762dbbb0d4438643e2eb112bbdbdf590b28ba543715451a3effeb858e8
-
Filesize
144B
MD5fca19198fd8af21016a8b1dec7980002
SHA1fd01a47d14004e17a625efe66cc46a06c786cf40
SHA256332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a
SHA51260f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47
-
Filesize
531B
MD536d98318ab2b3b2585a30984db328afb
SHA1f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5
SHA256ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7
SHA5126f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a
-
Filesize
504B
MD5d532994175ac6e4e8fea2ae07edef6ff
SHA15646eab3cebc8b0a804103b63f08a63db784a77d
SHA256f9a190f8cfafdeddfe9627366bcd108e42b7fa07c8d074f1570bd77489f39c4d
SHA512ba6ddc11423c0b0d93de3e3ecb9eeebe29470723282165aa67de4329a5f9af7e390869a7cbd0834c1ff115a1ed0a274bed686b4b6630e98b268ec1f2a9a8dadb
-
Filesize
5KB
MD59a577befbc723c9174ac90de24494d20
SHA12435ade2bd4d0d88f694fb7e88d6ec098cc9ab50
SHA256eb383753eb6535cf09616bc55b451c70ed18ad5735da865a84142fd751b0a472
SHA512fd9de2ceb0ccc56b74e946b1f80fd920fe278a861a4b904fb4556ced0cc41ebfb4834ed471f4d01fbf7c5833ddf97b2442e12a639a784052b908df4df07272e5
-
C:\Users\Admin\AppData\Local\Temp\7zSDC7.tmp\[email protected]\bootstrap.js
Filesize2KB
MD5df13f711e20e9c80171846d4f2f7ae06
SHA156d29cda58427efe0e21d3880d39eb1b0ef60bee
SHA2566c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4
SHA5126c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e
-
C:\Users\Admin\AppData\Local\Temp\7zSDC7.tmp\[email protected]\chrome.manifest
Filesize35B
MD5695ca48307c329c09872711bce3faa42
SHA1798e8fc9f1375475d28c4175d1bc1f7fe4f057ab
SHA256b77482d12943ae3fb798aeb62c5dd03ffa29b16c1554078201fbcde475a97a74
SHA512cc98c8f464b07e6004d2ea94bf3e5636883c05ffab066b1c9458674226469dd42fae9ef8a897565785444da3b4e4c8afa45bd231373902936e4dc77cf20cc6df
-
C:\Users\Admin\AppData\Local\Temp\7zSDC7.tmp\[email protected]\content\bg.js
Filesize7KB
MD56dac1605aaf42004effa4e68dd4af0ec
SHA1284eb4173470ac7bb5ea90d8ecbcd93a12be9b43
SHA256d15074939a0ff75949d237b68d686d4c7f36ea45b08fce444ff6f8080f6e8492
SHA5120c39b64c577cb17e71a09f51495fe8b89302f2a9e886083731a6957f1c55b4150f33fb17d42b59003bd012d2c22b7753b9253b2434d0f5a9148a49bd8b24e898
-
C:\Users\Admin\AppData\Local\Temp\7zSDC7.tmp\[email protected]\install.rdf
Filesize598B
MD5dc1951b6eafda456d6c79eccb200e431
SHA167a2dea2d6b72d597ac368c97b34e24cc58c5702
SHA2562972cc95464fc369fcd88342c30c505a518b2bc6c8e94c45c9790e7bb99eb3b2
SHA512d3548c7e7bb6f56ae33482bcee257d30ac0ee169c5e6a619fa10b13287ab1512d1c6c2601797b203899fec87db27313556884fcb0d80f3decee3c3bb0918e4cd
-
Filesize
617KB
MD5840d829dddf8d035522e4f3547f72799
SHA11f669f414a0935ef806bdb8a93d2755f00104519
SHA256a8405b5162305f768093c227ad9ece6ddd74f6dfe17fd0878a4e64e61e125d42
SHA512e447ed7f6bbaacd8523984bae1584f39c4c38e93abd43d4e25c8056143d3228a3993d7aab8fd92d2e6baf0157a1d8638a1254eed037f3eb64250b6ca586913c7
-
Filesize
697KB
MD509b1827343abfccf344d2b04268c1b87
SHA11c60bbd56c0b33be582c3dac053e9b28b94d588b
SHA256a9181af1ead8778d27a22e862145aa5e1dd7ac40cf6e994f8c6b1ae7b58f302a
SHA512cb4ac4ff93405372a7ab65e1910d58f88a30c9b4d62c06b84fd3fd5f51ca10459c351efcc394418e27aafa27e87bd1a359d20006804da8f171b37cf2fd26f965
-
Filesize
697KB
MD509b1827343abfccf344d2b04268c1b87
SHA11c60bbd56c0b33be582c3dac053e9b28b94d588b
SHA256a9181af1ead8778d27a22e862145aa5e1dd7ac40cf6e994f8c6b1ae7b58f302a
SHA512cb4ac4ff93405372a7ab65e1910d58f88a30c9b4d62c06b84fd3fd5f51ca10459c351efcc394418e27aafa27e87bd1a359d20006804da8f171b37cf2fd26f965
-
Filesize
634KB
MD539bca0c0295e43a1d256f93c4bc41a7d
SHA1163629228f4ad397c594ae4acc1162d2990f7d5f
SHA2562e46c5d7d549885057d92525f35b60a19cb428600a397245e5f6ce0238b5e1cd
SHA512e16570bea11aa8680f4e547f099e8c099c1654e6a3060fca871a42dffb9e256811f5aa9bba9f00dc14b218ad32b56c916987b3a270893540a0992f832bcf2a4d