Analysis

  • max time kernel
    135s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 04:52

General

  • Target

    c2b9f0c72876c5dcc521ead33f6d13314c708dd6b1efcdb50277d02451a0a035.exe

  • Size

    2.0MB

  • MD5

    2c9b257c40d15764678fae1a85693804

  • SHA1

    9c64348f7530078bc4ea4384b2a9c6bb4bc079a4

  • SHA256

    c2b9f0c72876c5dcc521ead33f6d13314c708dd6b1efcdb50277d02451a0a035

  • SHA512

    c8ae18c4606fd138049867060cbbcb5dd6542ec760c137e9aea13e63d41410702a5300ebfb2f11f175909f87a19b338869235096417c5c3fa66e4204d3079b92

  • SSDEEP

    24576:h1OYdaOoJo99gJW4tFAlN3DdJ6RND6oSnHA5NPFmTLc4ecFgAKnMpAUK:h1Os+JooJDtFgTy5snHSUc4E3cAUK

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 5 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 9 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 8 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c2b9f0c72876c5dcc521ead33f6d13314c708dd6b1efcdb50277d02451a0a035.exe
    "C:\Users\Admin\AppData\Local\Temp\c2b9f0c72876c5dcc521ead33f6d13314c708dd6b1efcdb50277d02451a0a035.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1244
    • C:\Users\Admin\AppData\Local\Temp\7zS837D.tmp\9LMvYXl6z7WM67P.exe
      .\9LMvYXl6z7WM67P.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops Chrome extension
      • Installs/modifies Browser Helper Object
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:5080
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32.exe /s "C:\Program Files (x86)\GoSavie\hYEAUvvB0lmWUd.x64.dll"
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:3076
        • C:\Windows\system32\regsvr32.exe
          /s "C:\Program Files (x86)\GoSavie\hYEAUvvB0lmWUd.x64.dll"
          4⤵
          • Loads dropped DLL
          • Installs/modifies Browser Helper Object
          PID:4820

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\GoSavie\hYEAUvvB0lmWUd.dat

    Filesize

    6KB

    MD5

    8fdf8f0c93efca94bc14e13b9ce9c919

    SHA1

    3b485c5f5861267d24bc80c030ddbc1c412ee16a

    SHA256

    f00756cfaee56be2178f145a4408870bd35a44ecdf709ad636a310378655318a

    SHA512

    1632c863e5d0432933a3c701c31c34a76ba078a87a227d8660ca1cc3acdb778ef17cfc08cbed1085cb7b96c3b31cf91b5790b4b0960c986ff5e8a36e9fcb747d

  • C:\Program Files (x86)\GoSavie\hYEAUvvB0lmWUd.dll

    Filesize

    611KB

    MD5

    23a76cebd4442a5c81b58da519eac909

    SHA1

    e640584aa3ce6f666098e4b3c69203e1d7484548

    SHA256

    426cf8cfba58e437f1add68a6e8072b773b19e1fb4cad0ee3a065ba2358d06de

    SHA512

    e192b47cbb2ef9f91637cb370866b2233c00c36e5fae5d72ca9da4f478a113fb65128456cd75c57134192deb6157e4c5e3379c19d448ce9364444b37660d2fbd

  • C:\Program Files (x86)\GoSavie\hYEAUvvB0lmWUd.x64.dll

    Filesize

    692KB

    MD5

    dd6c687a7bc8036ff03c493edaf43fea

    SHA1

    cc4258585f61d57dd465270dbb7c0d82a2021a5f

    SHA256

    8bb13e80a99d9631efc47771fa8ee332d880acdc4e1baaabc2ad17c16823091c

    SHA512

    084f49f3b7a76b23a73b2957d227c953903e270f74bf1d7405a5d68e2f716b52db7e7e156469de5425125a3a27856e2e97172279cba70a213f5ba33188cacc8c

  • C:\Program Files (x86)\GoSavie\hYEAUvvB0lmWUd.x64.dll

    Filesize

    692KB

    MD5

    dd6c687a7bc8036ff03c493edaf43fea

    SHA1

    cc4258585f61d57dd465270dbb7c0d82a2021a5f

    SHA256

    8bb13e80a99d9631efc47771fa8ee332d880acdc4e1baaabc2ad17c16823091c

    SHA512

    084f49f3b7a76b23a73b2957d227c953903e270f74bf1d7405a5d68e2f716b52db7e7e156469de5425125a3a27856e2e97172279cba70a213f5ba33188cacc8c

  • C:\Program Files (x86)\GoSavie\hYEAUvvB0lmWUd.x64.dll

    Filesize

    692KB

    MD5

    dd6c687a7bc8036ff03c493edaf43fea

    SHA1

    cc4258585f61d57dd465270dbb7c0d82a2021a5f

    SHA256

    8bb13e80a99d9631efc47771fa8ee332d880acdc4e1baaabc2ad17c16823091c

    SHA512

    084f49f3b7a76b23a73b2957d227c953903e270f74bf1d7405a5d68e2f716b52db7e7e156469de5425125a3a27856e2e97172279cba70a213f5ba33188cacc8c

  • C:\Users\Admin\AppData\Local\Temp\7zS837D.tmp\9LMvYXl6z7WM67P.dat

    Filesize

    6KB

    MD5

    8fdf8f0c93efca94bc14e13b9ce9c919

    SHA1

    3b485c5f5861267d24bc80c030ddbc1c412ee16a

    SHA256

    f00756cfaee56be2178f145a4408870bd35a44ecdf709ad636a310378655318a

    SHA512

    1632c863e5d0432933a3c701c31c34a76ba078a87a227d8660ca1cc3acdb778ef17cfc08cbed1085cb7b96c3b31cf91b5790b4b0960c986ff5e8a36e9fcb747d

  • C:\Users\Admin\AppData\Local\Temp\7zS837D.tmp\9LMvYXl6z7WM67P.exe

    Filesize

    623KB

    MD5

    92a70e40452d88d8c4b46f2ad8361977

    SHA1

    162c9ed1873fca1ef6ab9a2234a2812a203d6b56

    SHA256

    e61d40631449eb3f098a3bde542a0f87fc6f715cfcba919777e299e9ab12c1b8

    SHA512

    ef3aab2f1c816909878f6292bf0c2c4217c086a0bd39e936f8f2df19f2c2a16fbe8354d49048feddffa8e8e1ac7e3063b84fbaf0bdec7024494a87f807269e81

  • C:\Users\Admin\AppData\Local\Temp\7zS837D.tmp\9LMvYXl6z7WM67P.exe

    Filesize

    623KB

    MD5

    92a70e40452d88d8c4b46f2ad8361977

    SHA1

    162c9ed1873fca1ef6ab9a2234a2812a203d6b56

    SHA256

    e61d40631449eb3f098a3bde542a0f87fc6f715cfcba919777e299e9ab12c1b8

    SHA512

    ef3aab2f1c816909878f6292bf0c2c4217c086a0bd39e936f8f2df19f2c2a16fbe8354d49048feddffa8e8e1ac7e3063b84fbaf0bdec7024494a87f807269e81

  • C:\Users\Admin\AppData\Local\Temp\7zS837D.tmp\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    df13f711e20e9c80171846d4f2f7ae06

    SHA1

    56d29cda58427efe0e21d3880d39eb1b0ef60bee

    SHA256

    6c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4

    SHA512

    6c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e

  • C:\Users\Admin\AppData\Local\Temp\7zS837D.tmp\[email protected]\chrome.manifest

    Filesize

    35B

    MD5

    7a94ac2539db9854d227265d9d0f674f

    SHA1

    a267df9097319572b231d24f80a9b00da6f8ce5a

    SHA256

    4771a5e13e9dac50953de245ff2cadfc0b92c9bf331f3a287c6fbf18275ada57

    SHA512

    0ac8d514a92eb87d3a49adc3eee5a549f319ad0efa2a54edf1239411c14f7ec0d550af05a86a9f58eb158dd437e6fdb3d1b1aa8093785fbaa938e6231a8bfdf4

  • C:\Users\Admin\AppData\Local\Temp\7zS837D.tmp\[email protected]\content\bg.js

    Filesize

    7KB

    MD5

    ce0fbf57895e993484f5fc4a8c96b36b

    SHA1

    69a5d91fff2aa9709b7046365265b19c540dacaf

    SHA256

    f4c849e083c79efc1c9fa160e343b96dec225397f0cbdbcc6e2020ba2c0ba8d5

    SHA512

    36d2c6141153881a073503bb2e0c4f9c16a5c4bc51a22e8ae2e1240fe9653d7d7b3bd09a3b682619373a5091f6837208b93d8c09071037675f9aa5153f840612

  • C:\Users\Admin\AppData\Local\Temp\7zS837D.tmp\[email protected]\install.rdf

    Filesize

    595B

    MD5

    79e3143388082a5f79f02dca29510deb

    SHA1

    91b4bace84f9b6779d6116ca0061905c759f88a0

    SHA256

    2551d5af41cdee44ed64901d13cb010288be068bc63de7558697a87e803b0141

    SHA512

    f012ce1dd5b8b9bf97ed8becda81b9402785a36ec76e2891340663468a14189470aa927c3bcc39fca7999a820816c640819d56c860f2de4d9a3effda71d70ed6

  • C:\Users\Admin\AppData\Local\Temp\7zS837D.tmp\chikpojnaoeojpagbecghppdnofdocbi\background.html

    Filesize

    146B

    MD5

    fd3838f4f886edc1ae7931c55572aa58

    SHA1

    44edb8658873cb5ef0a2050be8e5a9e3b308f89c

    SHA256

    49843b544e2073dadb9a5376184d23090a37e954b950b9392741aba54d294751

    SHA512

    4ac6c173e5a47627a1a18ca1299eafebd54dffc504caa1b45bb61ce1005065d566afb400eb617d02d4f80d5f5ad5f223ec72a525beb565c66b71c9e840de5ac7

  • C:\Users\Admin\AppData\Local\Temp\7zS837D.tmp\chikpojnaoeojpagbecghppdnofdocbi\content.js

    Filesize

    144B

    MD5

    fca19198fd8af21016a8b1dec7980002

    SHA1

    fd01a47d14004e17a625efe66cc46a06c786cf40

    SHA256

    332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a

    SHA512

    60f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47

  • C:\Users\Admin\AppData\Local\Temp\7zS837D.tmp\chikpojnaoeojpagbecghppdnofdocbi\lsdb.js

    Filesize

    531B

    MD5

    36d98318ab2b3b2585a30984db328afb

    SHA1

    f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5

    SHA256

    ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7

    SHA512

    6f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a

  • C:\Users\Admin\AppData\Local\Temp\7zS837D.tmp\chikpojnaoeojpagbecghppdnofdocbi\manifest.json

    Filesize

    499B

    MD5

    8027905a1370c51fd23dba365f35d24d

    SHA1

    8f75dfcef1a163258d2326df69018b6ebddb1066

    SHA256

    5b3fb11f4fb38761aa64713eafc884ca2443a006396e4eb95b2385311bf01648

    SHA512

    a35e107f0a191b0469e56d715403884f81bdda5804c30be1cc21c8c6cedc25417350182a01dd1de63aa1142fd0a81007eddc5b0730f1e05479ea9a3226c61336

  • C:\Users\Admin\AppData\Local\Temp\7zS837D.tmp\chikpojnaoeojpagbecghppdnofdocbi\mrTLVCZF6.js

    Filesize

    5KB

    MD5

    881afc6eaa55d723f4ac9da7d489ee82

    SHA1

    e315e2b2d7d7bdd1776a0735a444d5ee39688cac

    SHA256

    ed149357e5d486113cb835479d546bb285db51cb5a7eb542f469aa83eb313916

    SHA512

    8e56023e9dc473a5735eacd27004e7cd7a289f98eef7b93fe085d00331754ef0c4e56253f0aa68c59b551bbbfb229d501d353a4adf64ff2907a978e2871f1f2a

  • C:\Users\Admin\AppData\Local\Temp\7zS837D.tmp\hYEAUvvB0lmWUd.dll

    Filesize

    611KB

    MD5

    23a76cebd4442a5c81b58da519eac909

    SHA1

    e640584aa3ce6f666098e4b3c69203e1d7484548

    SHA256

    426cf8cfba58e437f1add68a6e8072b773b19e1fb4cad0ee3a065ba2358d06de

    SHA512

    e192b47cbb2ef9f91637cb370866b2233c00c36e5fae5d72ca9da4f478a113fb65128456cd75c57134192deb6157e4c5e3379c19d448ce9364444b37660d2fbd

  • C:\Users\Admin\AppData\Local\Temp\7zS837D.tmp\hYEAUvvB0lmWUd.tlb

    Filesize

    3KB

    MD5

    4f10ec1039aef56bdfc26e48d57461b3

    SHA1

    f3dedd15bab08bad8d418f2f7b892defb357670b

    SHA256

    98362dd931236aa92fb7ebd4dcb56986dfc8f5471d48105ab47e3b57249e2eb8

    SHA512

    4162289976a8eeb362bcc3f8f8f54cabdc4d4bff9e91f2bee211c748fc43e47b1a51a54b85aebcc24a79471790aa98ca81ede7a40d946cd00df601762e83f6b3

  • C:\Users\Admin\AppData\Local\Temp\7zS837D.tmp\hYEAUvvB0lmWUd.x64.dll

    Filesize

    692KB

    MD5

    dd6c687a7bc8036ff03c493edaf43fea

    SHA1

    cc4258585f61d57dd465270dbb7c0d82a2021a5f

    SHA256

    8bb13e80a99d9631efc47771fa8ee332d880acdc4e1baaabc2ad17c16823091c

    SHA512

    084f49f3b7a76b23a73b2957d227c953903e270f74bf1d7405a5d68e2f716b52db7e7e156469de5425125a3a27856e2e97172279cba70a213f5ba33188cacc8c

  • memory/3076-149-0x0000000000000000-mapping.dmp

  • memory/4820-152-0x0000000000000000-mapping.dmp

  • memory/5080-132-0x0000000000000000-mapping.dmp