Analysis
-
max time kernel
42s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 05:05
Static task
static1
Behavioral task
behavioral1
Sample
6f5f3586dc9a2588b67d29c0fedc54499272a0d55c7a3c480d91de7e638b401e.exe
Resource
win7-20220812-en
General
-
Target
6f5f3586dc9a2588b67d29c0fedc54499272a0d55c7a3c480d91de7e638b401e.exe
-
Size
2.1MB
-
MD5
1dbc31e157e8a783b78f534785ec0c25
-
SHA1
6aa56c88422b45dbf7b1c11d5b9510bf68f2a202
-
SHA256
6f5f3586dc9a2588b67d29c0fedc54499272a0d55c7a3c480d91de7e638b401e
-
SHA512
b8a58f492e4a86cd3ac7451036bb5a61262e9ef71b6c454296b91da5bee31b1a4d446ce31089db91da9044b19a1bdc419b509164f6c8ce0abcdd0591b5967dc9
-
SSDEEP
24576:h1OYdaOGGiAEAd/KjjBKyu73i8mxcmMMV6zs+G/pC2d1RJoTJnQqphTuS2MD3GvE:h1OsJMAd/OxfV6zZGYg1RJQnFrTc2SW
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1224 fSp9E2cZvweldbh.exe -
Loads dropped DLL 4 IoCs
pid Process 560 6f5f3586dc9a2588b67d29c0fedc54499272a0d55c7a3c480d91de7e638b401e.exe 1224 fSp9E2cZvweldbh.exe 1500 regsvr32.exe 108 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\jaemggpohklfiiagmcfifhpohppkochp\2.0\manifest.json fSp9E2cZvweldbh.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\jaemggpohklfiiagmcfifhpohppkochp\2.0\manifest.json fSp9E2cZvweldbh.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\jaemggpohklfiiagmcfifhpohppkochp\2.0\manifest.json fSp9E2cZvweldbh.exe -
Installs/modifies Browser Helper Object 2 TTPs 11 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DBC80044-A445-435B-BC74-9C25C1C588A9} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{18DF081C-E8AD-4283-A596-FA578C2EBDC3} fSp9E2cZvweldbh.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects fSp9E2cZvweldbh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\ fSp9E2cZvweldbh.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} fSp9E2cZvweldbh.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} fSp9E2cZvweldbh.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects regsvr32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini fSp9E2cZvweldbh.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol fSp9E2cZvweldbh.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI fSp9E2cZvweldbh.exe File opened for modification C:\Windows\System32\GroupPolicy fSp9E2cZvweldbh.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files (x86)\GoSiave\Hj7FT96D1dzswj.dat fSp9E2cZvweldbh.exe File opened for modification C:\Program Files (x86)\GoSiave\Hj7FT96D1dzswj.dat fSp9E2cZvweldbh.exe File created C:\Program Files (x86)\GoSiave\Hj7FT96D1dzswj.x64.dll fSp9E2cZvweldbh.exe File opened for modification C:\Program Files (x86)\GoSiave\Hj7FT96D1dzswj.x64.dll fSp9E2cZvweldbh.exe File created C:\Program Files (x86)\GoSiave\Hj7FT96D1dzswj.dll fSp9E2cZvweldbh.exe File opened for modification C:\Program Files (x86)\GoSiave\Hj7FT96D1dzswj.dll fSp9E2cZvweldbh.exe File created C:\Program Files (x86)\GoSiave\Hj7FT96D1dzswj.tlb fSp9E2cZvweldbh.exe File opened for modification C:\Program Files (x86)\GoSiave\Hj7FT96D1dzswj.tlb fSp9E2cZvweldbh.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1224 fSp9E2cZvweldbh.exe 1224 fSp9E2cZvweldbh.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 560 wrote to memory of 1224 560 6f5f3586dc9a2588b67d29c0fedc54499272a0d55c7a3c480d91de7e638b401e.exe 28 PID 560 wrote to memory of 1224 560 6f5f3586dc9a2588b67d29c0fedc54499272a0d55c7a3c480d91de7e638b401e.exe 28 PID 560 wrote to memory of 1224 560 6f5f3586dc9a2588b67d29c0fedc54499272a0d55c7a3c480d91de7e638b401e.exe 28 PID 560 wrote to memory of 1224 560 6f5f3586dc9a2588b67d29c0fedc54499272a0d55c7a3c480d91de7e638b401e.exe 28 PID 1224 wrote to memory of 1500 1224 fSp9E2cZvweldbh.exe 29 PID 1224 wrote to memory of 1500 1224 fSp9E2cZvweldbh.exe 29 PID 1224 wrote to memory of 1500 1224 fSp9E2cZvweldbh.exe 29 PID 1224 wrote to memory of 1500 1224 fSp9E2cZvweldbh.exe 29 PID 1224 wrote to memory of 1500 1224 fSp9E2cZvweldbh.exe 29 PID 1224 wrote to memory of 1500 1224 fSp9E2cZvweldbh.exe 29 PID 1224 wrote to memory of 1500 1224 fSp9E2cZvweldbh.exe 29 PID 1500 wrote to memory of 108 1500 regsvr32.exe 30 PID 1500 wrote to memory of 108 1500 regsvr32.exe 30 PID 1500 wrote to memory of 108 1500 regsvr32.exe 30 PID 1500 wrote to memory of 108 1500 regsvr32.exe 30 PID 1500 wrote to memory of 108 1500 regsvr32.exe 30 PID 1500 wrote to memory of 108 1500 regsvr32.exe 30 PID 1500 wrote to memory of 108 1500 regsvr32.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f5f3586dc9a2588b67d29c0fedc54499272a0d55c7a3c480d91de7e638b401e.exe"C:\Users\Admin\AppData\Local\Temp\6f5f3586dc9a2588b67d29c0fedc54499272a0d55c7a3c480d91de7e638b401e.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Users\Admin\AppData\Local\Temp\7zSFC2B.tmp\fSp9E2cZvweldbh.exe.\fSp9E2cZvweldbh.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\GoSiave\Hj7FT96D1dzswj.x64.dll"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\GoSiave\Hj7FT96D1dzswj.x64.dll"4⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
PID:108
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5b1ceaa501c0e4963eeeedc6cbccac23a
SHA1db04a8c15aa4c7800e6e8bcda0e4995bc85056a5
SHA256d86210a5e9f8e410ae278e86da98ae566b560ac5942ae11d3dca55d0fe78c36d
SHA5129145bfd2e4e61a40d370d6e75f450502ea690beee3b43e8bade22f163bd279fe57dbccca9bc1b6672c2e37601c0b48ebe593dd7d67982e834113bab7365d874f
-
Filesize
702KB
MD51287246338d36f26f77735bd58d74e70
SHA1aabda37cd307e50f2444c73bd656eaf2b78fc291
SHA2564d1d5893df770fc7c94b33c90f87f8cc8b9d7669f4f914df9139ddb22042acc1
SHA512ee4177dbd58c1327ea0334e43499e99cea642d458844b589116d147d72a6f71e063fe5dadbe262a7bca7cf0ba7ec48708e64827b513abc3e46144bcfcc6f46f1
-
Filesize
619KB
MD54f328f4e17a2c81830aac4c8c3d67141
SHA1063c8e33d6a263dd604d072ffd143305f6c3d4a8
SHA256303917029755e7a44a6e7392c5e751e4fbcb66feaa8a5f09142efaf5a91ad2fc
SHA512d387cf9ee95426717be8bac7a6cd422b8ddc2aa925723a9b25a169d9b4a0f5cb5607e2f2b8161cadb0e4333d1fda4ba24ecb838dbb49571d55a6799efce404c0
-
Filesize
3KB
MD562cb4133d9d3a46f4f1c6c0fb3688619
SHA1feaaef6e2b8c41be2575d0763cc8de3e8c19478e
SHA2563ddcfb4b206fc4856f5bb5c06bcc3761dde53882eea20b5dc5ddf4ee8864bea5
SHA512cb30dc73d52eb502f745fe32b4055b53306f62f0847cae1275d0856608949ea62c30f40d7f252ad450909a4bd425cf0e50012400175cc42a4096cf1451d90123
-
Filesize
702KB
MD51287246338d36f26f77735bd58d74e70
SHA1aabda37cd307e50f2444c73bd656eaf2b78fc291
SHA2564d1d5893df770fc7c94b33c90f87f8cc8b9d7669f4f914df9139ddb22042acc1
SHA512ee4177dbd58c1327ea0334e43499e99cea642d458844b589116d147d72a6f71e063fe5dadbe262a7bca7cf0ba7ec48708e64827b513abc3e46144bcfcc6f46f1
-
Filesize
6KB
MD5b1ceaa501c0e4963eeeedc6cbccac23a
SHA1db04a8c15aa4c7800e6e8bcda0e4995bc85056a5
SHA256d86210a5e9f8e410ae278e86da98ae566b560ac5942ae11d3dca55d0fe78c36d
SHA5129145bfd2e4e61a40d370d6e75f450502ea690beee3b43e8bade22f163bd279fe57dbccca9bc1b6672c2e37601c0b48ebe593dd7d67982e834113bab7365d874f
-
Filesize
623KB
MD5cd6bf363f5af45a16926343310023db4
SHA1e5bcbe9735e5a8d6243af1c2a4593784e8e63aa6
SHA256bfa98e4e677c8bcb7348aed64d51915e3bacb05925d0234e646e2bb7cc3cdd06
SHA5123ccb2c4ea143ac58d4df43751bf1c8781795b2321f3acb5d85a0249e4b43c1bf3f93c41c0c59cc2933b923069340a3f7425e9ddce1d7355e60eec843d9158ced
-
Filesize
623KB
MD5cd6bf363f5af45a16926343310023db4
SHA1e5bcbe9735e5a8d6243af1c2a4593784e8e63aa6
SHA256bfa98e4e677c8bcb7348aed64d51915e3bacb05925d0234e646e2bb7cc3cdd06
SHA5123ccb2c4ea143ac58d4df43751bf1c8781795b2321f3acb5d85a0249e4b43c1bf3f93c41c0c59cc2933b923069340a3f7425e9ddce1d7355e60eec843d9158ced
-
Filesize
6KB
MD59c73e2b834f224472983705e7b871905
SHA13d368d346affa647809ac2eb490700b636fdd3c4
SHA256e45183df53f29b6d429d79003ae3aaf10ac166d054d4b8d92dcb7f0ec0fee61c
SHA51202c85e327c4505de01453b8074505261e182ef46bc177afd01478d82acab6d12573eb99f3c7ee2090b117a9b66044c542fdce27bd11d33dcc05070f35f92076f
-
Filesize
144B
MD5b4cdedd56b55443042c6d6a4d14ca45c
SHA1d7f2287bd66be34f266ecda40ce6105677931f32
SHA256656000cc3789b4b02b2ece831bf03205cff587618a0e8e91fc9acbea0c523eb9
SHA5120b1dacb80ecd47696e212cdbf84c898c2bc58ef86fe5401744d32c0fd08fa5e36bb780af1cb3f11a023cc1efcbba7659078b16b63cfb723f17faa645dbafa952
-
Filesize
144B
MD5fca19198fd8af21016a8b1dec7980002
SHA1fd01a47d14004e17a625efe66cc46a06c786cf40
SHA256332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a
SHA51260f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47
-
Filesize
531B
MD536d98318ab2b3b2585a30984db328afb
SHA1f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5
SHA256ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7
SHA5126f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a
-
Filesize
499B
MD5866e59ce4292605efb1956f5f322e4f5
SHA1916cd9818f80b63a11a39a6456a5a9c9b8b62473
SHA256e3641913f13e083faf248b9d2aa98cef4ef2b47c3f3f402b9f8d20e1fcb35d59
SHA512c2704e7378fa7f09aee17e2d3707b5f9e5145bfeb92ed2165a313a4b80d0016a84539008212daafae2b61f31d58c8b0407ba9f20d9eba80e6ecafeaaa0cc0868
-
C:\Users\Admin\AppData\Local\Temp\7zSFC2B.tmp\[email protected]\bootstrap.js
Filesize2KB
MD5df13f711e20e9c80171846d4f2f7ae06
SHA156d29cda58427efe0e21d3880d39eb1b0ef60bee
SHA2566c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4
SHA5126c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e
-
C:\Users\Admin\AppData\Local\Temp\7zSFC2B.tmp\[email protected]\chrome.manifest
Filesize35B
MD59b752762e3a4b031461f3365c7fe1aa3
SHA1981abc7f77ffc15ee2fe8faf3f14902a09dcb3d3
SHA2563a2e4f50a32a3ce60038635c77c8f4f6ef725bc288c7d33de0fb0c97a94364b7
SHA5123a324c5fe971069a5e9669bda7442d4dcb5bb8882e0e8d4bce16ab084ba379307834ff741b5f57fe9725bbeed7f913c7eb42726c302a3b4807f22293845e9cac
-
C:\Users\Admin\AppData\Local\Temp\7zSFC2B.tmp\[email protected]\content\bg.js
Filesize8KB
MD565402370e4d030d00a93690e797d7990
SHA1488a1d7bf12d8c998385284070bd7d8c113c809a
SHA2567baa933e391f3eec2b6ab24805b421c4d6b293b993c12e8d3202f5396138d804
SHA5129dc544740c65ea9a6e9c6dcbc2b871be7554f6e41497607b2849454bfcf4a1e81d4c7e2b974c903d2ca83fdd0105d146a7743dcd3f8dbb1a36cf066315f90bc4
-
C:\Users\Admin\AppData\Local\Temp\7zSFC2B.tmp\[email protected]\install.rdf
Filesize593B
MD5c104fe2afcd3e4c87f60f839bb80088b
SHA11e051e0f161373d2f51f85fb6deb0fbdaaafcb71
SHA2565f68d2d097242f2bd522cc345b876bae1ab91872f21550cb94bd2cab01ef4714
SHA51224fa3a5d4943a3da945ec488709641966db58bfa5eadeddf940c3bf3ec0070e84c1e00a584942479b68627d3179fd69f163f0395aa820a800594cd0561d8f20f
-
Filesize
619KB
MD54f328f4e17a2c81830aac4c8c3d67141
SHA1063c8e33d6a263dd604d072ffd143305f6c3d4a8
SHA256303917029755e7a44a6e7392c5e751e4fbcb66feaa8a5f09142efaf5a91ad2fc
SHA512d387cf9ee95426717be8bac7a6cd422b8ddc2aa925723a9b25a169d9b4a0f5cb5607e2f2b8161cadb0e4333d1fda4ba24ecb838dbb49571d55a6799efce404c0
-
Filesize
702KB
MD51287246338d36f26f77735bd58d74e70
SHA1aabda37cd307e50f2444c73bd656eaf2b78fc291
SHA2564d1d5893df770fc7c94b33c90f87f8cc8b9d7669f4f914df9139ddb22042acc1
SHA512ee4177dbd58c1327ea0334e43499e99cea642d458844b589116d147d72a6f71e063fe5dadbe262a7bca7cf0ba7ec48708e64827b513abc3e46144bcfcc6f46f1
-
Filesize
702KB
MD51287246338d36f26f77735bd58d74e70
SHA1aabda37cd307e50f2444c73bd656eaf2b78fc291
SHA2564d1d5893df770fc7c94b33c90f87f8cc8b9d7669f4f914df9139ddb22042acc1
SHA512ee4177dbd58c1327ea0334e43499e99cea642d458844b589116d147d72a6f71e063fe5dadbe262a7bca7cf0ba7ec48708e64827b513abc3e46144bcfcc6f46f1
-
Filesize
623KB
MD5cd6bf363f5af45a16926343310023db4
SHA1e5bcbe9735e5a8d6243af1c2a4593784e8e63aa6
SHA256bfa98e4e677c8bcb7348aed64d51915e3bacb05925d0234e646e2bb7cc3cdd06
SHA5123ccb2c4ea143ac58d4df43751bf1c8781795b2321f3acb5d85a0249e4b43c1bf3f93c41c0c59cc2933b923069340a3f7425e9ddce1d7355e60eec843d9158ced