Analysis
-
max time kernel
148s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24/11/2022, 05:16
Static task
static1
Behavioral task
behavioral1
Sample
2c8adc24bdb0f8bde43fd623b4771e699b97a2f77c3340ad5e003158b0facc55.exe
Resource
win7-20221111-en
General
-
Target
2c8adc24bdb0f8bde43fd623b4771e699b97a2f77c3340ad5e003158b0facc55.exe
-
Size
2.0MB
-
MD5
4d12e91a527055ee6f39b8f93dcc0c7b
-
SHA1
35c9d94e8a8f74f3ac7f7033f5a5d2291836bdd8
-
SHA256
2c8adc24bdb0f8bde43fd623b4771e699b97a2f77c3340ad5e003158b0facc55
-
SHA512
df542af697309adf02c96a27b36cbb90cfdb8f8632d55e6e6e3b5f4e7ab3cb8722dbacc8642e8ce5fc9605adf099804c94b43a58d01735319380dca516635286
-
SSDEEP
24576:h1OYdaOUjfen1Y6KIc8dPc3Mp6CzcJcB1TE1VyDGxQQYxMfyylmCHxxyJGb8t6:h1Os0ZIdJc346K1TcAGb8t6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4032 srgn1C2BdZcNFUm.exe -
Loads dropped DLL 3 IoCs
pid Process 4032 srgn1C2BdZcNFUm.exe 4872 regsvr32.exe 5052 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 5 IoCs
description ioc Process File created C:\Users\WDAGUtilityAccount\AppData\Local\Google\Chrome\User Data\Default\Extensions\gljeddlpbpajiccbnnlpcgicjboblffn\2.0\manifest.json srgn1C2BdZcNFUm.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gljeddlpbpajiccbnnlpcgicjboblffn\2.0\manifest.json srgn1C2BdZcNFUm.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\gljeddlpbpajiccbnnlpcgicjboblffn\2.0\manifest.json srgn1C2BdZcNFUm.exe File created C:\Users\DefaultAccount\AppData\Local\Google\Chrome\User Data\Default\Extensions\gljeddlpbpajiccbnnlpcgicjboblffn\2.0\manifest.json srgn1C2BdZcNFUm.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\gljeddlpbpajiccbnnlpcgicjboblffn\2.0\manifest.json srgn1C2BdZcNFUm.exe -
Installs/modifies Browser Helper Object 2 TTPs 9 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects srgn1C2BdZcNFUm.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{DBC80044-A445-435B-BC74-9C25C1C588A9} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} srgn1C2BdZcNFUm.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA} srgn1C2BdZcNFUm.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ srgn1C2BdZcNFUm.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} regsvr32.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\GoSave\tzXdA2laeBQDwG.x64.dll srgn1C2BdZcNFUm.exe File created C:\Program Files (x86)\GoSave\tzXdA2laeBQDwG.dll srgn1C2BdZcNFUm.exe File opened for modification C:\Program Files (x86)\GoSave\tzXdA2laeBQDwG.dll srgn1C2BdZcNFUm.exe File created C:\Program Files (x86)\GoSave\tzXdA2laeBQDwG.tlb srgn1C2BdZcNFUm.exe File opened for modification C:\Program Files (x86)\GoSave\tzXdA2laeBQDwG.tlb srgn1C2BdZcNFUm.exe File created C:\Program Files (x86)\GoSave\tzXdA2laeBQDwG.dat srgn1C2BdZcNFUm.exe File opened for modification C:\Program Files (x86)\GoSave\tzXdA2laeBQDwG.dat srgn1C2BdZcNFUm.exe File created C:\Program Files (x86)\GoSave\tzXdA2laeBQDwG.x64.dll srgn1C2BdZcNFUm.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1140 wrote to memory of 4032 1140 2c8adc24bdb0f8bde43fd623b4771e699b97a2f77c3340ad5e003158b0facc55.exe 80 PID 1140 wrote to memory of 4032 1140 2c8adc24bdb0f8bde43fd623b4771e699b97a2f77c3340ad5e003158b0facc55.exe 80 PID 1140 wrote to memory of 4032 1140 2c8adc24bdb0f8bde43fd623b4771e699b97a2f77c3340ad5e003158b0facc55.exe 80 PID 4032 wrote to memory of 4872 4032 srgn1C2BdZcNFUm.exe 83 PID 4032 wrote to memory of 4872 4032 srgn1C2BdZcNFUm.exe 83 PID 4032 wrote to memory of 4872 4032 srgn1C2BdZcNFUm.exe 83 PID 4872 wrote to memory of 5052 4872 regsvr32.exe 84 PID 4872 wrote to memory of 5052 4872 regsvr32.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c8adc24bdb0f8bde43fd623b4771e699b97a2f77c3340ad5e003158b0facc55.exe"C:\Users\Admin\AppData\Local\Temp\2c8adc24bdb0f8bde43fd623b4771e699b97a2f77c3340ad5e003158b0facc55.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\7zSB80A.tmp\srgn1C2BdZcNFUm.exe.\srgn1C2BdZcNFUm.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\GoSave\tzXdA2laeBQDwG.x64.dll"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\GoSave\tzXdA2laeBQDwG.x64.dll"4⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
PID:5052
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD53b3256a097b8d856ce1b51b0033ef9ae
SHA16d5a007fd51e3c3d0582d4e34353abb52db86a82
SHA2565c108efaa2dfc2a101296b358aef504cf252b0efbeb81354c115b177b24ff60a
SHA512c8647418c4380ed81bc2d6f2c73590b633c148b4a332d7f69611a9d46e678c9c34b8cb14ae43f7f784f329ed6e2ba819cd1cdf1c54dc594fc5b6dbb2eb6428e1
-
Filesize
613KB
MD50df7c26b4abf65cd6ca180c2ddc7ae4b
SHA1d43e0770e0a5778525a4828f46e1e4448cdc9aa8
SHA256f133fed29f50b1cdc8af2043608b14f8f20ab5349a2cfe16536d089966eb120b
SHA51229ca79a58784de2855975849a94f0f3e55b3a13ece1cf9ff25db98d397c1758d88df8ac4887dfb48b28a89564e60a3a0195140d154ce0d0b81569fd0931fc474
-
Filesize
695KB
MD52e506193dce62c7f1cf73d8709f60d2d
SHA1746e4a7b0505d2eb486896c913c917075f23d974
SHA25618f9cd61c2de7ce04bb14e08820d52cc42e9b2b5a63dd9770d83df2867947d9a
SHA512bb49793b6263920a61d602b2cb33e241cfc5e3c624a65b62dcd7ad4924fdceeefe4d73c08c5c5163860a65438262439a64119c13c734fc404f01be8d0085fb64
-
Filesize
695KB
MD52e506193dce62c7f1cf73d8709f60d2d
SHA1746e4a7b0505d2eb486896c913c917075f23d974
SHA25618f9cd61c2de7ce04bb14e08820d52cc42e9b2b5a63dd9770d83df2867947d9a
SHA512bb49793b6263920a61d602b2cb33e241cfc5e3c624a65b62dcd7ad4924fdceeefe4d73c08c5c5163860a65438262439a64119c13c734fc404f01be8d0085fb64
-
Filesize
695KB
MD52e506193dce62c7f1cf73d8709f60d2d
SHA1746e4a7b0505d2eb486896c913c917075f23d974
SHA25618f9cd61c2de7ce04bb14e08820d52cc42e9b2b5a63dd9770d83df2867947d9a
SHA512bb49793b6263920a61d602b2cb33e241cfc5e3c624a65b62dcd7ad4924fdceeefe4d73c08c5c5163860a65438262439a64119c13c734fc404f01be8d0085fb64
-
Filesize
5KB
MD57f5b350499a09a3bdd56fc6bd83464e1
SHA1b0e061132ab647a02d740117564dd35c3617c33a
SHA2562b9fb26e0c1e75f2748b6a2cbf209b929308a68ec7b87df51e08be36a504a167
SHA512925c34779a0ca873293b24f58e5f0f90762df7b9c11efcaea075e72ddf10d942526dd1ec33de8674f67b43fdeba791ca9f831c927267c46fd63a67522ec23d3f
-
Filesize
139B
MD5e08e06c90580b23c054ca4ec7992e6de
SHA1b13788d4e21cff7e7240e529c7fbd1fb124f690e
SHA2563fe16d485472535e5aab8407d2d37ccf72b5d347701eea661e65318dfb2d7be9
SHA512146703362363bcff91d0718be5ebec15c35fe8fb1063c42dad376a7d8a7eef17c401d46672c837eff7bdf57fa5c9c58407715b5b81139c0b2580d2e593f62bf6
-
Filesize
144B
MD5fca19198fd8af21016a8b1dec7980002
SHA1fd01a47d14004e17a625efe66cc46a06c786cf40
SHA256332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a
SHA51260f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47
-
Filesize
531B
MD536d98318ab2b3b2585a30984db328afb
SHA1f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5
SHA256ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7
SHA5126f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a
-
Filesize
498B
MD5640199ea4621e34510de919f6a54436f
SHA1dc65dbfad02bd2688030bd56ca1cab85917a9937
SHA256e4aa7c089e32d14ddf584e9de6d007ec16581cd30c248ff7284bc0eb7757d4af
SHA512d64bc524d6df7c4c21a5ddfb0e6636317482ef4dc28006bd0a38d5e26c2db75626f216143026bf8acf3baa11d86c278e902c78afad4f806ca36f9e54bc75ff0a
-
Filesize
6KB
MD53b3256a097b8d856ce1b51b0033ef9ae
SHA16d5a007fd51e3c3d0582d4e34353abb52db86a82
SHA2565c108efaa2dfc2a101296b358aef504cf252b0efbeb81354c115b177b24ff60a
SHA512c8647418c4380ed81bc2d6f2c73590b633c148b4a332d7f69611a9d46e678c9c34b8cb14ae43f7f784f329ed6e2ba819cd1cdf1c54dc594fc5b6dbb2eb6428e1
-
Filesize
625KB
MD5ca04c0f764aa0797cbe40913d3d8d17f
SHA17358d68ace7d7e6213726433c41dd7b781762d74
SHA256a018bdb7e28a4e0dd07da454e8192045f5994c66f95c47defaa0ce40661fc90f
SHA512fae69fd13b4b9308973ff713fe7c6ee10525b76e9c70106dbe08673d86b6ecc3ebf5d90f6c3a461d64352726de28fbb5903c89db28916423766810c62686f0c0
-
Filesize
625KB
MD5ca04c0f764aa0797cbe40913d3d8d17f
SHA17358d68ace7d7e6213726433c41dd7b781762d74
SHA256a018bdb7e28a4e0dd07da454e8192045f5994c66f95c47defaa0ce40661fc90f
SHA512fae69fd13b4b9308973ff713fe7c6ee10525b76e9c70106dbe08673d86b6ecc3ebf5d90f6c3a461d64352726de28fbb5903c89db28916423766810c62686f0c0
-
Filesize
613KB
MD50df7c26b4abf65cd6ca180c2ddc7ae4b
SHA1d43e0770e0a5778525a4828f46e1e4448cdc9aa8
SHA256f133fed29f50b1cdc8af2043608b14f8f20ab5349a2cfe16536d089966eb120b
SHA51229ca79a58784de2855975849a94f0f3e55b3a13ece1cf9ff25db98d397c1758d88df8ac4887dfb48b28a89564e60a3a0195140d154ce0d0b81569fd0931fc474
-
Filesize
3KB
MD5ab50bfd160f5251c1c06947ba8523db0
SHA17940cc61ab4e0bb82afc03dd141eaf8bd963c091
SHA256a23c9c376478404d8f90d1d984935f7b5e5f2e5674fd8a7642dc89f2b1b2c4a8
SHA512506baa3f8ca880eeb4d26e9744babef326d2b5b1fb0971c712072c4aeeaaaff702847c045fe0270d45cc71a0b7fb53ba0af60aeaa34f5154f9617c85a06c3334
-
Filesize
695KB
MD52e506193dce62c7f1cf73d8709f60d2d
SHA1746e4a7b0505d2eb486896c913c917075f23d974
SHA25618f9cd61c2de7ce04bb14e08820d52cc42e9b2b5a63dd9770d83df2867947d9a
SHA512bb49793b6263920a61d602b2cb33e241cfc5e3c624a65b62dcd7ad4924fdceeefe4d73c08c5c5163860a65438262439a64119c13c734fc404f01be8d0085fb64
-
C:\Users\Admin\AppData\Local\Temp\7zSB80A.tmp\[email protected]\bootstrap.js
Filesize2KB
MD5df13f711e20e9c80171846d4f2f7ae06
SHA156d29cda58427efe0e21d3880d39eb1b0ef60bee
SHA2566c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4
SHA5126c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e
-
C:\Users\Admin\AppData\Local\Temp\7zSB80A.tmp\[email protected]\chrome.manifest
Filesize35B
MD5f4ca073ea6867a53844b400fef20e82a
SHA1f558d00c35ffdbea916073b3b18fcbb514bc3a2f
SHA2568014b046225f8cb268b7b4137593aa8392d0fa069329eef3680a7ab1a998e917
SHA512a3055ada94fab5ce989ceee89c6a986b38d6999c02f5ce22dc8bfc467c500300d2e1feebda54cb944e53f463baa824e567062d51ca06f60d13370b6d2edc6e89
-
C:\Users\Admin\AppData\Local\Temp\7zSB80A.tmp\[email protected]\content\bg.js
Filesize7KB
MD54ea3cce611710c2a4c9d98297827e391
SHA1fbfe6e0d09c609d1c13ee3066f482c10718d8e02
SHA2561e42782ed1f046d5c496a53d547c843cf5dcc9d4e1db1eca03baea233a949817
SHA512f451da3ac80e76c4afae6417a7483e5ec0988d2d51e03338c54e8b3f9fa01610bab733e8edd519d09346bda04049f85597ab85ccea4c590b77e3959ddd28e8ec
-
C:\Users\Admin\AppData\Local\Temp\7zSB80A.tmp\[email protected]\install.rdf
Filesize596B
MD5d049fdce2ea39bbad87c26e8c7e3efdd
SHA1b9c4c92ce886d423e832e810043c7097f6ca2126
SHA256f56ce842837e92434478ec84fa1598e0499f833f681839bfe6632266fca5c4d8
SHA512f2953f5fea6259981425342167259d82be0310aded029de94c26ab67347d763ec7a88f63e97b38b75f610575d393fbc87afa219fce864c706583f364f2c4628f