Analysis
-
max time kernel
172s -
max time network
213s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 06:07
Static task
static1
Behavioral task
behavioral1
Sample
102434e5955a45b41a1211452280e6239b0cff29980b69d81f26affc7a83db63.exe
Resource
win7-20220812-en
General
-
Target
102434e5955a45b41a1211452280e6239b0cff29980b69d81f26affc7a83db63.exe
-
Size
2.1MB
-
MD5
bdb303d2d436060129d6c424aac18aca
-
SHA1
72ce1da78a12f5007e0f4fef04072712ef8b9d66
-
SHA256
102434e5955a45b41a1211452280e6239b0cff29980b69d81f26affc7a83db63
-
SHA512
e999e60d090badf1f36c650d72c0562b8c76d7693d8591364d83292e42bb9c57d550ec0a230dc14fd83acb930766a888ce2d974170e237022671399dfffcdb86
-
SSDEEP
24576:h1OYdaORTwLleYkTVug2PiL0jHM8WK5z6Sh19BUfOD4XRt1otyBNvJvMXzGK5IhH:h1OscLARTQ9PimJWtShQnvQsruW
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4940 zZG4SpkejcNIHeg.exe -
Loads dropped DLL 3 IoCs
pid Process 4940 zZG4SpkejcNIHeg.exe 100 regsvr32.exe 216 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 5 IoCs
description ioc Process File created C:\Users\DefaultAccount\AppData\Local\Google\Chrome\User Data\Default\Extensions\aonikocmjbngmnpigjejpnhahjfbfjea\2.0\manifest.json zZG4SpkejcNIHeg.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\aonikocmjbngmnpigjejpnhahjfbfjea\2.0\manifest.json zZG4SpkejcNIHeg.exe File created C:\Users\WDAGUtilityAccount\AppData\Local\Google\Chrome\User Data\Default\Extensions\aonikocmjbngmnpigjejpnhahjfbfjea\2.0\manifest.json zZG4SpkejcNIHeg.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\aonikocmjbngmnpigjejpnhahjfbfjea\2.0\manifest.json zZG4SpkejcNIHeg.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\aonikocmjbngmnpigjejpnhahjfbfjea\2.0\manifest.json zZG4SpkejcNIHeg.exe -
Installs/modifies Browser Helper Object 2 TTPs 9 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ zZG4SpkejcNIHeg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} zZG4SpkejcNIHeg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA} zZG4SpkejcNIHeg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects zZG4SpkejcNIHeg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{DBC80044-A445-435B-BC74-9C25C1C588A9} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ regsvr32.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files (x86)\GoSave\8mxxqBZxm5umPN.x64.dll zZG4SpkejcNIHeg.exe File opened for modification C:\Program Files (x86)\GoSave\8mxxqBZxm5umPN.x64.dll zZG4SpkejcNIHeg.exe File created C:\Program Files (x86)\GoSave\8mxxqBZxm5umPN.dll zZG4SpkejcNIHeg.exe File opened for modification C:\Program Files (x86)\GoSave\8mxxqBZxm5umPN.dll zZG4SpkejcNIHeg.exe File created C:\Program Files (x86)\GoSave\8mxxqBZxm5umPN.tlb zZG4SpkejcNIHeg.exe File opened for modification C:\Program Files (x86)\GoSave\8mxxqBZxm5umPN.tlb zZG4SpkejcNIHeg.exe File created C:\Program Files (x86)\GoSave\8mxxqBZxm5umPN.dat zZG4SpkejcNIHeg.exe File opened for modification C:\Program Files (x86)\GoSave\8mxxqBZxm5umPN.dat zZG4SpkejcNIHeg.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4940 zZG4SpkejcNIHeg.exe 4940 zZG4SpkejcNIHeg.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4092 wrote to memory of 4940 4092 102434e5955a45b41a1211452280e6239b0cff29980b69d81f26affc7a83db63.exe 84 PID 4092 wrote to memory of 4940 4092 102434e5955a45b41a1211452280e6239b0cff29980b69d81f26affc7a83db63.exe 84 PID 4092 wrote to memory of 4940 4092 102434e5955a45b41a1211452280e6239b0cff29980b69d81f26affc7a83db63.exe 84 PID 4940 wrote to memory of 100 4940 zZG4SpkejcNIHeg.exe 85 PID 4940 wrote to memory of 100 4940 zZG4SpkejcNIHeg.exe 85 PID 4940 wrote to memory of 100 4940 zZG4SpkejcNIHeg.exe 85 PID 100 wrote to memory of 216 100 regsvr32.exe 86 PID 100 wrote to memory of 216 100 regsvr32.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\102434e5955a45b41a1211452280e6239b0cff29980b69d81f26affc7a83db63.exe"C:\Users\Admin\AppData\Local\Temp\102434e5955a45b41a1211452280e6239b0cff29980b69d81f26affc7a83db63.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\7zS83E5.tmp\zZG4SpkejcNIHeg.exe.\zZG4SpkejcNIHeg.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\GoSave\8mxxqBZxm5umPN.x64.dll"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:100 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\GoSave\8mxxqBZxm5umPN.x64.dll"4⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
PID:216
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD52a7165349e686191e8756d8652b22638
SHA1d13ffd239948499c2ac6fd71817674a60e695b3a
SHA2562e243d8381f7ebb7570dfda769a40ea9f2587a90a08dbd5902e13b59d3136f2f
SHA5126b7b34b56e234a916f05ef1f93a8f076e4ad92996c8e002ab1e7e596a0dfd7ee8bb102f1db0ce1a431bc051583df2130a06b01ce60504479f490c414477b97e2
-
Filesize
611KB
MD5123fde8f1a45be2f971b36a8ae5457ef
SHA178f77c976bec0b388407f986e7866818512eec97
SHA25612869f73fb78fcbb8876e10772d081890b19fd1e228dd83ca012416cf26e931e
SHA5124ae3708e45e15a49e7ba1d338a9186ed47f41abe57727d57833a33be887043dcb950d02bc52f79ee414df0df56c3e87f213995fa222a6f0e1c659393860231d9
-
Filesize
693KB
MD5c59945c3f5074d51077f2d598680aa11
SHA17d2ab4599f476d9da677283bdfcff5164a30b2e7
SHA25610658a9b7ad99f84d73c77bde58761c89f37b1318f90197710d63824ae894b5b
SHA512d3ccea87caba7d10776c0d4726b26cad81e85562270a1c873a59ab59a0d73336bae0af6cb6a242fb8f1b4cb4278636ed9995bd03f4f0b32d84a705e19a7b7e61
-
Filesize
693KB
MD5c59945c3f5074d51077f2d598680aa11
SHA17d2ab4599f476d9da677283bdfcff5164a30b2e7
SHA25610658a9b7ad99f84d73c77bde58761c89f37b1318f90197710d63824ae894b5b
SHA512d3ccea87caba7d10776c0d4726b26cad81e85562270a1c873a59ab59a0d73336bae0af6cb6a242fb8f1b4cb4278636ed9995bd03f4f0b32d84a705e19a7b7e61
-
Filesize
693KB
MD5c59945c3f5074d51077f2d598680aa11
SHA17d2ab4599f476d9da677283bdfcff5164a30b2e7
SHA25610658a9b7ad99f84d73c77bde58761c89f37b1318f90197710d63824ae894b5b
SHA512d3ccea87caba7d10776c0d4726b26cad81e85562270a1c873a59ab59a0d73336bae0af6cb6a242fb8f1b4cb4278636ed9995bd03f4f0b32d84a705e19a7b7e61
-
Filesize
611KB
MD5123fde8f1a45be2f971b36a8ae5457ef
SHA178f77c976bec0b388407f986e7866818512eec97
SHA25612869f73fb78fcbb8876e10772d081890b19fd1e228dd83ca012416cf26e931e
SHA5124ae3708e45e15a49e7ba1d338a9186ed47f41abe57727d57833a33be887043dcb950d02bc52f79ee414df0df56c3e87f213995fa222a6f0e1c659393860231d9
-
Filesize
3KB
MD5d5c4233a6c3de331b459f5f6a35ae3dd
SHA1b5f1bf145f4e0896d7ae500abecbfaca715c18ab
SHA256f3fca93b2a2848af13dcd30cad6305d20319d0a96f622f96753c1aebb91c885c
SHA5124af48daa80dcd76cf45018d7edef74f35c5917457dd598f5a2071bba8875d75280326e41f3f5885d5301a596c22a3833cb062e2f4c97e0d83a01ad2644056e76
-
Filesize
693KB
MD5c59945c3f5074d51077f2d598680aa11
SHA17d2ab4599f476d9da677283bdfcff5164a30b2e7
SHA25610658a9b7ad99f84d73c77bde58761c89f37b1318f90197710d63824ae894b5b
SHA512d3ccea87caba7d10776c0d4726b26cad81e85562270a1c873a59ab59a0d73336bae0af6cb6a242fb8f1b4cb4278636ed9995bd03f4f0b32d84a705e19a7b7e61
-
Filesize
5KB
MD5bbd552b04ffcbec2d3e92efa9511b88e
SHA1b5de2c3430708042bea12d97b844601acab71c23
SHA25679f9452bbee8fa82565da8d4e446f1325cad30c5267d2de3ac6ac2c4134f8d2b
SHA51284b2a79a74b985da091e7528b9ee6307b23cd7b7bec12dee572939fad230457a1fb1908d06dd7d623c934b9a836dd915065bd42fc64f39f3ceccb7e7d91753d8
-
Filesize
147B
MD5a58792a159b21e3f142ce75eb85991e7
SHA10db29370dc26cabcd046fcf752ea8953ae64e300
SHA2569ccdb07c87da9ee98ac2bf42e7ce943255d45bce03e887a41481907e7b7a791f
SHA512bea581a3c58dae9713faed923f4080aa62f4a826fffbb976f5a210d7389f399fc59d5b193134f42446c5179c4d93a1b897a1407ec53d14e778055fbdbdb4fe43
-
Filesize
144B
MD5fca19198fd8af21016a8b1dec7980002
SHA1fd01a47d14004e17a625efe66cc46a06c786cf40
SHA256332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a
SHA51260f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47
-
Filesize
531B
MD536d98318ab2b3b2585a30984db328afb
SHA1f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5
SHA256ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7
SHA5126f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a
-
Filesize
498B
MD5640199ea4621e34510de919f6a54436f
SHA1dc65dbfad02bd2688030bd56ca1cab85917a9937
SHA256e4aa7c089e32d14ddf584e9de6d007ec16581cd30c248ff7284bc0eb7757d4af
SHA512d64bc524d6df7c4c21a5ddfb0e6636317482ef4dc28006bd0a38d5e26c2db75626f216143026bf8acf3baa11d86c278e902c78afad4f806ca36f9e54bc75ff0a
-
C:\Users\Admin\AppData\Local\Temp\7zS83E5.tmp\[email protected]\bootstrap.js
Filesize2KB
MD5df13f711e20e9c80171846d4f2f7ae06
SHA156d29cda58427efe0e21d3880d39eb1b0ef60bee
SHA2566c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4
SHA5126c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e
-
C:\Users\Admin\AppData\Local\Temp\7zS83E5.tmp\[email protected]\chrome.manifest
Filesize35B
MD5d6bd37fa3ed36307c5bd743aedf8a3fe
SHA10056064a5b6763a1082b6cce025edf915bcc324b
SHA2563d5940c68ad1e55c42eb758973176a508d7073c3044386d862a57e60faf0c467
SHA5128f3a3d696fcb8be9ad92f0c8ff1422168599f5cafa347932a3fc7d851e621a5eb1f7f12ec2394fc7d8570608055cc9d96e62b2154c08ebd43257d90b0f981980
-
C:\Users\Admin\AppData\Local\Temp\7zS83E5.tmp\[email protected]\content\bg.js
Filesize7KB
MD5a23140ed224299012d29528d014d3cff
SHA125d7ee95832476b26924b1e6d2f97d6708ac866f
SHA25617ba15c67995670e89468585d612d6ad82b2b3c53f380471d4e4a13ad73ec435
SHA512a9a76fff312f5ac72ae8448c307eaae440eefb6e5c789bbb35e217de26f5acc732b1ed273167a0a83fe044d8c15f302a090f9bae230994d02d31edb86c6f805a
-
C:\Users\Admin\AppData\Local\Temp\7zS83E5.tmp\[email protected]\install.rdf
Filesize592B
MD5eb325aad82075972a8743de65cd9a0ad
SHA1cdf419878051fcc97f6a89d654e7c38d50c732c5
SHA2566886b3d320d06bec4a7d3ec9fcfe98a294f80681614d30a6c88bd73d34efcbdf
SHA5127205ffeddff5b4fe3ffc7302760a863b544d4f7baf67a70ce73361e54d1e3a97836271c81ea4ea8f01903290899780a70b8bc1e37dc777ebc644e867517a1119
-
Filesize
5KB
MD52a7165349e686191e8756d8652b22638
SHA1d13ffd239948499c2ac6fd71817674a60e695b3a
SHA2562e243d8381f7ebb7570dfda769a40ea9f2587a90a08dbd5902e13b59d3136f2f
SHA5126b7b34b56e234a916f05ef1f93a8f076e4ad92996c8e002ab1e7e596a0dfd7ee8bb102f1db0ce1a431bc051583df2130a06b01ce60504479f490c414477b97e2
-
Filesize
634KB
MD58b3b2e0c8e5f6fdefb32e82daf230175
SHA14ddeb5ed636661376b8e1ef41e5162387724ed44
SHA256e7be2ab45ff78525377a8da7205bbc29f871c907ddf30879d29aa0c219f65e99
SHA5128aeb49852cb6a1335df799e8e30b34d83303a225c1a7b2e029368246d81463d653109a4454a3f9196fa050c2a5e9ba4dc8372900c55ce989c821c954cb850038
-
Filesize
634KB
MD58b3b2e0c8e5f6fdefb32e82daf230175
SHA14ddeb5ed636661376b8e1ef41e5162387724ed44
SHA256e7be2ab45ff78525377a8da7205bbc29f871c907ddf30879d29aa0c219f65e99
SHA5128aeb49852cb6a1335df799e8e30b34d83303a225c1a7b2e029368246d81463d653109a4454a3f9196fa050c2a5e9ba4dc8372900c55ce989c821c954cb850038