Analysis

  • max time kernel
    326s
  • max time network
    415s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 09:30

General

  • Target

    7aee8d5ab97f459679e24e4b48e50d8ee502d3ac2f75455f8405389f39b3e0cc.exe

  • Size

    4.4MB

  • MD5

    758891e06fc557b791d324cf7ab3f539

  • SHA1

    36c7b4f23ef72af5828f26058688f5cddb980916

  • SHA256

    7aee8d5ab97f459679e24e4b48e50d8ee502d3ac2f75455f8405389f39b3e0cc

  • SHA512

    b9cb87901d06c346ee275e0c6cb1ae6cf36d6a80233dea39d34ebd3f6b935c1ff121fe48fb9666d236e1846e696c9bf4d66dcbf155c9c2a9a9de88d4c0171677

  • SSDEEP

    49152:LD8Ut7O8fe2mchdUxup4/SppWmD/M2BKQlj9buOBqF+dyoC3yE/Ac5mWxnmGG:BhO8hxhgSpp1D/fbuOBqFnoWNAxenF

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 6 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 64 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7aee8d5ab97f459679e24e4b48e50d8ee502d3ac2f75455f8405389f39b3e0cc.exe
    "C:\Users\Admin\AppData\Local\Temp\7aee8d5ab97f459679e24e4b48e50d8ee502d3ac2f75455f8405389f39b3e0cc.exe"
    1⤵
    • Loads dropped DLL
    • Installs/modifies Browser Helper Object
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • System policy modification
    PID:2580

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Browser Extensions

1
T1176

Defense Evasion

Modify Registry

3
T1112

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\YoutubeAdBlocke\IJLwQQhFxZL5kH.dll
    Filesize

    738KB

    MD5

    49961c7c9a7aef57f49adf50d1c810f6

    SHA1

    fc2078aeff5d5abee27c9e8a500cb2d6ae755b05

    SHA256

    c80abdc502d18db54137edc2680a498402c765999814b7fe1b2a7b69a64ce846

    SHA512

    8ad2c3dbd3b4390e4c49561f25ff2acdd4ab4468074e213f3efc81a598f71620e8f21fc87114623a6c0509997e47e1c4f5ffe703c7421ae313f7ba536df2772f

  • memory/2580-132-0x0000000002E20000-0x0000000002EE9000-memory.dmp
    Filesize

    804KB