Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 16:36
Static task
static1
Behavioral task
behavioral1
Sample
fb0a9e19ac53e65569094d958860baaf6803874b056867103c82ed75456e9ec7.exe
Resource
win7-20220812-en
General
-
Target
fb0a9e19ac53e65569094d958860baaf6803874b056867103c82ed75456e9ec7.exe
-
Size
2.5MB
-
MD5
87746ecb1280df1118db723c9d36abd0
-
SHA1
3b1cdb2183862ba147d5e0817d6fa09578c81389
-
SHA256
fb0a9e19ac53e65569094d958860baaf6803874b056867103c82ed75456e9ec7
-
SHA512
2e1b0e59656a9ef71a83ce1378deaf79cd9c5e35a6d76f7c71e182ea723ef868fc1ca678fba2102d62b91f2ccc5883e26d1e4da89eed5bbc0a40f1b4c970b694
-
SSDEEP
49152:h1Os3jtPNg3MaK+715e2Yl8Wd7dZcRGzPbXO2mg6P1Ql5PPLKMRnUD/:h1OWjVNI71i86pZbz55PPLKMRU7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
CMGktHiGycFoJIj.exepid process 1436 CMGktHiGycFoJIj.exe -
Loads dropped DLL 3 IoCs
Processes:
CMGktHiGycFoJIj.exeregsvr32.exeregsvr32.exepid process 1436 CMGktHiGycFoJIj.exe 2736 regsvr32.exe 4240 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 5 IoCs
Processes:
CMGktHiGycFoJIj.exedescription ioc process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\aabimjfhfnfjnaajdngcecpbnhbchjje\3.7\manifest.json CMGktHiGycFoJIj.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\aabimjfhfnfjnaajdngcecpbnhbchjje\3.7\manifest.json CMGktHiGycFoJIj.exe File created C:\Users\DefaultAccount\AppData\Local\Google\Chrome\User Data\Default\Extensions\aabimjfhfnfjnaajdngcecpbnhbchjje\3.7\manifest.json CMGktHiGycFoJIj.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\aabimjfhfnfjnaajdngcecpbnhbchjje\3.7\manifest.json CMGktHiGycFoJIj.exe File created C:\Users\WDAGUtilityAccount\AppData\Local\Google\Chrome\User Data\Default\Extensions\aabimjfhfnfjnaajdngcecpbnhbchjje\3.7\manifest.json CMGktHiGycFoJIj.exe -
Installs/modifies Browser Helper Object 2 TTPs 9 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
CMGktHiGycFoJIj.exeregsvr32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ CMGktHiGycFoJIj.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{DBC80044-A445-435B-BC74-9C25C1C588A9} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} CMGktHiGycFoJIj.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA} CMGktHiGycFoJIj.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects CMGktHiGycFoJIj.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43} regsvr32.exe -
Drops file in Program Files directory 8 IoCs
Processes:
CMGktHiGycFoJIj.exedescription ioc process File created C:\Program Files (x86)\websave\QlFSXVSBpmSnWE.x64.dll CMGktHiGycFoJIj.exe File opened for modification C:\Program Files (x86)\websave\QlFSXVSBpmSnWE.x64.dll CMGktHiGycFoJIj.exe File created C:\Program Files (x86)\websave\QlFSXVSBpmSnWE.dll CMGktHiGycFoJIj.exe File opened for modification C:\Program Files (x86)\websave\QlFSXVSBpmSnWE.dll CMGktHiGycFoJIj.exe File created C:\Program Files (x86)\websave\QlFSXVSBpmSnWE.tlb CMGktHiGycFoJIj.exe File opened for modification C:\Program Files (x86)\websave\QlFSXVSBpmSnWE.tlb CMGktHiGycFoJIj.exe File created C:\Program Files (x86)\websave\QlFSXVSBpmSnWE.dat CMGktHiGycFoJIj.exe File opened for modification C:\Program Files (x86)\websave\QlFSXVSBpmSnWE.dat CMGktHiGycFoJIj.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
CMGktHiGycFoJIj.exepid process 1436 CMGktHiGycFoJIj.exe 1436 CMGktHiGycFoJIj.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
fb0a9e19ac53e65569094d958860baaf6803874b056867103c82ed75456e9ec7.exeCMGktHiGycFoJIj.exeregsvr32.exedescription pid process target process PID 4792 wrote to memory of 1436 4792 fb0a9e19ac53e65569094d958860baaf6803874b056867103c82ed75456e9ec7.exe CMGktHiGycFoJIj.exe PID 4792 wrote to memory of 1436 4792 fb0a9e19ac53e65569094d958860baaf6803874b056867103c82ed75456e9ec7.exe CMGktHiGycFoJIj.exe PID 4792 wrote to memory of 1436 4792 fb0a9e19ac53e65569094d958860baaf6803874b056867103c82ed75456e9ec7.exe CMGktHiGycFoJIj.exe PID 1436 wrote to memory of 2736 1436 CMGktHiGycFoJIj.exe regsvr32.exe PID 1436 wrote to memory of 2736 1436 CMGktHiGycFoJIj.exe regsvr32.exe PID 1436 wrote to memory of 2736 1436 CMGktHiGycFoJIj.exe regsvr32.exe PID 2736 wrote to memory of 4240 2736 regsvr32.exe regsvr32.exe PID 2736 wrote to memory of 4240 2736 regsvr32.exe regsvr32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb0a9e19ac53e65569094d958860baaf6803874b056867103c82ed75456e9ec7.exe"C:\Users\Admin\AppData\Local\Temp\fb0a9e19ac53e65569094d958860baaf6803874b056867103c82ed75456e9ec7.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\7zS8BD9.tmp\CMGktHiGycFoJIj.exe.\CMGktHiGycFoJIj.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\websave\QlFSXVSBpmSnWE.x64.dll"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\websave\QlFSXVSBpmSnWE.x64.dll"4⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
PID:4240
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5a7e82e5a24c0a78771dad8d312252221
SHA1d463bdb3662e44184efdb3f88eadee8c33b14369
SHA256987abcc7e4cc41d78b39f23cb488c205db88344bf9897a088db7ebc367d8356c
SHA512213eedb88609363950bba410cbdf922788a888d3cec528540440c283ba1434874f430f917c4acfaf7f2eb018c87d2d52511e0818f4d8f40e96358b44b06add55
-
Filesize
741KB
MD502955857b45fa9ddd4229b9d67f65d93
SHA1a5fe5c71d62bd9648ab25660d7cae6eff98af3ed
SHA256839e59c1dd9fa6ce4ed8b4b964b32a3afdd5b6b621580c47cdad754868abe753
SHA5120b0c6a7754abead8aec777a1ee4330f4c5ee90aebde30266e6ad93f356f91abbe4a2bc3fdc924556edb82c3b4bd0f97191e72d6039bed14975d5e5b940af3261
-
Filesize
879KB
MD5f60a9be9218f7d3c329205bd4f585ee7
SHA18b31e1d5b92ff6642cc5fb707ec76596ce84002c
SHA2567b08c02a0b7315c5b860b594d6486f85a8c182a1851313e1a6299810b896d394
SHA512a6a18d63220f92f80881aaf5f7ed936d7e317a50fe2fc0452f5b3c6793b5b6ffac782366c65d91d7cad1b5a68149f5fa9cd82cf57ba0208ea271c792bddee6a7
-
Filesize
879KB
MD5f60a9be9218f7d3c329205bd4f585ee7
SHA18b31e1d5b92ff6642cc5fb707ec76596ce84002c
SHA2567b08c02a0b7315c5b860b594d6486f85a8c182a1851313e1a6299810b896d394
SHA512a6a18d63220f92f80881aaf5f7ed936d7e317a50fe2fc0452f5b3c6793b5b6ffac782366c65d91d7cad1b5a68149f5fa9cd82cf57ba0208ea271c792bddee6a7
-
Filesize
879KB
MD5f60a9be9218f7d3c329205bd4f585ee7
SHA18b31e1d5b92ff6642cc5fb707ec76596ce84002c
SHA2567b08c02a0b7315c5b860b594d6486f85a8c182a1851313e1a6299810b896d394
SHA512a6a18d63220f92f80881aaf5f7ed936d7e317a50fe2fc0452f5b3c6793b5b6ffac782366c65d91d7cad1b5a68149f5fa9cd82cf57ba0208ea271c792bddee6a7
-
Filesize
6KB
MD5a7e82e5a24c0a78771dad8d312252221
SHA1d463bdb3662e44184efdb3f88eadee8c33b14369
SHA256987abcc7e4cc41d78b39f23cb488c205db88344bf9897a088db7ebc367d8356c
SHA512213eedb88609363950bba410cbdf922788a888d3cec528540440c283ba1434874f430f917c4acfaf7f2eb018c87d2d52511e0818f4d8f40e96358b44b06add55
-
Filesize
783KB
MD5e5f19b8f3fa9ba590482ee5d1c7ed005
SHA1e3d599ca32f07024e281f26e764ef09697aba822
SHA256688036044c4521a1841e9fb5a704d505bfc47c4fc80be111e9a321869a56f9b9
SHA512dde4cd947a2820da9a70c584ad136fc87bf68e272e3b5842967580165a602225fcb754966f2f5d3e66db87026c68f61055893b4d2033183ab5b35fe96d4e16ab
-
Filesize
783KB
MD5e5f19b8f3fa9ba590482ee5d1c7ed005
SHA1e3d599ca32f07024e281f26e764ef09697aba822
SHA256688036044c4521a1841e9fb5a704d505bfc47c4fc80be111e9a321869a56f9b9
SHA512dde4cd947a2820da9a70c584ad136fc87bf68e272e3b5842967580165a602225fcb754966f2f5d3e66db87026c68f61055893b4d2033183ab5b35fe96d4e16ab
-
Filesize
741KB
MD502955857b45fa9ddd4229b9d67f65d93
SHA1a5fe5c71d62bd9648ab25660d7cae6eff98af3ed
SHA256839e59c1dd9fa6ce4ed8b4b964b32a3afdd5b6b621580c47cdad754868abe753
SHA5120b0c6a7754abead8aec777a1ee4330f4c5ee90aebde30266e6ad93f356f91abbe4a2bc3fdc924556edb82c3b4bd0f97191e72d6039bed14975d5e5b940af3261
-
Filesize
3KB
MD575846c93e1f5b9d77fcc4520a65b4936
SHA1f4631b5f768bfa33063a96c7a0da478c1fb28791
SHA256c6843974e37a7eb67c2e6550cec7ffd63645d80f4bd9613430e5824b4604b08b
SHA512a51876207191e351f955e614be727f9b0141cce69d46f7bbf141a632306fe277de3372848c5b707da525d22bafca044b0a73c544a2a670d4056d33f37f7b328c
-
Filesize
879KB
MD5f60a9be9218f7d3c329205bd4f585ee7
SHA18b31e1d5b92ff6642cc5fb707ec76596ce84002c
SHA2567b08c02a0b7315c5b860b594d6486f85a8c182a1851313e1a6299810b896d394
SHA512a6a18d63220f92f80881aaf5f7ed936d7e317a50fe2fc0452f5b3c6793b5b6ffac782366c65d91d7cad1b5a68149f5fa9cd82cf57ba0208ea271c792bddee6a7
-
Filesize
5KB
MD5955975efc1b7fec524bd0d7a6c035ed7
SHA158270e39b6cc16bd9451c313ad4749d2d649251a
SHA256f1f43f8ac6fd0e290c3d919bba3d2fdb23d880420b298854acd4be787a764d45
SHA51272ebce626621d3546750d64ebca4b02bd1a0ad77818474a69380debbe27ba92101b3e70677dcdac5a57709aaa61d079216d6b3d36254781e1f2ad6d890cb82f9
-
Filesize
144B
MD5c747e26a768dd202a344744ae938bb74
SHA1a2fc472e928adde813dfd992501df353e8a7e028
SHA2564d5c1a0caef66c1167c1e85e09e6ec792dae0bc622db243e5645179f86ced9e5
SHA5124ed2f78cef632215ac7e47a8f3672a838b084c3dd71e4d0ce6fd12b09dbd25f1712fac7ad0b85835767fc25574e720e09f4505c470a6342ef20fbc024a25d6ba
-
Filesize
144B
MD5fca19198fd8af21016a8b1dec7980002
SHA1fd01a47d14004e17a625efe66cc46a06c786cf40
SHA256332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a
SHA51260f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47
-
Filesize
531B
MD536d98318ab2b3b2585a30984db328afb
SHA1f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5
SHA256ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7
SHA5126f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a
-
Filesize
499B
MD5f6da34f727bd43075d13ea3c24cc5faf
SHA18aede51366d86e39b14718228831c1c198b4355c
SHA25691b8694c1ec2c0408c90ac98e8c40e4c08f1a04365163d44b1507a0d7838d221
SHA5120326e0734db861ce2404f6b338e517ae2ec6c3cf0bdb62764ccd1fa4e710750ecb2622bdb1d45c737bfaf210227b229d8e87d99942088a8ee0ed4ca39c013527
-
C:\Users\Admin\AppData\Local\Temp\7zS8BD9.tmp\[email protected]\bootstrap.js
Filesize2KB
MD5df13f711e20e9c80171846d4f2f7ae06
SHA156d29cda58427efe0e21d3880d39eb1b0ef60bee
SHA2566c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4
SHA5126c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e
-
C:\Users\Admin\AppData\Local\Temp\7zS8BD9.tmp\[email protected]\chrome.manifest
Filesize35B
MD5b3af5c8116f4c1c8c91216023dd24f05
SHA1ba5beb395e5c5e47c5df8a69222aa850fdd9e609
SHA256fc6e6c2a2d0666d918bc527282a6a78525afc255a09ac06f53c3c6d78dcc1216
SHA512539f0a2501317474c7776b06efeb425822bc6ecf18019cd171a6a90cd839d77a7200e496a69c2a2858c71d0d9b60a3060acce489958c1e7f1708dc1c0d41a55e
-
C:\Users\Admin\AppData\Local\Temp\7zS8BD9.tmp\[email protected]\content\bg.js
Filesize7KB
MD59d90fe46f5a66781330330e7597e82cd
SHA160e502ec6636769eb13812b4bb4011cd7e8654f9
SHA2568a3b6f191df43468857596e0477884f647540a231e2c347519944753d919c015
SHA5124d5cc54af2b341d49e0876418abb45b0ef8e9d90ddc11949bdec61c29985b08dc80867fd86a5172b937e070c0b8bda4da8d2c25e1438b45d7f79a255ba389ba1
-
C:\Users\Admin\AppData\Local\Temp\7zS8BD9.tmp\[email protected]\install.rdf
Filesize597B
MD53da2ca50693b465545c156c541184fb2
SHA1f263b430f861097a6a92765419ee74f0a40e26e9
SHA256083408caa3154b451528dc4703b730d23f08b409572415d8de3e3c1029b51a6e
SHA51259ad080e46764d80a1dcdcfcdfaaeeb1e57b245b05ea7bc9d7f5b798d3e70f9de2c7ad932ed19f1e1c79bd751c9555789011e1b365dcba232f03bca878561147