Analysis
-
max time kernel
44s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 16:26
Static task
static1
Behavioral task
behavioral1
Sample
fe27c6e73e2a1a7bfeafc239d8b147b52ded5b0256c0889f0d2dde4531dd12e9.exe
Resource
win7-20220901-en
General
-
Target
fe27c6e73e2a1a7bfeafc239d8b147b52ded5b0256c0889f0d2dde4531dd12e9.exe
-
Size
2.5MB
-
MD5
3c6acff981e9d8d9320f2168f79fe9ff
-
SHA1
0eed5bcc91048169a674413e22b8d97cf9bb85ce
-
SHA256
fe27c6e73e2a1a7bfeafc239d8b147b52ded5b0256c0889f0d2dde4531dd12e9
-
SHA512
49d3dcadfb5f46d3450b786d810aac4a3fd4fef470f311cb2d50f3abde351ae1fb84616612e14ea8b87edbce27f7322e0301fce97ad0d42d060c2393909d6df9
-
SSDEEP
49152:h1OssjtPNg3MaK+715e2Yl8Wd7dZcRGzPbXO2mg6P1Ql5PPLKMRnUDa:h1OljVNI71i86pZbz55PPLKMRUu
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
c2dI8MusdAlEKzv.exepid process 944 c2dI8MusdAlEKzv.exe -
Loads dropped DLL 4 IoCs
Processes:
fe27c6e73e2a1a7bfeafc239d8b147b52ded5b0256c0889f0d2dde4531dd12e9.exec2dI8MusdAlEKzv.exeregsvr32.exeregsvr32.exepid process 852 fe27c6e73e2a1a7bfeafc239d8b147b52ded5b0256c0889f0d2dde4531dd12e9.exe 944 c2dI8MusdAlEKzv.exe 624 regsvr32.exe 1192 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 3 IoCs
Processes:
c2dI8MusdAlEKzv.exedescription ioc process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\hpgoajokipllhfknkmfkmhopadhpodhl\5.2\manifest.json c2dI8MusdAlEKzv.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\hpgoajokipllhfknkmfkmhopadhpodhl\5.2\manifest.json c2dI8MusdAlEKzv.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\hpgoajokipllhfknkmfkmhopadhpodhl\5.2\manifest.json c2dI8MusdAlEKzv.exe -
Installs/modifies Browser Helper Object 2 TTPs 11 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
c2dI8MusdAlEKzv.exeregsvr32.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{18DF081C-E8AD-4283-A596-FA578C2EBDC3} c2dI8MusdAlEKzv.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} c2dI8MusdAlEKzv.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} c2dI8MusdAlEKzv.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects c2dI8MusdAlEKzv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\ c2dI8MusdAlEKzv.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DBC80044-A445-435B-BC74-9C25C1C588A9} regsvr32.exe -
Drops file in Program Files directory 8 IoCs
Processes:
c2dI8MusdAlEKzv.exedescription ioc process File opened for modification C:\Program Files (x86)\PriceLess\w0PWCG2XvHAldj.dll c2dI8MusdAlEKzv.exe File created C:\Program Files (x86)\PriceLess\w0PWCG2XvHAldj.tlb c2dI8MusdAlEKzv.exe File opened for modification C:\Program Files (x86)\PriceLess\w0PWCG2XvHAldj.tlb c2dI8MusdAlEKzv.exe File created C:\Program Files (x86)\PriceLess\w0PWCG2XvHAldj.dat c2dI8MusdAlEKzv.exe File opened for modification C:\Program Files (x86)\PriceLess\w0PWCG2XvHAldj.dat c2dI8MusdAlEKzv.exe File created C:\Program Files (x86)\PriceLess\w0PWCG2XvHAldj.x64.dll c2dI8MusdAlEKzv.exe File opened for modification C:\Program Files (x86)\PriceLess\w0PWCG2XvHAldj.x64.dll c2dI8MusdAlEKzv.exe File created C:\Program Files (x86)\PriceLess\w0PWCG2XvHAldj.dll c2dI8MusdAlEKzv.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
c2dI8MusdAlEKzv.exepid process 944 c2dI8MusdAlEKzv.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
fe27c6e73e2a1a7bfeafc239d8b147b52ded5b0256c0889f0d2dde4531dd12e9.exec2dI8MusdAlEKzv.exeregsvr32.exedescription pid process target process PID 852 wrote to memory of 944 852 fe27c6e73e2a1a7bfeafc239d8b147b52ded5b0256c0889f0d2dde4531dd12e9.exe c2dI8MusdAlEKzv.exe PID 852 wrote to memory of 944 852 fe27c6e73e2a1a7bfeafc239d8b147b52ded5b0256c0889f0d2dde4531dd12e9.exe c2dI8MusdAlEKzv.exe PID 852 wrote to memory of 944 852 fe27c6e73e2a1a7bfeafc239d8b147b52ded5b0256c0889f0d2dde4531dd12e9.exe c2dI8MusdAlEKzv.exe PID 852 wrote to memory of 944 852 fe27c6e73e2a1a7bfeafc239d8b147b52ded5b0256c0889f0d2dde4531dd12e9.exe c2dI8MusdAlEKzv.exe PID 944 wrote to memory of 624 944 c2dI8MusdAlEKzv.exe regsvr32.exe PID 944 wrote to memory of 624 944 c2dI8MusdAlEKzv.exe regsvr32.exe PID 944 wrote to memory of 624 944 c2dI8MusdAlEKzv.exe regsvr32.exe PID 944 wrote to memory of 624 944 c2dI8MusdAlEKzv.exe regsvr32.exe PID 944 wrote to memory of 624 944 c2dI8MusdAlEKzv.exe regsvr32.exe PID 944 wrote to memory of 624 944 c2dI8MusdAlEKzv.exe regsvr32.exe PID 944 wrote to memory of 624 944 c2dI8MusdAlEKzv.exe regsvr32.exe PID 624 wrote to memory of 1192 624 regsvr32.exe regsvr32.exe PID 624 wrote to memory of 1192 624 regsvr32.exe regsvr32.exe PID 624 wrote to memory of 1192 624 regsvr32.exe regsvr32.exe PID 624 wrote to memory of 1192 624 regsvr32.exe regsvr32.exe PID 624 wrote to memory of 1192 624 regsvr32.exe regsvr32.exe PID 624 wrote to memory of 1192 624 regsvr32.exe regsvr32.exe PID 624 wrote to memory of 1192 624 regsvr32.exe regsvr32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe27c6e73e2a1a7bfeafc239d8b147b52ded5b0256c0889f0d2dde4531dd12e9.exe"C:\Users\Admin\AppData\Local\Temp\fe27c6e73e2a1a7bfeafc239d8b147b52ded5b0256c0889f0d2dde4531dd12e9.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Users\Admin\AppData\Local\Temp\7zS2C9D.tmp\c2dI8MusdAlEKzv.exe.\c2dI8MusdAlEKzv.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\PriceLess\w0PWCG2XvHAldj.x64.dll"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\PriceLess\w0PWCG2XvHAldj.x64.dll"4⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
PID:1192
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5db83ba6417a4f672d67d52ca27b0e6e9
SHA1f2556c67784805fa3211cb60891b2f0614929b21
SHA256dfe402718dbdedfb989e5af314a7fa8b6fd89d648cf98889d51c110ec823f31b
SHA512cf9ee04db33e391c9c610f92b9a6215558304e5728f7fe097ed9d794460b0641413b4c2395cf9ec04160efa205de3104a59af2671309bbbad5847e920f1324f8
-
Filesize
879KB
MD5f60a9be9218f7d3c329205bd4f585ee7
SHA18b31e1d5b92ff6642cc5fb707ec76596ce84002c
SHA2567b08c02a0b7315c5b860b594d6486f85a8c182a1851313e1a6299810b896d394
SHA512a6a18d63220f92f80881aaf5f7ed936d7e317a50fe2fc0452f5b3c6793b5b6ffac782366c65d91d7cad1b5a68149f5fa9cd82cf57ba0208ea271c792bddee6a7
-
C:\Users\Admin\AppData\Local\Temp\7zS2C9D.tmp\[email protected]\bootstrap.js
Filesize2KB
MD5df13f711e20e9c80171846d4f2f7ae06
SHA156d29cda58427efe0e21d3880d39eb1b0ef60bee
SHA2566c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4
SHA5126c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e
-
C:\Users\Admin\AppData\Local\Temp\7zS2C9D.tmp\[email protected]\chrome.manifest
Filesize35B
MD58ca81e9bbd61452e3c040145724482e8
SHA17a5e3c792b851950397d39bc7a93e544c2ff0ee5
SHA256b46b0c69187a2137674de8bb05f4988cb451677d1bb090d80e13ebc5a2ac1ac1
SHA512d40da9bbae506fb7db30029305e002c55a86e217a39a1943d4e70cc832a5044ca150cc25a085b505387b5aac94dbc6d5dedc3d62fa2405f075ba0117d74ad1bf
-
C:\Users\Admin\AppData\Local\Temp\7zS2C9D.tmp\[email protected]\content\bg.js
Filesize7KB
MD520d9eacfba26db4002da1a0721be1a1f
SHA144f9259a2ed6bf11d1ad5432f876874c9a99138a
SHA25619775d703a5aa3879cf282fdcfc31120dd1634269e0d5de07ac907f81976e09c
SHA512ea8f6bc16a2d67a1e902e3b22e2e0bac0de1db1b125cccc5555a587226d97e642d47de3e411f423cd652862445f301ba40bf78211c2b9e4aa6c211f3068cbd7c
-
C:\Users\Admin\AppData\Local\Temp\7zS2C9D.tmp\[email protected]\install.rdf
Filesize593B
MD50d40212ab04943e871740d5bc4fbd75e
SHA14a1fec74bf231a4999bb72d35897e278a3f8794e
SHA256c1a3c54aae13f4a6cc2d16eefbe2218ee3e75eb549be9e2b9cbde5ebd367fdae
SHA51242cad73b166118daad9658108228016215da6989700eb50e57cc010affbd5627198e5c5615eb4a5d243e0dec105aebf289c0526d8fdf016fb07f28e596157f3b
-
Filesize
6KB
MD5db83ba6417a4f672d67d52ca27b0e6e9
SHA1f2556c67784805fa3211cb60891b2f0614929b21
SHA256dfe402718dbdedfb989e5af314a7fa8b6fd89d648cf98889d51c110ec823f31b
SHA512cf9ee04db33e391c9c610f92b9a6215558304e5728f7fe097ed9d794460b0641413b4c2395cf9ec04160efa205de3104a59af2671309bbbad5847e920f1324f8
-
Filesize
783KB
MD5e5f19b8f3fa9ba590482ee5d1c7ed005
SHA1e3d599ca32f07024e281f26e764ef09697aba822
SHA256688036044c4521a1841e9fb5a704d505bfc47c4fc80be111e9a321869a56f9b9
SHA512dde4cd947a2820da9a70c584ad136fc87bf68e272e3b5842967580165a602225fcb754966f2f5d3e66db87026c68f61055893b4d2033183ab5b35fe96d4e16ab
-
Filesize
783KB
MD5e5f19b8f3fa9ba590482ee5d1c7ed005
SHA1e3d599ca32f07024e281f26e764ef09697aba822
SHA256688036044c4521a1841e9fb5a704d505bfc47c4fc80be111e9a321869a56f9b9
SHA512dde4cd947a2820da9a70c584ad136fc87bf68e272e3b5842967580165a602225fcb754966f2f5d3e66db87026c68f61055893b4d2033183ab5b35fe96d4e16ab
-
Filesize
144B
MD59d45ec4895770b81281bf826f9278909
SHA1cb870d1ef769a928d3db84689c29a9f52da6cf8e
SHA2567aeeb6dcaa2139dd766a9457b865adff8f13a30f93e905ed7ea25220516052b8
SHA512900ab47a17deb9eb28fa794b38fd570a380715af165d86e586e342e625ded7d2a3665cc46c83fc50dae13c371f75ed9655dce552cfe63eeb769febb74de01378
-
Filesize
144B
MD5fca19198fd8af21016a8b1dec7980002
SHA1fd01a47d14004e17a625efe66cc46a06c786cf40
SHA256332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a
SHA51260f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47
-
Filesize
531B
MD536d98318ab2b3b2585a30984db328afb
SHA1f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5
SHA256ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7
SHA5126f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a
-
Filesize
501B
MD59d9d74bfa8e9ace025b834b96419d05e
SHA1f5e56a100b0208b88335859cec692d867ffb572b
SHA256a54dc66b61256c08f2bf60f507673814d263effe532fd8e6e1e1d662eca1d265
SHA5124c8b216a781da9d366d5ea49e66dda6313c1f12947e59119782d14fe07ffa2db9de5b4e818f6e58088dd90f167ac8168796887676e0eacf7a86d2c9f7c3c1512
-
Filesize
5KB
MD51e5f4dc3dbbc8e1c9e58e97bcf05c3a6
SHA1e6288c819038763dfadf185fb27dfeacc5fc6e29
SHA256bb44a06c254fa7fb0f62c5b11da53de0858bf3229a6da967742875f03ed44dfd
SHA512117b72209bd2f05064aeaa080c48f914ce68a944ceb4aa77e60331df8e695c63807fa77eb861e874e7506f25ea17a32c5e99543580415943dd7ccf9c544ea293
-
Filesize
741KB
MD502955857b45fa9ddd4229b9d67f65d93
SHA1a5fe5c71d62bd9648ab25660d7cae6eff98af3ed
SHA256839e59c1dd9fa6ce4ed8b4b964b32a3afdd5b6b621580c47cdad754868abe753
SHA5120b0c6a7754abead8aec777a1ee4330f4c5ee90aebde30266e6ad93f356f91abbe4a2bc3fdc924556edb82c3b4bd0f97191e72d6039bed14975d5e5b940af3261
-
Filesize
3KB
MD575846c93e1f5b9d77fcc4520a65b4936
SHA1f4631b5f768bfa33063a96c7a0da478c1fb28791
SHA256c6843974e37a7eb67c2e6550cec7ffd63645d80f4bd9613430e5824b4604b08b
SHA512a51876207191e351f955e614be727f9b0141cce69d46f7bbf141a632306fe277de3372848c5b707da525d22bafca044b0a73c544a2a670d4056d33f37f7b328c
-
Filesize
879KB
MD5f60a9be9218f7d3c329205bd4f585ee7
SHA18b31e1d5b92ff6642cc5fb707ec76596ce84002c
SHA2567b08c02a0b7315c5b860b594d6486f85a8c182a1851313e1a6299810b896d394
SHA512a6a18d63220f92f80881aaf5f7ed936d7e317a50fe2fc0452f5b3c6793b5b6ffac782366c65d91d7cad1b5a68149f5fa9cd82cf57ba0208ea271c792bddee6a7
-
Filesize
741KB
MD502955857b45fa9ddd4229b9d67f65d93
SHA1a5fe5c71d62bd9648ab25660d7cae6eff98af3ed
SHA256839e59c1dd9fa6ce4ed8b4b964b32a3afdd5b6b621580c47cdad754868abe753
SHA5120b0c6a7754abead8aec777a1ee4330f4c5ee90aebde30266e6ad93f356f91abbe4a2bc3fdc924556edb82c3b4bd0f97191e72d6039bed14975d5e5b940af3261
-
Filesize
879KB
MD5f60a9be9218f7d3c329205bd4f585ee7
SHA18b31e1d5b92ff6642cc5fb707ec76596ce84002c
SHA2567b08c02a0b7315c5b860b594d6486f85a8c182a1851313e1a6299810b896d394
SHA512a6a18d63220f92f80881aaf5f7ed936d7e317a50fe2fc0452f5b3c6793b5b6ffac782366c65d91d7cad1b5a68149f5fa9cd82cf57ba0208ea271c792bddee6a7
-
Filesize
879KB
MD5f60a9be9218f7d3c329205bd4f585ee7
SHA18b31e1d5b92ff6642cc5fb707ec76596ce84002c
SHA2567b08c02a0b7315c5b860b594d6486f85a8c182a1851313e1a6299810b896d394
SHA512a6a18d63220f92f80881aaf5f7ed936d7e317a50fe2fc0452f5b3c6793b5b6ffac782366c65d91d7cad1b5a68149f5fa9cd82cf57ba0208ea271c792bddee6a7
-
Filesize
783KB
MD5e5f19b8f3fa9ba590482ee5d1c7ed005
SHA1e3d599ca32f07024e281f26e764ef09697aba822
SHA256688036044c4521a1841e9fb5a704d505bfc47c4fc80be111e9a321869a56f9b9
SHA512dde4cd947a2820da9a70c584ad136fc87bf68e272e3b5842967580165a602225fcb754966f2f5d3e66db87026c68f61055893b4d2033183ab5b35fe96d4e16ab