Analysis

  • max time kernel
    7s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 16:52

General

  • Target

    f64ffa7c6b17e8b0dc6cab0e4c3665f85861e6f87b8b318eb39448550bf3c7d8.exe

  • Size

    4.6MB

  • MD5

    deccbdcc495fd0426959cfbb72b4a0df

  • SHA1

    ef872a61a81f609711cd458c68357a8692246b2c

  • SHA256

    f64ffa7c6b17e8b0dc6cab0e4c3665f85861e6f87b8b318eb39448550bf3c7d8

  • SHA512

    72c6025be5c19349cf20de36d7c9f377a47dfff8e01d34297747c48603d13c24523f6938b6ae87acf3b2105dbfb35cdbd9e8bc9e55d20fa11855fad257b163e5

  • SSDEEP

    49152:9iBJ2SpAZG133gmLEI10XOv0TP6oYlCXTAkA+ZuK2rFPIWoiwVdNFWPE/B/u:sUMp13QmQI10XOcTP+mrcZHf+Wc/d

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs 4 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 3 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 8 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Program Files directory 8 IoCs
  • Modifies Internet Explorer settings 1 TTPs 8 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f64ffa7c6b17e8b0dc6cab0e4c3665f85861e6f87b8b318eb39448550bf3c7d8.exe
    "C:\Users\Admin\AppData\Local\Temp\f64ffa7c6b17e8b0dc6cab0e4c3665f85861e6f87b8b318eb39448550bf3c7d8.exe"
    1⤵
    • Loads dropped DLL
    • Drops Chrome extension
    • Installs/modifies Browser Helper Object
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1136
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32.exe /s "C:\Program Files (x86)\GoSave\T3pTSbazNWEy4h.x64.dll"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1208
      • C:\Windows\system32\regsvr32.exe
        /s "C:\Program Files (x86)\GoSave\T3pTSbazNWEy4h.x64.dll"
        3⤵
        • Registers COM server for autorun
        • Loads dropped DLL
        • Installs/modifies Browser Helper Object
        • Modifies Internet Explorer settings
        • Modifies registry class
        PID:1724

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Browser Extensions

1
T1176

Defense Evasion

Modify Registry

3
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\GoSave\T3pTSbazNWEy4h.dat
    Filesize

    4KB

    MD5

    c7b6b6cbe8e20769f601d4db99884c7b

    SHA1

    e7051be6d2e40696b89bbd24dbe02cab197748f5

    SHA256

    fec77ddae89d6dddd3c4fe387c8c073dec1e33682ed2df1551f64a2419faacb6

    SHA512

    d3e8321d305f4369cdb1345fa8de875ce4a9122fbbff75c9b0ea0e17aab15018cf3ff39d4404255df913fc1385f71f3f90c87764b4780de6b063eebcbdab19c3

  • C:\Program Files (x86)\GoSave\T3pTSbazNWEy4h.tlb
    Filesize

    3KB

    MD5

    b826030b97202e2efa7f7a60493c61a7

    SHA1

    8145289ac846d579df907dc43fa79fa5866f2930

    SHA256

    df318425290a57dbdaffd19be838eb1317d38d00be224272168375251cb2f83f

    SHA512

    246becba94b93fa2e79e9938efe94fd325e18ecd1ce93f642e184ba89d230a5cdf5596272e6ace3a7e9440e5aa9eb153bb8bc5ab6f3bc518fca9b790d4f8d6db

  • C:\Program Files (x86)\GoSave\T3pTSbazNWEy4h.x64.dll
    Filesize

    879KB

    MD5

    0b282547d65c4597ac0f2c5cc09c3b37

    SHA1

    43a626f01c7ead04cee4b8523b02ee7248271051

    SHA256

    c8dbfff7b084eb5ff31be01fbd03f392b4c7cb192e904810c7a9e60b985be846

    SHA512

    541a816d8981656a697f96a89daad2a2d84c9f4a0769175babf8a2785ad6580c2fc3180575a8feeab39f5956176ef4ed4c80f433b557775c359ca3659219da30

  • \Program Files (x86)\GoSave\T3pTSbazNWEy4h.dll
    Filesize

    741KB

    MD5

    0f2db92a7d763af605b6273a4aa18382

    SHA1

    c9e6e9eb3c2050c86afa1b79e437ea8c8252573f

    SHA256

    ebdf480f55d619da9a5f23810ef174f5e789d81899bf4f63371cfd95e402658a

    SHA512

    824230a31cd7e7410c369dae190c1a3bec7498f52740b484e5d09c76265dbd71fb989f5ce889ca8a4f1ae28eb740e39d020b9581aa0496ae394d6ff3874038e5

  • \Program Files (x86)\GoSave\T3pTSbazNWEy4h.x64.dll
    Filesize

    879KB

    MD5

    0b282547d65c4597ac0f2c5cc09c3b37

    SHA1

    43a626f01c7ead04cee4b8523b02ee7248271051

    SHA256

    c8dbfff7b084eb5ff31be01fbd03f392b4c7cb192e904810c7a9e60b985be846

    SHA512

    541a816d8981656a697f96a89daad2a2d84c9f4a0769175babf8a2785ad6580c2fc3180575a8feeab39f5956176ef4ed4c80f433b557775c359ca3659219da30

  • \Program Files (x86)\GoSave\T3pTSbazNWEy4h.x64.dll
    Filesize

    879KB

    MD5

    0b282547d65c4597ac0f2c5cc09c3b37

    SHA1

    43a626f01c7ead04cee4b8523b02ee7248271051

    SHA256

    c8dbfff7b084eb5ff31be01fbd03f392b4c7cb192e904810c7a9e60b985be846

    SHA512

    541a816d8981656a697f96a89daad2a2d84c9f4a0769175babf8a2785ad6580c2fc3180575a8feeab39f5956176ef4ed4c80f433b557775c359ca3659219da30

  • memory/1136-54-0x0000000075F51000-0x0000000075F53000-memory.dmp
    Filesize

    8KB

  • memory/1136-55-0x0000000002CC0000-0x0000000002D87000-memory.dmp
    Filesize

    796KB

  • memory/1208-63-0x0000000000000000-mapping.dmp
  • memory/1724-67-0x0000000000000000-mapping.dmp
  • memory/1724-68-0x000007FEFB871000-0x000007FEFB873000-memory.dmp
    Filesize

    8KB