Analysis

  • max time kernel
    140s
  • max time network
    184s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 16:52

General

  • Target

    f64ffa7c6b17e8b0dc6cab0e4c3665f85861e6f87b8b318eb39448550bf3c7d8.exe

  • Size

    4.6MB

  • MD5

    deccbdcc495fd0426959cfbb72b4a0df

  • SHA1

    ef872a61a81f609711cd458c68357a8692246b2c

  • SHA256

    f64ffa7c6b17e8b0dc6cab0e4c3665f85861e6f87b8b318eb39448550bf3c7d8

  • SHA512

    72c6025be5c19349cf20de36d7c9f377a47dfff8e01d34297747c48603d13c24523f6938b6ae87acf3b2105dbfb35cdbd9e8bc9e55d20fa11855fad257b163e5

  • SSDEEP

    49152:9iBJ2SpAZG133gmLEI10XOv0TP6oYlCXTAkA+ZuK2rFPIWoiwVdNFWPE/B/u:sUMp13QmQI10XOcTP+mrcZHf+Wc/d

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs 4 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 5 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 8 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Program Files directory 8 IoCs
  • Modifies Internet Explorer settings 1 TTPs 8 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f64ffa7c6b17e8b0dc6cab0e4c3665f85861e6f87b8b318eb39448550bf3c7d8.exe
    "C:\Users\Admin\AppData\Local\Temp\f64ffa7c6b17e8b0dc6cab0e4c3665f85861e6f87b8b318eb39448550bf3c7d8.exe"
    1⤵
    • Loads dropped DLL
    • Drops Chrome extension
    • Installs/modifies Browser Helper Object
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:4944
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32.exe /s "C:\Program Files (x86)\GoSave\T3pTSbazNWEy4h.x64.dll"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1772
      • C:\Windows\system32\regsvr32.exe
        /s "C:\Program Files (x86)\GoSave\T3pTSbazNWEy4h.x64.dll"
        3⤵
        • Registers COM server for autorun
        • Loads dropped DLL
        • Installs/modifies Browser Helper Object
        • Modifies Internet Explorer settings
        • Modifies registry class
        PID:4388
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
    1⤵
      PID:4496
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
      1⤵
        PID:3716

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\GoSave\T3pTSbazNWEy4h.dat

        Filesize

        4KB

        MD5

        c7b6b6cbe8e20769f601d4db99884c7b

        SHA1

        e7051be6d2e40696b89bbd24dbe02cab197748f5

        SHA256

        fec77ddae89d6dddd3c4fe387c8c073dec1e33682ed2df1551f64a2419faacb6

        SHA512

        d3e8321d305f4369cdb1345fa8de875ce4a9122fbbff75c9b0ea0e17aab15018cf3ff39d4404255df913fc1385f71f3f90c87764b4780de6b063eebcbdab19c3

      • C:\Program Files (x86)\GoSave\T3pTSbazNWEy4h.dll

        Filesize

        741KB

        MD5

        0f2db92a7d763af605b6273a4aa18382

        SHA1

        c9e6e9eb3c2050c86afa1b79e437ea8c8252573f

        SHA256

        ebdf480f55d619da9a5f23810ef174f5e789d81899bf4f63371cfd95e402658a

        SHA512

        824230a31cd7e7410c369dae190c1a3bec7498f52740b484e5d09c76265dbd71fb989f5ce889ca8a4f1ae28eb740e39d020b9581aa0496ae394d6ff3874038e5

      • C:\Program Files (x86)\GoSave\T3pTSbazNWEy4h.tlb

        Filesize

        3KB

        MD5

        b826030b97202e2efa7f7a60493c61a7

        SHA1

        8145289ac846d579df907dc43fa79fa5866f2930

        SHA256

        df318425290a57dbdaffd19be838eb1317d38d00be224272168375251cb2f83f

        SHA512

        246becba94b93fa2e79e9938efe94fd325e18ecd1ce93f642e184ba89d230a5cdf5596272e6ace3a7e9440e5aa9eb153bb8bc5ab6f3bc518fca9b790d4f8d6db

      • C:\Program Files (x86)\GoSave\T3pTSbazNWEy4h.x64.dll

        Filesize

        879KB

        MD5

        0b282547d65c4597ac0f2c5cc09c3b37

        SHA1

        43a626f01c7ead04cee4b8523b02ee7248271051

        SHA256

        c8dbfff7b084eb5ff31be01fbd03f392b4c7cb192e904810c7a9e60b985be846

        SHA512

        541a816d8981656a697f96a89daad2a2d84c9f4a0769175babf8a2785ad6580c2fc3180575a8feeab39f5956176ef4ed4c80f433b557775c359ca3659219da30

      • C:\Program Files (x86)\GoSave\T3pTSbazNWEy4h.x64.dll

        Filesize

        879KB

        MD5

        0b282547d65c4597ac0f2c5cc09c3b37

        SHA1

        43a626f01c7ead04cee4b8523b02ee7248271051

        SHA256

        c8dbfff7b084eb5ff31be01fbd03f392b4c7cb192e904810c7a9e60b985be846

        SHA512

        541a816d8981656a697f96a89daad2a2d84c9f4a0769175babf8a2785ad6580c2fc3180575a8feeab39f5956176ef4ed4c80f433b557775c359ca3659219da30

      • C:\Program Files (x86)\GoSave\T3pTSbazNWEy4h.x64.dll

        Filesize

        879KB

        MD5

        0b282547d65c4597ac0f2c5cc09c3b37

        SHA1

        43a626f01c7ead04cee4b8523b02ee7248271051

        SHA256

        c8dbfff7b084eb5ff31be01fbd03f392b4c7cb192e904810c7a9e60b985be846

        SHA512

        541a816d8981656a697f96a89daad2a2d84c9f4a0769175babf8a2785ad6580c2fc3180575a8feeab39f5956176ef4ed4c80f433b557775c359ca3659219da30

      • memory/1772-138-0x0000000000000000-mapping.dmp

      • memory/4388-141-0x0000000000000000-mapping.dmp

      • memory/4944-132-0x00000000038A0000-0x0000000003967000-memory.dmp

        Filesize

        796KB