Analysis
-
max time kernel
61s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 19:19
Static task
static1
Behavioral task
behavioral1
Sample
c98c90fc50e3638cfc1edb4d4f9d8373477db758d4c100061e4d668cceeed368.exe
Resource
win7-20221111-en
General
-
Target
c98c90fc50e3638cfc1edb4d4f9d8373477db758d4c100061e4d668cceeed368.exe
-
Size
2.5MB
-
MD5
fcdc5133fafde64985b84c53249f5e47
-
SHA1
8401f4cebb91e6e2eb5491e42456bfa43636377c
-
SHA256
c98c90fc50e3638cfc1edb4d4f9d8373477db758d4c100061e4d668cceeed368
-
SHA512
a712ca2e63097a72471c94b0dd88996c9323ba567f1f30ebd49318f2ca5165c95b71ed4d405d088b7499fb7d6d964b4d31dfca64494f9e7e28200d3ebe5c788f
-
SSDEEP
49152:h1OsaTAHQDPTB3RnKWXUjuxZsHKddXx/WPKGL2ONrq8J8aUnbeZ9i:h1OpTAqMjuxZH/WpdU
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
jbS0mimEK40gML4.exepid process 268 jbS0mimEK40gML4.exe -
Loads dropped DLL 4 IoCs
Processes:
c98c90fc50e3638cfc1edb4d4f9d8373477db758d4c100061e4d668cceeed368.exejbS0mimEK40gML4.exeregsvr32.exeregsvr32.exepid process 680 c98c90fc50e3638cfc1edb4d4f9d8373477db758d4c100061e4d668cceeed368.exe 268 jbS0mimEK40gML4.exe 1796 regsvr32.exe 1852 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 3 IoCs
Processes:
jbS0mimEK40gML4.exedescription ioc process File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\onclpmnegglcmbhcjohamlpbppooejbp\5.2\manifest.json jbS0mimEK40gML4.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\onclpmnegglcmbhcjohamlpbppooejbp\5.2\manifest.json jbS0mimEK40gML4.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\onclpmnegglcmbhcjohamlpbppooejbp\5.2\manifest.json jbS0mimEK40gML4.exe -
Installs/modifies Browser Helper Object 2 TTPs 11 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
regsvr32.exejbS0mimEK40gML4.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} jbS0mimEK40gML4.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} jbS0mimEK40gML4.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects jbS0mimEK40gML4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\ jbS0mimEK40gML4.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DBC80044-A445-435B-BC74-9C25C1C588A9} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{18DF081C-E8AD-4283-A596-FA578C2EBDC3} jbS0mimEK40gML4.exe -
Drops file in Program Files directory 8 IoCs
Processes:
jbS0mimEK40gML4.exedescription ioc process File opened for modification C:\Program Files (x86)\PriceLess\deUek3ElAmvyWk.x64.dll jbS0mimEK40gML4.exe File created C:\Program Files (x86)\PriceLess\deUek3ElAmvyWk.dll jbS0mimEK40gML4.exe File opened for modification C:\Program Files (x86)\PriceLess\deUek3ElAmvyWk.dll jbS0mimEK40gML4.exe File created C:\Program Files (x86)\PriceLess\deUek3ElAmvyWk.tlb jbS0mimEK40gML4.exe File opened for modification C:\Program Files (x86)\PriceLess\deUek3ElAmvyWk.tlb jbS0mimEK40gML4.exe File created C:\Program Files (x86)\PriceLess\deUek3ElAmvyWk.dat jbS0mimEK40gML4.exe File opened for modification C:\Program Files (x86)\PriceLess\deUek3ElAmvyWk.dat jbS0mimEK40gML4.exe File created C:\Program Files (x86)\PriceLess\deUek3ElAmvyWk.x64.dll jbS0mimEK40gML4.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
jbS0mimEK40gML4.exepid process 268 jbS0mimEK40gML4.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
c98c90fc50e3638cfc1edb4d4f9d8373477db758d4c100061e4d668cceeed368.exejbS0mimEK40gML4.exeregsvr32.exedescription pid process target process PID 680 wrote to memory of 268 680 c98c90fc50e3638cfc1edb4d4f9d8373477db758d4c100061e4d668cceeed368.exe jbS0mimEK40gML4.exe PID 680 wrote to memory of 268 680 c98c90fc50e3638cfc1edb4d4f9d8373477db758d4c100061e4d668cceeed368.exe jbS0mimEK40gML4.exe PID 680 wrote to memory of 268 680 c98c90fc50e3638cfc1edb4d4f9d8373477db758d4c100061e4d668cceeed368.exe jbS0mimEK40gML4.exe PID 680 wrote to memory of 268 680 c98c90fc50e3638cfc1edb4d4f9d8373477db758d4c100061e4d668cceeed368.exe jbS0mimEK40gML4.exe PID 268 wrote to memory of 1796 268 jbS0mimEK40gML4.exe regsvr32.exe PID 268 wrote to memory of 1796 268 jbS0mimEK40gML4.exe regsvr32.exe PID 268 wrote to memory of 1796 268 jbS0mimEK40gML4.exe regsvr32.exe PID 268 wrote to memory of 1796 268 jbS0mimEK40gML4.exe regsvr32.exe PID 268 wrote to memory of 1796 268 jbS0mimEK40gML4.exe regsvr32.exe PID 268 wrote to memory of 1796 268 jbS0mimEK40gML4.exe regsvr32.exe PID 268 wrote to memory of 1796 268 jbS0mimEK40gML4.exe regsvr32.exe PID 1796 wrote to memory of 1852 1796 regsvr32.exe regsvr32.exe PID 1796 wrote to memory of 1852 1796 regsvr32.exe regsvr32.exe PID 1796 wrote to memory of 1852 1796 regsvr32.exe regsvr32.exe PID 1796 wrote to memory of 1852 1796 regsvr32.exe regsvr32.exe PID 1796 wrote to memory of 1852 1796 regsvr32.exe regsvr32.exe PID 1796 wrote to memory of 1852 1796 regsvr32.exe regsvr32.exe PID 1796 wrote to memory of 1852 1796 regsvr32.exe regsvr32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c98c90fc50e3638cfc1edb4d4f9d8373477db758d4c100061e4d668cceeed368.exe"C:\Users\Admin\AppData\Local\Temp\c98c90fc50e3638cfc1edb4d4f9d8373477db758d4c100061e4d668cceeed368.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zSDFE4.tmp\jbS0mimEK40gML4.exe.\jbS0mimEK40gML4.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\PriceLess\deUek3ElAmvyWk.x64.dll"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\PriceLess\deUek3ElAmvyWk.x64.dll"4⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\PriceLess\deUek3ElAmvyWk.datFilesize
6KB
MD584edbb88940a8fccb0f1ecad1ac642b7
SHA16f4ac47e4e6467da74ad06cc9ccf77b9a6543576
SHA256b89d041765fd3ab8babb1c8c271d93ca4f18cb837866747936375ada32173e13
SHA5129b8672933a59bf0a3795678a598e3e3b0be4e973de6c43115bc2025db691468120b20604471dd5d37639c39a78f0cebc14cdd24904e63b02046d879b4f2b30bd
-
C:\Program Files (x86)\PriceLess\deUek3ElAmvyWk.x64.dllFilesize
875KB
MD517da2bf78af676b649eae4f74864dfcc
SHA1decf265a0aadc130874511ace40c62b0c0e16aac
SHA256b3a707a96ccf454e91ecc1c8578928232646f188b7d9973678f0e27bbf96a2fb
SHA51276522bd652d3ed0d6bec2c467937e319c24040498f825a2e5dec3c18357c5548a37b3d99de1f748ffdc380ae36b502ec0a6761f2adb55ffbbab1972323a3e806
-
C:\Users\Admin\AppData\Local\Temp\7zSDFE4.tmp\4I1@P.org\bootstrap.jsFilesize
2KB
MD5df13f711e20e9c80171846d4f2f7ae06
SHA156d29cda58427efe0e21d3880d39eb1b0ef60bee
SHA2566c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4
SHA5126c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e
-
C:\Users\Admin\AppData\Local\Temp\7zSDFE4.tmp\4I1@P.org\chrome.manifestFilesize
35B
MD5a5053723f34e4a8e7dfcd29c33280c1a
SHA1ba01880c520fa1b469a3df4ab3107926c451d631
SHA256286da5f1fbaab966250d494949a322130b64b280d9d4808aca0b89809f688a6f
SHA512c4b375dd0ad2d59f66043c2f06945667ba61fd2b62cdc76ed025d9f07dc751a44e89cb52522c463cb9ca2c98d5f0aebfb41935e2ca36ebf6a649c322aa54c40f
-
C:\Users\Admin\AppData\Local\Temp\7zSDFE4.tmp\4I1@P.org\content\bg.jsFilesize
7KB
MD528f6e8d0efd0458602160c7519da55a4
SHA1cf751c07063a8579266ec420abd328d107d16b9a
SHA25696fcb8c3f2bec8d975a02c4436d38f13cafc5e7a5ab55a48521d86ba116d49d3
SHA512bd35319300b1c943d9fddb65860d25ee685ba5d056038c7645731d7a4067b60f97790714ca2205844bcfd5268d95d7de93447951b667a58bb7ddbb6d0e107de0
-
C:\Users\Admin\AppData\Local\Temp\7zSDFE4.tmp\4I1@P.org\install.rdfFilesize
594B
MD5dc3282d47342abd577ff87b8a5fbd763
SHA10a0c6bcc8f662801a147a5f96ed05083d3b4ff61
SHA25661cf52fdae820263efd7d7a05fc74ad207885fe97774d31b2fde3387b7fc01a8
SHA512ccfcba00918b1b19077a75dc70c1c2b4e4747b815225cad4d7c5d8c9a8487805e7d44a96b7a82d45a0253b1bdbd6e0131f3eb66078fb4e1e7fd3c1112e612b56
-
C:\Users\Admin\AppData\Local\Temp\7zSDFE4.tmp\deUek3ElAmvyWk.dllFilesize
747KB
MD5568f45a778978bfa4c7b3bd0c6a5dbf3
SHA12bf9ff26b5c38630b42d932506905725ef3a04a6
SHA256a914e0ec45c799c86c4f62d4144ab5b9c9ded0ad33461fb41de8a437ce00196d
SHA51262727e134832a741b10260a50a3f0ea68dece7e8f22afc29b937c10a84b3d6fbd23f36b8a1ff83bfa804a7fa18482671d25a9e94b77820c64f33bd66a95f2fca
-
C:\Users\Admin\AppData\Local\Temp\7zSDFE4.tmp\deUek3ElAmvyWk.tlbFilesize
3KB
MD509f02d57c684e89e594215260e2323b4
SHA1c66c408e4919d9466f0b079846658165fd5daf11
SHA256e4cdffe72ccc82e3dc738b78bc1aa4646ef9f9451662b0de6d67e18067837383
SHA512f44be8c55204e41ade8c71d837cfe6d21fc9e708fdeb1b40433b4b893287f11006835ff1361e81de42f9cf03e0783269169e7ec920ea6b4f369f2dd648febdf5
-
C:\Users\Admin\AppData\Local\Temp\7zSDFE4.tmp\deUek3ElAmvyWk.x64.dllFilesize
875KB
MD517da2bf78af676b649eae4f74864dfcc
SHA1decf265a0aadc130874511ace40c62b0c0e16aac
SHA256b3a707a96ccf454e91ecc1c8578928232646f188b7d9973678f0e27bbf96a2fb
SHA51276522bd652d3ed0d6bec2c467937e319c24040498f825a2e5dec3c18357c5548a37b3d99de1f748ffdc380ae36b502ec0a6761f2adb55ffbbab1972323a3e806
-
C:\Users\Admin\AppData\Local\Temp\7zSDFE4.tmp\jbS0mimEK40gML4.datFilesize
6KB
MD584edbb88940a8fccb0f1ecad1ac642b7
SHA16f4ac47e4e6467da74ad06cc9ccf77b9a6543576
SHA256b89d041765fd3ab8babb1c8c271d93ca4f18cb837866747936375ada32173e13
SHA5129b8672933a59bf0a3795678a598e3e3b0be4e973de6c43115bc2025db691468120b20604471dd5d37639c39a78f0cebc14cdd24904e63b02046d879b4f2b30bd
-
C:\Users\Admin\AppData\Local\Temp\7zSDFE4.tmp\jbS0mimEK40gML4.exeFilesize
785KB
MD5c452103272f13b87cdbecb41ae8c5e15
SHA13904c76d43842139288db38322ae2522f69b0f47
SHA25695494f4ea7ec3895ab6b670e91e3f99489d4ac84e54bb652bda11f1d539c5a30
SHA512f20683111d6cc0dc72de592e74d101a30af835bd32d4a70ad00fb9f2b5cc42081e6c942477dba8bb294ee0aadedf1e3b335bb982b5613ae550987f10f84273a5
-
C:\Users\Admin\AppData\Local\Temp\7zSDFE4.tmp\jbS0mimEK40gML4.exeFilesize
785KB
MD5c452103272f13b87cdbecb41ae8c5e15
SHA13904c76d43842139288db38322ae2522f69b0f47
SHA25695494f4ea7ec3895ab6b670e91e3f99489d4ac84e54bb652bda11f1d539c5a30
SHA512f20683111d6cc0dc72de592e74d101a30af835bd32d4a70ad00fb9f2b5cc42081e6c942477dba8bb294ee0aadedf1e3b335bb982b5613ae550987f10f84273a5
-
C:\Users\Admin\AppData\Local\Temp\7zSDFE4.tmp\onclpmnegglcmbhcjohamlpbppooejbp\X0bWcF6dA.jsFilesize
5KB
MD5c1e2f834dcd8f9b5e44139d5ac8009be
SHA188e649f70b823fa3f28a9a2cd9d98cb64a975d21
SHA2562e6959463a82494b12d824939d4b2e7045234e765efb751e737edbedc192c504
SHA51213d3b1a6506034563756d60ed916122f5c4bd6d8e7581be46833ecfff0f40fac1bcd5a8bb5781560f747f824b5a5310ed4c7a46a64863f2fdc61e8408a9330c0
-
C:\Users\Admin\AppData\Local\Temp\7zSDFE4.tmp\onclpmnegglcmbhcjohamlpbppooejbp\background.htmlFilesize
146B
MD5895ac588468e2b35d4dce1966619655a
SHA1d6a2c185de2e25265bc6bd9593c84d2f4907a121
SHA256b75c46972443beeec20cf0c7235ec4994d424e5200f4eb1a5ee95b288583b3ec
SHA512670949ef2147c32b5d59f845fc06d8fe066248177d90ec1e816006922f459585226b05e9a1a688972aa34cbb4a834ed2c08e08e18229f42024c2f2b180464148
-
C:\Users\Admin\AppData\Local\Temp\7zSDFE4.tmp\onclpmnegglcmbhcjohamlpbppooejbp\content.jsFilesize
144B
MD5fca19198fd8af21016a8b1dec7980002
SHA1fd01a47d14004e17a625efe66cc46a06c786cf40
SHA256332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a
SHA51260f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47
-
C:\Users\Admin\AppData\Local\Temp\7zSDFE4.tmp\onclpmnegglcmbhcjohamlpbppooejbp\lsdb.jsFilesize
531B
MD536d98318ab2b3b2585a30984db328afb
SHA1f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5
SHA256ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7
SHA5126f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a
-
C:\Users\Admin\AppData\Local\Temp\7zSDFE4.tmp\onclpmnegglcmbhcjohamlpbppooejbp\manifest.jsonFilesize
501B
MD59d9d74bfa8e9ace025b834b96419d05e
SHA1f5e56a100b0208b88335859cec692d867ffb572b
SHA256a54dc66b61256c08f2bf60f507673814d263effe532fd8e6e1e1d662eca1d265
SHA5124c8b216a781da9d366d5ea49e66dda6313c1f12947e59119782d14fe07ffa2db9de5b4e818f6e58088dd90f167ac8168796887676e0eacf7a86d2c9f7c3c1512
-
\Program Files (x86)\PriceLess\deUek3ElAmvyWk.dllFilesize
747KB
MD5568f45a778978bfa4c7b3bd0c6a5dbf3
SHA12bf9ff26b5c38630b42d932506905725ef3a04a6
SHA256a914e0ec45c799c86c4f62d4144ab5b9c9ded0ad33461fb41de8a437ce00196d
SHA51262727e134832a741b10260a50a3f0ea68dece7e8f22afc29b937c10a84b3d6fbd23f36b8a1ff83bfa804a7fa18482671d25a9e94b77820c64f33bd66a95f2fca
-
\Program Files (x86)\PriceLess\deUek3ElAmvyWk.x64.dllFilesize
875KB
MD517da2bf78af676b649eae4f74864dfcc
SHA1decf265a0aadc130874511ace40c62b0c0e16aac
SHA256b3a707a96ccf454e91ecc1c8578928232646f188b7d9973678f0e27bbf96a2fb
SHA51276522bd652d3ed0d6bec2c467937e319c24040498f825a2e5dec3c18357c5548a37b3d99de1f748ffdc380ae36b502ec0a6761f2adb55ffbbab1972323a3e806
-
\Program Files (x86)\PriceLess\deUek3ElAmvyWk.x64.dllFilesize
875KB
MD517da2bf78af676b649eae4f74864dfcc
SHA1decf265a0aadc130874511ace40c62b0c0e16aac
SHA256b3a707a96ccf454e91ecc1c8578928232646f188b7d9973678f0e27bbf96a2fb
SHA51276522bd652d3ed0d6bec2c467937e319c24040498f825a2e5dec3c18357c5548a37b3d99de1f748ffdc380ae36b502ec0a6761f2adb55ffbbab1972323a3e806
-
\Users\Admin\AppData\Local\Temp\7zSDFE4.tmp\jbS0mimEK40gML4.exeFilesize
785KB
MD5c452103272f13b87cdbecb41ae8c5e15
SHA13904c76d43842139288db38322ae2522f69b0f47
SHA25695494f4ea7ec3895ab6b670e91e3f99489d4ac84e54bb652bda11f1d539c5a30
SHA512f20683111d6cc0dc72de592e74d101a30af835bd32d4a70ad00fb9f2b5cc42081e6c942477dba8bb294ee0aadedf1e3b335bb982b5613ae550987f10f84273a5
-
memory/268-56-0x0000000000000000-mapping.dmp
-
memory/680-54-0x00000000767D1000-0x00000000767D3000-memory.dmpFilesize
8KB
-
memory/1796-73-0x0000000000000000-mapping.dmp
-
memory/1852-77-0x0000000000000000-mapping.dmp
-
memory/1852-78-0x000007FEFC421000-0x000007FEFC423000-memory.dmpFilesize
8KB