Analysis

  • max time kernel
    39s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 19:29

General

  • Target

    c6bfedc96581e0da98f73b6536fe62d1c10a85a2066a0f795671cc3e4856d956.exe

  • Size

    2.5MB

  • MD5

    5facfb2928574fe6be1f934a6200aee9

  • SHA1

    6dcc0edeb53e9c7e340c52368dd72cae1ee4daac

  • SHA256

    c6bfedc96581e0da98f73b6536fe62d1c10a85a2066a0f795671cc3e4856d956

  • SHA512

    747d501671d3227db0b7a0f14e47bda8ab7734b83b37dc21204a541ff474a02e93eb030d7e1b57bfe33e7260f08d0c0898f62b51c64b37484667b31ce0bd17c4

  • SSDEEP

    49152:h1OslCpYO/dJJDHhs6oxRkNfehWfNs4VGufZ9JODSTz4bkd:h1OLly7kNfrNq4d

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 3 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 11 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Program Files directory 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c6bfedc96581e0da98f73b6536fe62d1c10a85a2066a0f795671cc3e4856d956.exe
    "C:\Users\Admin\AppData\Local\Temp\c6bfedc96581e0da98f73b6536fe62d1c10a85a2066a0f795671cc3e4856d956.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1944
    • C:\Users\Admin\AppData\Local\Temp\7zS61D0.tmp\Ze538zfeuxwitKu.exe
      .\Ze538zfeuxwitKu.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops Chrome extension
      • Installs/modifies Browser Helper Object
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1060
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32.exe /s "C:\Program Files (x86)\GoSave\FEVIkcFnwtivw0.x64.dll"
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1600
        • C:\Windows\system32\regsvr32.exe
          /s "C:\Program Files (x86)\GoSave\FEVIkcFnwtivw0.x64.dll"
          4⤵
          • Loads dropped DLL
          • Installs/modifies Browser Helper Object
          PID:1396

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Browser Extensions

1
T1176

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\GoSave\FEVIkcFnwtivw0.dat
    Filesize

    7KB

    MD5

    97184ff961e842a9b851b8ba1e89310b

    SHA1

    b1f064d4013adcd3c88801eba43348cdff249760

    SHA256

    d3a06ab992741ad04d97b95b2eca1973c20c47b21a3442286ffe4a9509396747

    SHA512

    269357e53ac806808f4c344cb541dada37839f0aebac0951f7e616345e5f3bace055b8ddf006d7472823d40157c605cae59a357e800442f1027aeef3ae930545

  • C:\Program Files (x86)\GoSave\FEVIkcFnwtivw0.x64.dll
    Filesize

    872KB

    MD5

    337b97dbbcc7ad4d75fb5a90652e6de3

    SHA1

    50e50243af1819e62a7512d85e6dd67b8e1ed103

    SHA256

    b501a7a1e233ac26b0ba2fbbf54cbb782f98bc5484537e584fcbf4dcf5cc3f0c

    SHA512

    dab62835e885457c481d7ee4d76c1bc89278d5dc22178301629c78ad3215e1a4627a95f50b03587d8978e85cbba829f31acedf21c23773f5c526b0f76c8cf09e

  • C:\Users\Admin\AppData\Local\Temp\7zS61D0.tmp\FEVIkcFnwtivw0.dll
    Filesize

    738KB

    MD5

    49961c7c9a7aef57f49adf50d1c810f6

    SHA1

    fc2078aeff5d5abee27c9e8a500cb2d6ae755b05

    SHA256

    c80abdc502d18db54137edc2680a498402c765999814b7fe1b2a7b69a64ce846

    SHA512

    8ad2c3dbd3b4390e4c49561f25ff2acdd4ab4468074e213f3efc81a598f71620e8f21fc87114623a6c0509997e47e1c4f5ffe703c7421ae313f7ba536df2772f

  • C:\Users\Admin\AppData\Local\Temp\7zS61D0.tmp\FEVIkcFnwtivw0.tlb
    Filesize

    3KB

    MD5

    e3ab22d8beac0180520ab5289a64419b

    SHA1

    1456ba2c78b293e5a80185fefdf05f5dbe424937

    SHA256

    0d3342857b67678dd76e6a24e137f0d75ba399bb48bf5095d7e4f7dfa0bbe416

    SHA512

    c04163026ffa1c6fab34b4fdbf23702148c7c2a31dd356d26f9541027db078b6433aff3a5f749a209a3acbcf3a853a9b5f77984540e21be1f823ce92bcbfc4bf

  • C:\Users\Admin\AppData\Local\Temp\7zS61D0.tmp\FEVIkcFnwtivw0.x64.dll
    Filesize

    872KB

    MD5

    337b97dbbcc7ad4d75fb5a90652e6de3

    SHA1

    50e50243af1819e62a7512d85e6dd67b8e1ed103

    SHA256

    b501a7a1e233ac26b0ba2fbbf54cbb782f98bc5484537e584fcbf4dcf5cc3f0c

    SHA512

    dab62835e885457c481d7ee4d76c1bc89278d5dc22178301629c78ad3215e1a4627a95f50b03587d8978e85cbba829f31acedf21c23773f5c526b0f76c8cf09e

  • C:\Users\Admin\AppData\Local\Temp\7zS61D0.tmp\T@jkwLtUr.org\bootstrap.js
    Filesize

    2KB

    MD5

    df13f711e20e9c80171846d4f2f7ae06

    SHA1

    56d29cda58427efe0e21d3880d39eb1b0ef60bee

    SHA256

    6c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4

    SHA512

    6c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e

  • C:\Users\Admin\AppData\Local\Temp\7zS61D0.tmp\T@jkwLtUr.org\chrome.manifest
    Filesize

    35B

    MD5

    a715b55c5835a7793e3144188dbaf800

    SHA1

    a7d1ecacfe8d6302267a2a5c5b9f1a3db288f134

    SHA256

    cd2e35ac71951bdd3b034b0d6e0dc9640631e4d644bd72a66b423f5d2014c5c9

    SHA512

    cc3121bb2f6bf5391430eca049048bd024caa6846703c088f0550671be33b40093ea0293b56c23e75e3213900b074fb91343a7fc84133ada6b6583f21537760d

  • C:\Users\Admin\AppData\Local\Temp\7zS61D0.tmp\T@jkwLtUr.org\content\bg.js
    Filesize

    9KB

    MD5

    942f2caa5142ec4e08e7af50fc29c96f

    SHA1

    50ea054d3815685728306fac06fd9daac694a9d7

    SHA256

    0d24345a970a5828301485324898a1526c8d7ffd3837b740b472e2e53b15f2b3

    SHA512

    066bb039fd1996b4afd544e6a0fc8f615006d88014a82fd11bd759be64993e21703e61d5fc7fbaaa2d64623be8fa5a6e828e9da4f79fc85b51713f74a272cb52

  • C:\Users\Admin\AppData\Local\Temp\7zS61D0.tmp\T@jkwLtUr.org\install.rdf
    Filesize

    595B

    MD5

    1f59c4d879d25d2b955cf888ccb80e5b

    SHA1

    64dc4abb9d9ab840e007c2ec41f684dd37e668fc

    SHA256

    20ceef3b01c99c35734a82cd05cd42542fb3539c1ebfd5e8ee93c863dfc5353b

    SHA512

    2f59737b6f138bf39a0d6ef86a85c5eb424b28fc866b0b2f5d9de4afeb12890c8c9224da7c5bcd6b0611aff90fb32b2f3d4bd891545a6e7f96a85040f47935ea

  • C:\Users\Admin\AppData\Local\Temp\7zS61D0.tmp\Ze538zfeuxwitKu.dat
    Filesize

    7KB

    MD5

    97184ff961e842a9b851b8ba1e89310b

    SHA1

    b1f064d4013adcd3c88801eba43348cdff249760

    SHA256

    d3a06ab992741ad04d97b95b2eca1973c20c47b21a3442286ffe4a9509396747

    SHA512

    269357e53ac806808f4c344cb541dada37839f0aebac0951f7e616345e5f3bace055b8ddf006d7472823d40157c605cae59a357e800442f1027aeef3ae930545

  • C:\Users\Admin\AppData\Local\Temp\7zS61D0.tmp\Ze538zfeuxwitKu.exe
    Filesize

    772KB

    MD5

    5ed7019dcd0008dbcd8e54017b8c7dd9

    SHA1

    7e4457da2ff06c2170bad636c9eb7c1bb436fd06

    SHA256

    7f069fe03db518eee8162ba5f65f98f2afd28137dfde9450d26cd47f6cea8eb7

    SHA512

    10cef6104aeca8f7a135d4ffffb907b127f055477af4d98228c7385f0da15677357dfed13fc442ee173f85245224fc4b0ae100b832514c80802c5e5a054b70db

  • C:\Users\Admin\AppData\Local\Temp\7zS61D0.tmp\Ze538zfeuxwitKu.exe
    Filesize

    772KB

    MD5

    5ed7019dcd0008dbcd8e54017b8c7dd9

    SHA1

    7e4457da2ff06c2170bad636c9eb7c1bb436fd06

    SHA256

    7f069fe03db518eee8162ba5f65f98f2afd28137dfde9450d26cd47f6cea8eb7

    SHA512

    10cef6104aeca8f7a135d4ffffb907b127f055477af4d98228c7385f0da15677357dfed13fc442ee173f85245224fc4b0ae100b832514c80802c5e5a054b70db

  • C:\Users\Admin\AppData\Local\Temp\7zS61D0.tmp\knikmnbcaffknniikkhmnhjmppdeeeen\background.html
    Filesize

    147B

    MD5

    46ea2f34c750edb76eff2f8ac62b42a7

    SHA1

    a5095784c823f0fb0b95f755d72a47be89399189

    SHA256

    d705c42675766fb7c24f2f7bb72b1dc48859a7792bfec3b5cbc1ee6f5073fc15

    SHA512

    b8f92760aaf49994ec65bd0756cd08c57e4642d68475d2bdcb5f9e9cee5ecf63acaa18382a7fee996b6d65ba0a7674ee32a77a7763c859f089519016140ce29b

  • C:\Users\Admin\AppData\Local\Temp\7zS61D0.tmp\knikmnbcaffknniikkhmnhjmppdeeeen\content.js
    Filesize

    144B

    MD5

    fca19198fd8af21016a8b1dec7980002

    SHA1

    fd01a47d14004e17a625efe66cc46a06c786cf40

    SHA256

    332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a

    SHA512

    60f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47

  • C:\Users\Admin\AppData\Local\Temp\7zS61D0.tmp\knikmnbcaffknniikkhmnhjmppdeeeen\jzbPeMEMfk.js
    Filesize

    6KB

    MD5

    747b738a5594800296ac77e2a398278e

    SHA1

    5cc82eb72b044761668dc11e48e6716d90e3833b

    SHA256

    2a28cd2e743d66e292cada42aec2ccb07dda5c556bbc2e2ee78b687ba762ec90

    SHA512

    515e0fed185f4e53f8897a0d45f66fc5f89744a73cbff9b638f9acc18a73097b0e685af71134061b5f6660207fbc38ba8a63e6e00fc22b4afee50d7986a9f94b

  • C:\Users\Admin\AppData\Local\Temp\7zS61D0.tmp\knikmnbcaffknniikkhmnhjmppdeeeen\lsdb.js
    Filesize

    531B

    MD5

    36d98318ab2b3b2585a30984db328afb

    SHA1

    f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5

    SHA256

    ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7

    SHA512

    6f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a

  • C:\Users\Admin\AppData\Local\Temp\7zS61D0.tmp\knikmnbcaffknniikkhmnhjmppdeeeen\manifest.json
    Filesize

    498B

    MD5

    640199ea4621e34510de919f6a54436f

    SHA1

    dc65dbfad02bd2688030bd56ca1cab85917a9937

    SHA256

    e4aa7c089e32d14ddf584e9de6d007ec16581cd30c248ff7284bc0eb7757d4af

    SHA512

    d64bc524d6df7c4c21a5ddfb0e6636317482ef4dc28006bd0a38d5e26c2db75626f216143026bf8acf3baa11d86c278e902c78afad4f806ca36f9e54bc75ff0a

  • \Program Files (x86)\GoSave\FEVIkcFnwtivw0.dll
    Filesize

    738KB

    MD5

    49961c7c9a7aef57f49adf50d1c810f6

    SHA1

    fc2078aeff5d5abee27c9e8a500cb2d6ae755b05

    SHA256

    c80abdc502d18db54137edc2680a498402c765999814b7fe1b2a7b69a64ce846

    SHA512

    8ad2c3dbd3b4390e4c49561f25ff2acdd4ab4468074e213f3efc81a598f71620e8f21fc87114623a6c0509997e47e1c4f5ffe703c7421ae313f7ba536df2772f

  • \Program Files (x86)\GoSave\FEVIkcFnwtivw0.x64.dll
    Filesize

    872KB

    MD5

    337b97dbbcc7ad4d75fb5a90652e6de3

    SHA1

    50e50243af1819e62a7512d85e6dd67b8e1ed103

    SHA256

    b501a7a1e233ac26b0ba2fbbf54cbb782f98bc5484537e584fcbf4dcf5cc3f0c

    SHA512

    dab62835e885457c481d7ee4d76c1bc89278d5dc22178301629c78ad3215e1a4627a95f50b03587d8978e85cbba829f31acedf21c23773f5c526b0f76c8cf09e

  • \Program Files (x86)\GoSave\FEVIkcFnwtivw0.x64.dll
    Filesize

    872KB

    MD5

    337b97dbbcc7ad4d75fb5a90652e6de3

    SHA1

    50e50243af1819e62a7512d85e6dd67b8e1ed103

    SHA256

    b501a7a1e233ac26b0ba2fbbf54cbb782f98bc5484537e584fcbf4dcf5cc3f0c

    SHA512

    dab62835e885457c481d7ee4d76c1bc89278d5dc22178301629c78ad3215e1a4627a95f50b03587d8978e85cbba829f31acedf21c23773f5c526b0f76c8cf09e

  • \Users\Admin\AppData\Local\Temp\7zS61D0.tmp\Ze538zfeuxwitKu.exe
    Filesize

    772KB

    MD5

    5ed7019dcd0008dbcd8e54017b8c7dd9

    SHA1

    7e4457da2ff06c2170bad636c9eb7c1bb436fd06

    SHA256

    7f069fe03db518eee8162ba5f65f98f2afd28137dfde9450d26cd47f6cea8eb7

    SHA512

    10cef6104aeca8f7a135d4ffffb907b127f055477af4d98228c7385f0da15677357dfed13fc442ee173f85245224fc4b0ae100b832514c80802c5e5a054b70db

  • memory/1060-56-0x0000000000000000-mapping.dmp
  • memory/1396-77-0x0000000000000000-mapping.dmp
  • memory/1396-78-0x000007FEFC4E1000-0x000007FEFC4E3000-memory.dmp
    Filesize

    8KB

  • memory/1600-73-0x0000000000000000-mapping.dmp
  • memory/1944-54-0x0000000076831000-0x0000000076833000-memory.dmp
    Filesize

    8KB