Analysis
-
max time kernel
16s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 19:29
Static task
static1
Behavioral task
behavioral1
Sample
c686b1d3e6863f7186f560a3b8c4fb13e1334714b2e96e506e094723a094e643.exe
Resource
win7-20220812-en
General
-
Target
c686b1d3e6863f7186f560a3b8c4fb13e1334714b2e96e506e094723a094e643.exe
-
Size
2.5MB
-
MD5
616ae982a1bbfe24aad362577839642a
-
SHA1
15ca9e59adfa79af4e7edc0abf07a6fbf9221b11
-
SHA256
c686b1d3e6863f7186f560a3b8c4fb13e1334714b2e96e506e094723a094e643
-
SHA512
28b508328548add2f3ff4954a4055f43fdcd0be339b752ccccd6799a868dc99713c5436ed2d447d5ca731f63ed2093078fe3a391e7d2cee28ca6771649de605f
-
SSDEEP
49152:h1OsnPHVmVhYwiLtKkKyW4nFU0I+NP/f7I3lMOaYjdxvL0H+:h1OGHVl71RnFXINxvB
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
CV56GMMCOMC09YA.exepid process 2036 CV56GMMCOMC09YA.exe -
Loads dropped DLL 4 IoCs
Processes:
c686b1d3e6863f7186f560a3b8c4fb13e1334714b2e96e506e094723a094e643.exeCV56GMMCOMC09YA.exeregsvr32.exeregsvr32.exepid process 1948 c686b1d3e6863f7186f560a3b8c4fb13e1334714b2e96e506e094723a094e643.exe 2036 CV56GMMCOMC09YA.exe 1988 regsvr32.exe 1928 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 3 IoCs
Processes:
CV56GMMCOMC09YA.exedescription ioc process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\hngpmlmkhkjboeokdepflpjicbcongba\200\manifest.json CV56GMMCOMC09YA.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\hngpmlmkhkjboeokdepflpjicbcongba\200\manifest.json CV56GMMCOMC09YA.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\hngpmlmkhkjboeokdepflpjicbcongba\200\manifest.json CV56GMMCOMC09YA.exe -
Installs/modifies Browser Helper Object 2 TTPs 11 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
CV56GMMCOMC09YA.exeregsvr32.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} CV56GMMCOMC09YA.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DBC80044-A445-435B-BC74-9C25C1C588A9} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{18DF081C-E8AD-4283-A596-FA578C2EBDC3} CV56GMMCOMC09YA.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} CV56GMMCOMC09YA.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects CV56GMMCOMC09YA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\ CV56GMMCOMC09YA.exe -
Drops file in Program Files directory 8 IoCs
Processes:
CV56GMMCOMC09YA.exedescription ioc process File created C:\Program Files (x86)\Browser Shop\iRVLoEujG6jIlS.dll CV56GMMCOMC09YA.exe File opened for modification C:\Program Files (x86)\Browser Shop\iRVLoEujG6jIlS.dll CV56GMMCOMC09YA.exe File created C:\Program Files (x86)\Browser Shop\iRVLoEujG6jIlS.tlb CV56GMMCOMC09YA.exe File opened for modification C:\Program Files (x86)\Browser Shop\iRVLoEujG6jIlS.tlb CV56GMMCOMC09YA.exe File created C:\Program Files (x86)\Browser Shop\iRVLoEujG6jIlS.dat CV56GMMCOMC09YA.exe File opened for modification C:\Program Files (x86)\Browser Shop\iRVLoEujG6jIlS.dat CV56GMMCOMC09YA.exe File created C:\Program Files (x86)\Browser Shop\iRVLoEujG6jIlS.x64.dll CV56GMMCOMC09YA.exe File opened for modification C:\Program Files (x86)\Browser Shop\iRVLoEujG6jIlS.x64.dll CV56GMMCOMC09YA.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
CV56GMMCOMC09YA.exepid process 2036 CV56GMMCOMC09YA.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
c686b1d3e6863f7186f560a3b8c4fb13e1334714b2e96e506e094723a094e643.exeCV56GMMCOMC09YA.exeregsvr32.exedescription pid process target process PID 1948 wrote to memory of 2036 1948 c686b1d3e6863f7186f560a3b8c4fb13e1334714b2e96e506e094723a094e643.exe CV56GMMCOMC09YA.exe PID 1948 wrote to memory of 2036 1948 c686b1d3e6863f7186f560a3b8c4fb13e1334714b2e96e506e094723a094e643.exe CV56GMMCOMC09YA.exe PID 1948 wrote to memory of 2036 1948 c686b1d3e6863f7186f560a3b8c4fb13e1334714b2e96e506e094723a094e643.exe CV56GMMCOMC09YA.exe PID 1948 wrote to memory of 2036 1948 c686b1d3e6863f7186f560a3b8c4fb13e1334714b2e96e506e094723a094e643.exe CV56GMMCOMC09YA.exe PID 2036 wrote to memory of 1988 2036 CV56GMMCOMC09YA.exe regsvr32.exe PID 2036 wrote to memory of 1988 2036 CV56GMMCOMC09YA.exe regsvr32.exe PID 2036 wrote to memory of 1988 2036 CV56GMMCOMC09YA.exe regsvr32.exe PID 2036 wrote to memory of 1988 2036 CV56GMMCOMC09YA.exe regsvr32.exe PID 2036 wrote to memory of 1988 2036 CV56GMMCOMC09YA.exe regsvr32.exe PID 2036 wrote to memory of 1988 2036 CV56GMMCOMC09YA.exe regsvr32.exe PID 2036 wrote to memory of 1988 2036 CV56GMMCOMC09YA.exe regsvr32.exe PID 1988 wrote to memory of 1928 1988 regsvr32.exe regsvr32.exe PID 1988 wrote to memory of 1928 1988 regsvr32.exe regsvr32.exe PID 1988 wrote to memory of 1928 1988 regsvr32.exe regsvr32.exe PID 1988 wrote to memory of 1928 1988 regsvr32.exe regsvr32.exe PID 1988 wrote to memory of 1928 1988 regsvr32.exe regsvr32.exe PID 1988 wrote to memory of 1928 1988 regsvr32.exe regsvr32.exe PID 1988 wrote to memory of 1928 1988 regsvr32.exe regsvr32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c686b1d3e6863f7186f560a3b8c4fb13e1334714b2e96e506e094723a094e643.exe"C:\Users\Admin\AppData\Local\Temp\c686b1d3e6863f7186f560a3b8c4fb13e1334714b2e96e506e094723a094e643.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS67B9.tmp\CV56GMMCOMC09YA.exe.\CV56GMMCOMC09YA.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\Browser Shop\iRVLoEujG6jIlS.x64.dll"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\Browser Shop\iRVLoEujG6jIlS.x64.dll"4⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Browser Shop\iRVLoEujG6jIlS.datFilesize
6KB
MD5b8cf6ab353e05487437d412a620c9954
SHA186cac45d729786b1b6cc6c7d24d902bd7cbf60e5
SHA2564c3f368384d62aa6afb81f0b5c85c9bec9f6c92d8159209d9b2455e387b98de3
SHA512916701d5558d40bb035754fa94a55ad275729c6445144df3ed81a1423793ce82b58affe5e85e28b353c0b1d4004135f19e605f62cb4df175f989f324f6a3e532
-
C:\Program Files (x86)\Browser Shop\iRVLoEujG6jIlS.x64.dllFilesize
885KB
MD51a6b1013f17c1cdc6e98f82cd2568ea8
SHA1c96e7bdba616743a5c05b08a342d89ed102376b0
SHA256fa9dd2bd7850053b251c9b5f27f1ac43ad04abf85de61b1928b7c2d562d3290a
SHA51210596f46c52ca3f50d6b3c7c894fff8b41f4fe920c6e5e0138cf7e95e85bfe1db8d5f1a63939832cd48cf29f571dd36de40ebb931fb9b14a106518ae4fc17ef9
-
C:\Users\Admin\AppData\Local\Temp\7zS67B9.tmp\BjJHwR@Q5Z.org\bootstrap.jsFilesize
2KB
MD5df13f711e20e9c80171846d4f2f7ae06
SHA156d29cda58427efe0e21d3880d39eb1b0ef60bee
SHA2566c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4
SHA5126c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e
-
C:\Users\Admin\AppData\Local\Temp\7zS67B9.tmp\BjJHwR@Q5Z.org\chrome.manifestFilesize
35B
MD5648b303daa9ea0952252b727d0c01bac
SHA10ab170dc9dc213faedd660dc800af2f153f7089e
SHA25677f87e68b6cc9647711ec4fea4429ea22ac37afefaabb456ef13c975805e3194
SHA5121f2af575106b6cb65e82a5b7aa48aedfabf1ccc4cfa90a00dfd05a2e3ed661b1eb10d127aa77949e0f77188d48417abe8ddac8dda4a1d4c23a52c77f57f4d71e
-
C:\Users\Admin\AppData\Local\Temp\7zS67B9.tmp\BjJHwR@Q5Z.org\content\bg.jsFilesize
7KB
MD5bcc1ede5747158f97fd4a9fc6a1fe0b6
SHA1d87446a1f4eefcb521deff6526728f30eaf07a82
SHA2560d52681b97ca706b0c65fb13bb5476daf3bd993121e911c5cbb6b4a5692469eb
SHA5125d700ee32f11047c82e0e88a38378b669aebc9945f06427c557a1f2acff01dee209613ff3332a787a70d3857af8b9f8718511932d6bd1162fed8e55602d34b9e
-
C:\Users\Admin\AppData\Local\Temp\7zS67B9.tmp\BjJHwR@Q5Z.org\install.rdfFilesize
602B
MD5995dfc5322908a88f6f6be31456f8698
SHA1e5becc985f0d11800136fa2a8515340def883e1a
SHA25606050f67972182851f08fe7b50a1cc0e6118aa2e4bd79eb4fe2d4013ac2d70bd
SHA512665ea3418a42e49cac1aced47404985e8af622c68b90ab60f73585d1c21754ac56cd99d65477cde9199ec339588c5d5f79eed2443f567f36c74b3ec78b926841
-
C:\Users\Admin\AppData\Local\Temp\7zS67B9.tmp\CV56GMMCOMC09YA.datFilesize
6KB
MD5b8cf6ab353e05487437d412a620c9954
SHA186cac45d729786b1b6cc6c7d24d902bd7cbf60e5
SHA2564c3f368384d62aa6afb81f0b5c85c9bec9f6c92d8159209d9b2455e387b98de3
SHA512916701d5558d40bb035754fa94a55ad275729c6445144df3ed81a1423793ce82b58affe5e85e28b353c0b1d4004135f19e605f62cb4df175f989f324f6a3e532
-
C:\Users\Admin\AppData\Local\Temp\7zS67B9.tmp\CV56GMMCOMC09YA.exeFilesize
760KB
MD5dcd148f6f3af3e3b0935c4fcc9f41811
SHA1ee9bdbc7c568c7832d90b85921ab20030b6734cd
SHA256f8689641199c6fc430121797965485d95abfbc430753e0e668817ab3b511a1e4
SHA51234be8e60dc2decf8287a71516f359e80bb858ce52218dde1b01c821c9b95be38821f068b79b0da8dbe90865560e7ddab77b25e3971dda9be667fb3ae8f174886
-
C:\Users\Admin\AppData\Local\Temp\7zS67B9.tmp\CV56GMMCOMC09YA.exeFilesize
760KB
MD5dcd148f6f3af3e3b0935c4fcc9f41811
SHA1ee9bdbc7c568c7832d90b85921ab20030b6734cd
SHA256f8689641199c6fc430121797965485d95abfbc430753e0e668817ab3b511a1e4
SHA51234be8e60dc2decf8287a71516f359e80bb858ce52218dde1b01c821c9b95be38821f068b79b0da8dbe90865560e7ddab77b25e3971dda9be667fb3ae8f174886
-
C:\Users\Admin\AppData\Local\Temp\7zS67B9.tmp\hngpmlmkhkjboeokdepflpjicbcongba\H.jsFilesize
5KB
MD5225e8bc54f7fe7ed7cff401f4c8cedf1
SHA10195ebc8f778b3324cb7cc6bec20a656e9291e52
SHA2563e30bcbb4e277e9cb277777871a5bb7324e6285421381f2de9b8d9599c00b002
SHA512e7a5b207e6aeaf5256ca17ea81429100cd3cbcc34026e881b6d7a6e0c404a7e79af97d9ff721a4425e14ff2bb5537023d8a34fbd236be2e2f5a62986eacdff10
-
C:\Users\Admin\AppData\Local\Temp\7zS67B9.tmp\hngpmlmkhkjboeokdepflpjicbcongba\background.htmlFilesize
138B
MD56f78a9f8b3159b436ed441ca0fa88fb7
SHA178b91858aceb4c4b345970b7f5375bd9c5cee5e7
SHA256df00d7c896f5836452fe07dd66a17dd46157fdec21d3c8ca886b1a7ba909165e
SHA512f867296bae6366e6328c8bead204c16130aad48e3c8770a99bf994eb85e7d31c748ed6d219c5bbcc8b2619c0721396213dfe82e4c0072938f6135ca91d627d77
-
C:\Users\Admin\AppData\Local\Temp\7zS67B9.tmp\hngpmlmkhkjboeokdepflpjicbcongba\content.jsFilesize
144B
MD5fca19198fd8af21016a8b1dec7980002
SHA1fd01a47d14004e17a625efe66cc46a06c786cf40
SHA256332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a
SHA51260f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47
-
C:\Users\Admin\AppData\Local\Temp\7zS67B9.tmp\hngpmlmkhkjboeokdepflpjicbcongba\lsdb.jsFilesize
531B
MD536d98318ab2b3b2585a30984db328afb
SHA1f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5
SHA256ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7
SHA5126f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a
-
C:\Users\Admin\AppData\Local\Temp\7zS67B9.tmp\hngpmlmkhkjboeokdepflpjicbcongba\manifest.jsonFilesize
504B
MD5d532994175ac6e4e8fea2ae07edef6ff
SHA15646eab3cebc8b0a804103b63f08a63db784a77d
SHA256f9a190f8cfafdeddfe9627366bcd108e42b7fa07c8d074f1570bd77489f39c4d
SHA512ba6ddc11423c0b0d93de3e3ecb9eeebe29470723282165aa67de4329a5f9af7e390869a7cbd0834c1ff115a1ed0a274bed686b4b6630e98b268ec1f2a9a8dadb
-
C:\Users\Admin\AppData\Local\Temp\7zS67B9.tmp\iRVLoEujG6jIlS.dllFilesize
747KB
MD5d949da968ea04ac3a7ddf0e300bb32be
SHA1581d7d799c538b8e9e578cf57c420fb802d5a201
SHA2565c4756451acf8622efa75639f9131ca8215c165e2ef21cc1ab7f8fee77db462b
SHA512fd00e332af52646425f0d4032bb1bbfc85a44ff274bcf212f1264a29be546db4c1ceab7da32c70248a6baa2c55d2dff47dcb2ac441c783a1d9d1260c4685eb7e
-
C:\Users\Admin\AppData\Local\Temp\7zS67B9.tmp\iRVLoEujG6jIlS.tlbFilesize
3KB
MD55b503f1b4056c3d4fbf2d03f88e1adfe
SHA1c8d659ea27bf0ca0bbfd46865d5796589bf9ef68
SHA256231ef0fef77ab6c7fea053f64a9ce7f9e21646b868bfe391962262fc15c9bb6c
SHA512229207201368d9674258389df19132070390f913aa5cc21b7567c515be5f5e0f07cdaa460d497ae355f27f00f7fc75538783d8890f6c9c0e861a7ecb8f520bdb
-
C:\Users\Admin\AppData\Local\Temp\7zS67B9.tmp\iRVLoEujG6jIlS.x64.dllFilesize
885KB
MD51a6b1013f17c1cdc6e98f82cd2568ea8
SHA1c96e7bdba616743a5c05b08a342d89ed102376b0
SHA256fa9dd2bd7850053b251c9b5f27f1ac43ad04abf85de61b1928b7c2d562d3290a
SHA51210596f46c52ca3f50d6b3c7c894fff8b41f4fe920c6e5e0138cf7e95e85bfe1db8d5f1a63939832cd48cf29f571dd36de40ebb931fb9b14a106518ae4fc17ef9
-
\Program Files (x86)\Browser Shop\iRVLoEujG6jIlS.dllFilesize
747KB
MD5d949da968ea04ac3a7ddf0e300bb32be
SHA1581d7d799c538b8e9e578cf57c420fb802d5a201
SHA2565c4756451acf8622efa75639f9131ca8215c165e2ef21cc1ab7f8fee77db462b
SHA512fd00e332af52646425f0d4032bb1bbfc85a44ff274bcf212f1264a29be546db4c1ceab7da32c70248a6baa2c55d2dff47dcb2ac441c783a1d9d1260c4685eb7e
-
\Program Files (x86)\Browser Shop\iRVLoEujG6jIlS.x64.dllFilesize
885KB
MD51a6b1013f17c1cdc6e98f82cd2568ea8
SHA1c96e7bdba616743a5c05b08a342d89ed102376b0
SHA256fa9dd2bd7850053b251c9b5f27f1ac43ad04abf85de61b1928b7c2d562d3290a
SHA51210596f46c52ca3f50d6b3c7c894fff8b41f4fe920c6e5e0138cf7e95e85bfe1db8d5f1a63939832cd48cf29f571dd36de40ebb931fb9b14a106518ae4fc17ef9
-
\Program Files (x86)\Browser Shop\iRVLoEujG6jIlS.x64.dllFilesize
885KB
MD51a6b1013f17c1cdc6e98f82cd2568ea8
SHA1c96e7bdba616743a5c05b08a342d89ed102376b0
SHA256fa9dd2bd7850053b251c9b5f27f1ac43ad04abf85de61b1928b7c2d562d3290a
SHA51210596f46c52ca3f50d6b3c7c894fff8b41f4fe920c6e5e0138cf7e95e85bfe1db8d5f1a63939832cd48cf29f571dd36de40ebb931fb9b14a106518ae4fc17ef9
-
\Users\Admin\AppData\Local\Temp\7zS67B9.tmp\CV56GMMCOMC09YA.exeFilesize
760KB
MD5dcd148f6f3af3e3b0935c4fcc9f41811
SHA1ee9bdbc7c568c7832d90b85921ab20030b6734cd
SHA256f8689641199c6fc430121797965485d95abfbc430753e0e668817ab3b511a1e4
SHA51234be8e60dc2decf8287a71516f359e80bb858ce52218dde1b01c821c9b95be38821f068b79b0da8dbe90865560e7ddab77b25e3971dda9be667fb3ae8f174886
-
memory/1928-77-0x0000000000000000-mapping.dmp
-
memory/1928-78-0x000007FEFC521000-0x000007FEFC523000-memory.dmpFilesize
8KB
-
memory/1948-54-0x0000000076871000-0x0000000076873000-memory.dmpFilesize
8KB
-
memory/1988-73-0x0000000000000000-mapping.dmp
-
memory/2036-56-0x0000000000000000-mapping.dmp