Analysis
-
max time kernel
12s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 19:17
Static task
static1
Behavioral task
behavioral1
Sample
ca008383a46bd9775a2e31352e32637f9e8e52be45310c3bd8337d248d1ed6da.exe
Resource
win7-20220812-en
General
-
Target
ca008383a46bd9775a2e31352e32637f9e8e52be45310c3bd8337d248d1ed6da.exe
-
Size
2.5MB
-
MD5
2ddb3afb43d26a8072c4d2c3f4536090
-
SHA1
68a8155f85c1b9403d9ebec86fc27696f606e7d4
-
SHA256
ca008383a46bd9775a2e31352e32637f9e8e52be45310c3bd8337d248d1ed6da
-
SHA512
38f65a40cb264a9364ee02950e80282a6c3b478b41cabcc237f369e33e129c94d872851ae8176e53800505d9cdddcea27ff08a072b51d24f183754fda715bd34
-
SSDEEP
49152:h1OsXUc3R1YQeb1bR9qMS3te/+E+kzkeRutdQ3L3V/A9Veo:h1O+bRsTWe/ZG
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
OcD7ikVhG9KFeh3.exepid process 1668 OcD7ikVhG9KFeh3.exe -
Loads dropped DLL 4 IoCs
Processes:
ca008383a46bd9775a2e31352e32637f9e8e52be45310c3bd8337d248d1ed6da.exeOcD7ikVhG9KFeh3.exeregsvr32.exeregsvr32.exepid process 1000 ca008383a46bd9775a2e31352e32637f9e8e52be45310c3bd8337d248d1ed6da.exe 1668 OcD7ikVhG9KFeh3.exe 1616 regsvr32.exe 1352 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 3 IoCs
Processes:
OcD7ikVhG9KFeh3.exedescription ioc process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\cdnckbimmffoidfbfnikcclfmciekggb\2.0\manifest.json OcD7ikVhG9KFeh3.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\cdnckbimmffoidfbfnikcclfmciekggb\2.0\manifest.json OcD7ikVhG9KFeh3.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\cdnckbimmffoidfbfnikcclfmciekggb\2.0\manifest.json OcD7ikVhG9KFeh3.exe -
Installs/modifies Browser Helper Object 2 TTPs 11 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
regsvr32.exeOcD7ikVhG9KFeh3.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{18DF081C-E8AD-4283-A596-FA578C2EBDC3} OcD7ikVhG9KFeh3.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} OcD7ikVhG9KFeh3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\ OcD7ikVhG9KFeh3.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DBC80044-A445-435B-BC74-9C25C1C588A9} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} OcD7ikVhG9KFeh3.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects OcD7ikVhG9KFeh3.exe -
Drops file in Program Files directory 8 IoCs
Processes:
OcD7ikVhG9KFeh3.exedescription ioc process File created C:\Program Files (x86)\GoSave\nVTaC1NGrqScLE.dll OcD7ikVhG9KFeh3.exe File opened for modification C:\Program Files (x86)\GoSave\nVTaC1NGrqScLE.dll OcD7ikVhG9KFeh3.exe File created C:\Program Files (x86)\GoSave\nVTaC1NGrqScLE.tlb OcD7ikVhG9KFeh3.exe File opened for modification C:\Program Files (x86)\GoSave\nVTaC1NGrqScLE.tlb OcD7ikVhG9KFeh3.exe File created C:\Program Files (x86)\GoSave\nVTaC1NGrqScLE.dat OcD7ikVhG9KFeh3.exe File opened for modification C:\Program Files (x86)\GoSave\nVTaC1NGrqScLE.dat OcD7ikVhG9KFeh3.exe File created C:\Program Files (x86)\GoSave\nVTaC1NGrqScLE.x64.dll OcD7ikVhG9KFeh3.exe File opened for modification C:\Program Files (x86)\GoSave\nVTaC1NGrqScLE.x64.dll OcD7ikVhG9KFeh3.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
OcD7ikVhG9KFeh3.exepid process 1668 OcD7ikVhG9KFeh3.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
ca008383a46bd9775a2e31352e32637f9e8e52be45310c3bd8337d248d1ed6da.exeOcD7ikVhG9KFeh3.exeregsvr32.exedescription pid process target process PID 1000 wrote to memory of 1668 1000 ca008383a46bd9775a2e31352e32637f9e8e52be45310c3bd8337d248d1ed6da.exe OcD7ikVhG9KFeh3.exe PID 1000 wrote to memory of 1668 1000 ca008383a46bd9775a2e31352e32637f9e8e52be45310c3bd8337d248d1ed6da.exe OcD7ikVhG9KFeh3.exe PID 1000 wrote to memory of 1668 1000 ca008383a46bd9775a2e31352e32637f9e8e52be45310c3bd8337d248d1ed6da.exe OcD7ikVhG9KFeh3.exe PID 1000 wrote to memory of 1668 1000 ca008383a46bd9775a2e31352e32637f9e8e52be45310c3bd8337d248d1ed6da.exe OcD7ikVhG9KFeh3.exe PID 1668 wrote to memory of 1616 1668 OcD7ikVhG9KFeh3.exe regsvr32.exe PID 1668 wrote to memory of 1616 1668 OcD7ikVhG9KFeh3.exe regsvr32.exe PID 1668 wrote to memory of 1616 1668 OcD7ikVhG9KFeh3.exe regsvr32.exe PID 1668 wrote to memory of 1616 1668 OcD7ikVhG9KFeh3.exe regsvr32.exe PID 1668 wrote to memory of 1616 1668 OcD7ikVhG9KFeh3.exe regsvr32.exe PID 1668 wrote to memory of 1616 1668 OcD7ikVhG9KFeh3.exe regsvr32.exe PID 1668 wrote to memory of 1616 1668 OcD7ikVhG9KFeh3.exe regsvr32.exe PID 1616 wrote to memory of 1352 1616 regsvr32.exe regsvr32.exe PID 1616 wrote to memory of 1352 1616 regsvr32.exe regsvr32.exe PID 1616 wrote to memory of 1352 1616 regsvr32.exe regsvr32.exe PID 1616 wrote to memory of 1352 1616 regsvr32.exe regsvr32.exe PID 1616 wrote to memory of 1352 1616 regsvr32.exe regsvr32.exe PID 1616 wrote to memory of 1352 1616 regsvr32.exe regsvr32.exe PID 1616 wrote to memory of 1352 1616 regsvr32.exe regsvr32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca008383a46bd9775a2e31352e32637f9e8e52be45310c3bd8337d248d1ed6da.exe"C:\Users\Admin\AppData\Local\Temp\ca008383a46bd9775a2e31352e32637f9e8e52be45310c3bd8337d248d1ed6da.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS9667.tmp\OcD7ikVhG9KFeh3.exe.\OcD7ikVhG9KFeh3.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\GoSave\nVTaC1NGrqScLE.x64.dll"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\GoSave\nVTaC1NGrqScLE.x64.dll"4⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\GoSave\nVTaC1NGrqScLE.datFilesize
6KB
MD57bc15f54f203b9e23ef9e30edc15357a
SHA1a3986ee400b15dc5dd78b92f85714552b115069e
SHA256beaadc55e4339aaa6ec2cb5cc777982f863a86d500966e22fd7d0aaa377aeb8f
SHA512ef40e3fa4d8af50eaa16e9d32e94742e9243fb49cb3069e7e46a6d87139baf1c347d8cde2db9da209149743757aabb27964c4d3ee75bc10fb9a3dd11f3f159bc
-
C:\Program Files (x86)\GoSave\nVTaC1NGrqScLE.x64.dllFilesize
874KB
MD5c204b63eda2256280c0d74669210c890
SHA10a66d21505519e92683ac9845c3ff9ee6e196332
SHA256505902d13946b15000ecb6aadb6946a298193dbef795f1d085a233ca5d7ab4f0
SHA5121bec19d922bbf35807826f156663338b9d0cfa221d41b531555577579646e5cbb5854a510da918c92755f10782e4f5fc8e49c4e4b24c32b7e800ca51691c7425
-
C:\Users\Admin\AppData\Local\Temp\7zS9667.tmp\OcD7ikVhG9KFeh3.datFilesize
6KB
MD57bc15f54f203b9e23ef9e30edc15357a
SHA1a3986ee400b15dc5dd78b92f85714552b115069e
SHA256beaadc55e4339aaa6ec2cb5cc777982f863a86d500966e22fd7d0aaa377aeb8f
SHA512ef40e3fa4d8af50eaa16e9d32e94742e9243fb49cb3069e7e46a6d87139baf1c347d8cde2db9da209149743757aabb27964c4d3ee75bc10fb9a3dd11f3f159bc
-
C:\Users\Admin\AppData\Local\Temp\7zS9667.tmp\OcD7ikVhG9KFeh3.exeFilesize
762KB
MD5468f56fce4a9413059464fa7c9c3cc5f
SHA199dde68e6dca34b5787c1e2faeab1716f443e462
SHA2561b0cefe330725f38dd592a9900eeca832124643d3a170805ad7cd988dc312841
SHA51211bf2744d92faaa1e13bb316d3d56555fd5bb8a8248fde6bbca1f692cc55928ec901cc1cc79c09f236273e25712526dd629fd97aec4f062d469c9714d1a6a7d0
-
C:\Users\Admin\AppData\Local\Temp\7zS9667.tmp\OcD7ikVhG9KFeh3.exeFilesize
762KB
MD5468f56fce4a9413059464fa7c9c3cc5f
SHA199dde68e6dca34b5787c1e2faeab1716f443e462
SHA2561b0cefe330725f38dd592a9900eeca832124643d3a170805ad7cd988dc312841
SHA51211bf2744d92faaa1e13bb316d3d56555fd5bb8a8248fde6bbca1f692cc55928ec901cc1cc79c09f236273e25712526dd629fd97aec4f062d469c9714d1a6a7d0
-
C:\Users\Admin\AppData\Local\Temp\7zS9667.tmp\cdnckbimmffoidfbfnikcclfmciekggb\Tw7v.jsFilesize
5KB
MD5cf8b622abf8a4831bff8d08edd6332c1
SHA17705ddb30e3bb48850e42290793fc3c072a0535f
SHA2568eff350129bf9416c1115c00055f4a8b53d5601320c86ab4de3e7efa711e6338
SHA512f8c42f5626bd0d3ec0c3686846ebc96c4d0e04f74f13358881033548f250fb590dd44472f35e970f637ddc97c323135a0df828793cc12661d632747b29aac717
-
C:\Users\Admin\AppData\Local\Temp\7zS9667.tmp\cdnckbimmffoidfbfnikcclfmciekggb\background.htmlFilesize
141B
MD538b5d5eb6083d27b694e6471fdb028bf
SHA1812d6a77726cbb1ef8d4a5a5b2b7a1aadef0863b
SHA256af8a50b757e206eb9901830b0ee564450c0d45343fa58f2d14f515e6454b0c12
SHA512cb06047f86a3e8f6d2d02ab6024d080239fc69658d9651e2e5984309f676a11ab78edc90b83ac05cc903a36c2eff07ccaf1b26df549d601a685f60e2894aeeba
-
C:\Users\Admin\AppData\Local\Temp\7zS9667.tmp\cdnckbimmffoidfbfnikcclfmciekggb\content.jsFilesize
144B
MD5fca19198fd8af21016a8b1dec7980002
SHA1fd01a47d14004e17a625efe66cc46a06c786cf40
SHA256332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a
SHA51260f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47
-
C:\Users\Admin\AppData\Local\Temp\7zS9667.tmp\cdnckbimmffoidfbfnikcclfmciekggb\lsdb.jsFilesize
531B
MD536d98318ab2b3b2585a30984db328afb
SHA1f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5
SHA256ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7
SHA5126f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a
-
C:\Users\Admin\AppData\Local\Temp\7zS9667.tmp\cdnckbimmffoidfbfnikcclfmciekggb\manifest.jsonFilesize
498B
MD5640199ea4621e34510de919f6a54436f
SHA1dc65dbfad02bd2688030bd56ca1cab85917a9937
SHA256e4aa7c089e32d14ddf584e9de6d007ec16581cd30c248ff7284bc0eb7757d4af
SHA512d64bc524d6df7c4c21a5ddfb0e6636317482ef4dc28006bd0a38d5e26c2db75626f216143026bf8acf3baa11d86c278e902c78afad4f806ca36f9e54bc75ff0a
-
C:\Users\Admin\AppData\Local\Temp\7zS9667.tmp\nVTaC1NGrqScLE.dllFilesize
744KB
MD5fc8b2dfce95210e4fe59b69a454ce14a
SHA146acd69f9bc55784091a572c8aa4d4d153a874f8
SHA2563b408b96d81cfe3167926bcb62020da4d95001d8d2c3fc4d67708ec21488f189
SHA5125ba3bb3437bb523721eac4e5c510b3fcb7b15090efeccd43075c8a42a776acad0c785431d7e2287e1b812556a30cd17bdde3d0d99f505a739c2042843d2cc1bf
-
C:\Users\Admin\AppData\Local\Temp\7zS9667.tmp\nVTaC1NGrqScLE.tlbFilesize
3KB
MD5662093ad59715d81e0a2b7cfbd4ac684
SHA183419c0803aa1c25a27b1fb8ad4a663d2d4878b0
SHA25668fc930e26f7f38e30df8f8f40d1232b81af62d4cf27a281a8f645788ad1f6c4
SHA5120eaffb7f011f548e1c6f8490c3d353fa05976140383df85663b5ef13be110d4847f08afe236a796a7f10a28895d29a7344e6d346389aa0780cc24af50fd66bf6
-
C:\Users\Admin\AppData\Local\Temp\7zS9667.tmp\nVTaC1NGrqScLE.x64.dllFilesize
874KB
MD5c204b63eda2256280c0d74669210c890
SHA10a66d21505519e92683ac9845c3ff9ee6e196332
SHA256505902d13946b15000ecb6aadb6946a298193dbef795f1d085a233ca5d7ab4f0
SHA5121bec19d922bbf35807826f156663338b9d0cfa221d41b531555577579646e5cbb5854a510da918c92755f10782e4f5fc8e49c4e4b24c32b7e800ca51691c7425
-
C:\Users\Admin\AppData\Local\Temp\7zS9667.tmp\qP@kUG.org\bootstrap.jsFilesize
2KB
MD5df13f711e20e9c80171846d4f2f7ae06
SHA156d29cda58427efe0e21d3880d39eb1b0ef60bee
SHA2566c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4
SHA5126c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e
-
C:\Users\Admin\AppData\Local\Temp\7zS9667.tmp\qP@kUG.org\chrome.manifestFilesize
35B
MD53101b9384cdfa1516696b8811ee28cca
SHA1db6559617e056199d95dc062b842e303695f0042
SHA2563071fdbdfe767ccfe0ffaf73dcf0540dfb30b9695c62c7e8268e42ecc37528a6
SHA5123c458d147e0687a277dbb7661f5f6f74f6210dad30014f1194a28405f1232ce116d72cefc902c4ed6d3cc5ba0f78704cf7ead6828f5452155d1bd0e07c515cd1
-
C:\Users\Admin\AppData\Local\Temp\7zS9667.tmp\qP@kUG.org\content\bg.jsFilesize
7KB
MD5068ffafed170c49f4703966390be80b7
SHA1c35f1815a33235b0e1d2af3f55d5a0c942ddb3bf
SHA256168dd43a242b8a5048b3535b4c6ba939259ad3442187142a0e2dc4711b1ae957
SHA512c5c572e43ce016b98aa3cd309ef02ebaba5d3d0f89e2d79cd64e47672099ad4b617b180049fd357ce17059086d9c36018cc73e590c7e0f555a42c28a71de30a9
-
C:\Users\Admin\AppData\Local\Temp\7zS9667.tmp\qP@kUG.org\install.rdfFilesize
592B
MD542575cee5b4bcbb4fb84bd864bf1738d
SHA13c34ca3513e2b51975c3684706f46eab587e2f38
SHA256d4233e414866bebd8da7137b09fcded86009a213f966a12e770eef5ac68184cb
SHA512c556846fb707ed0a753735299ad8a19a963246f2ebc1ede688ebb085324a5dcbca6dc3d8b6c82e5e845a03e159db58cce65d8439849c626f97d6201e3afcadb2
-
\Program Files (x86)\GoSave\nVTaC1NGrqScLE.dllFilesize
744KB
MD5fc8b2dfce95210e4fe59b69a454ce14a
SHA146acd69f9bc55784091a572c8aa4d4d153a874f8
SHA2563b408b96d81cfe3167926bcb62020da4d95001d8d2c3fc4d67708ec21488f189
SHA5125ba3bb3437bb523721eac4e5c510b3fcb7b15090efeccd43075c8a42a776acad0c785431d7e2287e1b812556a30cd17bdde3d0d99f505a739c2042843d2cc1bf
-
\Program Files (x86)\GoSave\nVTaC1NGrqScLE.x64.dllFilesize
874KB
MD5c204b63eda2256280c0d74669210c890
SHA10a66d21505519e92683ac9845c3ff9ee6e196332
SHA256505902d13946b15000ecb6aadb6946a298193dbef795f1d085a233ca5d7ab4f0
SHA5121bec19d922bbf35807826f156663338b9d0cfa221d41b531555577579646e5cbb5854a510da918c92755f10782e4f5fc8e49c4e4b24c32b7e800ca51691c7425
-
\Program Files (x86)\GoSave\nVTaC1NGrqScLE.x64.dllFilesize
874KB
MD5c204b63eda2256280c0d74669210c890
SHA10a66d21505519e92683ac9845c3ff9ee6e196332
SHA256505902d13946b15000ecb6aadb6946a298193dbef795f1d085a233ca5d7ab4f0
SHA5121bec19d922bbf35807826f156663338b9d0cfa221d41b531555577579646e5cbb5854a510da918c92755f10782e4f5fc8e49c4e4b24c32b7e800ca51691c7425
-
\Users\Admin\AppData\Local\Temp\7zS9667.tmp\OcD7ikVhG9KFeh3.exeFilesize
762KB
MD5468f56fce4a9413059464fa7c9c3cc5f
SHA199dde68e6dca34b5787c1e2faeab1716f443e462
SHA2561b0cefe330725f38dd592a9900eeca832124643d3a170805ad7cd988dc312841
SHA51211bf2744d92faaa1e13bb316d3d56555fd5bb8a8248fde6bbca1f692cc55928ec901cc1cc79c09f236273e25712526dd629fd97aec4f062d469c9714d1a6a7d0
-
memory/1000-54-0x0000000075201000-0x0000000075203000-memory.dmpFilesize
8KB
-
memory/1352-77-0x0000000000000000-mapping.dmp
-
memory/1352-78-0x000007FEFBDB1000-0x000007FEFBDB3000-memory.dmpFilesize
8KB
-
memory/1616-73-0x0000000000000000-mapping.dmp
-
memory/1668-56-0x0000000000000000-mapping.dmp