Analysis
-
max time kernel
14s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 19:36
Static task
static1
Behavioral task
behavioral1
Sample
c42b914076231e4e3e4ec95bc54cf821987e8538348f7e8ec95b03cbea84ef87.exe
Resource
win7-20221111-en
General
-
Target
c42b914076231e4e3e4ec95bc54cf821987e8538348f7e8ec95b03cbea84ef87.exe
-
Size
2.5MB
-
MD5
60ca1615601a2a5d64c8299f889bc913
-
SHA1
9b07f70283fb631e9373ada91912f12a9322d056
-
SHA256
c42b914076231e4e3e4ec95bc54cf821987e8538348f7e8ec95b03cbea84ef87
-
SHA512
2cf6b977c69e9ed99d6ac237e045a37108a5cce31c23954810ee810a1b3b0726cff48a9e59e986e166ee467c2af837126297e6e657f6ef3a54550123f2a898ba
-
SSDEEP
49152:h1OsrSQeb71DLvFzAqRmyyVchO4apKHcHhXa3FXWlPC1IS5zQ:h1OYSQY1DCqkck4apyLq9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
7Sz69r7IVJmZrdR.exepid process 1252 7Sz69r7IVJmZrdR.exe -
Loads dropped DLL 4 IoCs
Processes:
c42b914076231e4e3e4ec95bc54cf821987e8538348f7e8ec95b03cbea84ef87.exe7Sz69r7IVJmZrdR.exeregsvr32.exeregsvr32.exepid process 1236 c42b914076231e4e3e4ec95bc54cf821987e8538348f7e8ec95b03cbea84ef87.exe 1252 7Sz69r7IVJmZrdR.exe 860 regsvr32.exe 1684 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 3 IoCs
Processes:
7Sz69r7IVJmZrdR.exedescription ioc process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\fomjblaekdcoiaofaamogemapkpkclni\2.0\manifest.json 7Sz69r7IVJmZrdR.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\fomjblaekdcoiaofaamogemapkpkclni\2.0\manifest.json 7Sz69r7IVJmZrdR.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\fomjblaekdcoiaofaamogemapkpkclni\2.0\manifest.json 7Sz69r7IVJmZrdR.exe -
Installs/modifies Browser Helper Object 2 TTPs 11 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
regsvr32.exe7Sz69r7IVJmZrdR.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\ 7Sz69r7IVJmZrdR.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DBC80044-A445-435B-BC74-9C25C1C588A9} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{18DF081C-E8AD-4283-A596-FA578C2EBDC3} 7Sz69r7IVJmZrdR.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} 7Sz69r7IVJmZrdR.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} 7Sz69r7IVJmZrdR.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects 7Sz69r7IVJmZrdR.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects regsvr32.exe -
Drops file in Program Files directory 8 IoCs
Processes:
7Sz69r7IVJmZrdR.exedescription ioc process File opened for modification C:\Program Files (x86)\GoSave\Ga8hbGZSroz1Kw.x64.dll 7Sz69r7IVJmZrdR.exe File created C:\Program Files (x86)\GoSave\Ga8hbGZSroz1Kw.dll 7Sz69r7IVJmZrdR.exe File opened for modification C:\Program Files (x86)\GoSave\Ga8hbGZSroz1Kw.dll 7Sz69r7IVJmZrdR.exe File created C:\Program Files (x86)\GoSave\Ga8hbGZSroz1Kw.tlb 7Sz69r7IVJmZrdR.exe File opened for modification C:\Program Files (x86)\GoSave\Ga8hbGZSroz1Kw.tlb 7Sz69r7IVJmZrdR.exe File created C:\Program Files (x86)\GoSave\Ga8hbGZSroz1Kw.dat 7Sz69r7IVJmZrdR.exe File opened for modification C:\Program Files (x86)\GoSave\Ga8hbGZSroz1Kw.dat 7Sz69r7IVJmZrdR.exe File created C:\Program Files (x86)\GoSave\Ga8hbGZSroz1Kw.x64.dll 7Sz69r7IVJmZrdR.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
7Sz69r7IVJmZrdR.exepid process 1252 7Sz69r7IVJmZrdR.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
c42b914076231e4e3e4ec95bc54cf821987e8538348f7e8ec95b03cbea84ef87.exe7Sz69r7IVJmZrdR.exeregsvr32.exedescription pid process target process PID 1236 wrote to memory of 1252 1236 c42b914076231e4e3e4ec95bc54cf821987e8538348f7e8ec95b03cbea84ef87.exe 7Sz69r7IVJmZrdR.exe PID 1236 wrote to memory of 1252 1236 c42b914076231e4e3e4ec95bc54cf821987e8538348f7e8ec95b03cbea84ef87.exe 7Sz69r7IVJmZrdR.exe PID 1236 wrote to memory of 1252 1236 c42b914076231e4e3e4ec95bc54cf821987e8538348f7e8ec95b03cbea84ef87.exe 7Sz69r7IVJmZrdR.exe PID 1236 wrote to memory of 1252 1236 c42b914076231e4e3e4ec95bc54cf821987e8538348f7e8ec95b03cbea84ef87.exe 7Sz69r7IVJmZrdR.exe PID 1252 wrote to memory of 860 1252 7Sz69r7IVJmZrdR.exe regsvr32.exe PID 1252 wrote to memory of 860 1252 7Sz69r7IVJmZrdR.exe regsvr32.exe PID 1252 wrote to memory of 860 1252 7Sz69r7IVJmZrdR.exe regsvr32.exe PID 1252 wrote to memory of 860 1252 7Sz69r7IVJmZrdR.exe regsvr32.exe PID 1252 wrote to memory of 860 1252 7Sz69r7IVJmZrdR.exe regsvr32.exe PID 1252 wrote to memory of 860 1252 7Sz69r7IVJmZrdR.exe regsvr32.exe PID 1252 wrote to memory of 860 1252 7Sz69r7IVJmZrdR.exe regsvr32.exe PID 860 wrote to memory of 1684 860 regsvr32.exe regsvr32.exe PID 860 wrote to memory of 1684 860 regsvr32.exe regsvr32.exe PID 860 wrote to memory of 1684 860 regsvr32.exe regsvr32.exe PID 860 wrote to memory of 1684 860 regsvr32.exe regsvr32.exe PID 860 wrote to memory of 1684 860 regsvr32.exe regsvr32.exe PID 860 wrote to memory of 1684 860 regsvr32.exe regsvr32.exe PID 860 wrote to memory of 1684 860 regsvr32.exe regsvr32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c42b914076231e4e3e4ec95bc54cf821987e8538348f7e8ec95b03cbea84ef87.exe"C:\Users\Admin\AppData\Local\Temp\c42b914076231e4e3e4ec95bc54cf821987e8538348f7e8ec95b03cbea84ef87.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\7zSAF34.tmp\7Sz69r7IVJmZrdR.exe.\7Sz69r7IVJmZrdR.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\GoSave\Ga8hbGZSroz1Kw.x64.dll"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\GoSave\Ga8hbGZSroz1Kw.x64.dll"4⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
PID:1684
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5a47f6eac49b5e4c37d728704ed6df347
SHA105a753aae1b87dfeca340402dc02ac03fef32977
SHA256c9015d6a52d1c46a2877e80198c5c53a6b0ab917c450d6cc322b7a022db0e1c3
SHA51277b587e4c10e89c7968af001d23204eb5b30b6c412b607e8076fd3231c0016133f02060f55483dc0fea49fc71aea310d180d8e48378cd2e4e68b65c62a6cd006
-
Filesize
886KB
MD51433d7e71196529644716ffc72c261b2
SHA1f35147e7dc56f4e92856061b48c9f7a872e10385
SHA2562ae79c724f8c2a134c125315fc6ee929b7ce09260e80b61c9a9e915571103e3f
SHA512c363a35bd82214350439dcf6aaf9048b29f10aaeb3b1c3a69222792a94fab1009a5f6b6528df102ae082c129cce50ae7d646abc1dbd8ff9e788a9d05828c272c
-
Filesize
6KB
MD5a47f6eac49b5e4c37d728704ed6df347
SHA105a753aae1b87dfeca340402dc02ac03fef32977
SHA256c9015d6a52d1c46a2877e80198c5c53a6b0ab917c450d6cc322b7a022db0e1c3
SHA51277b587e4c10e89c7968af001d23204eb5b30b6c412b607e8076fd3231c0016133f02060f55483dc0fea49fc71aea310d180d8e48378cd2e4e68b65c62a6cd006
-
Filesize
770KB
MD5b4c30381dd37fea1c1c69bcb3ad48b32
SHA1869eca61396754586f7e85ebf65a334e01856740
SHA25666481ba6d9cbf3c7662fc7cfd867739077256f60f4165f76dfdcd9461500ae50
SHA5121e7bbdd7a75b748ff9a5f70b46766b0108effc84e0cc7c5d8a1f32e56136181060a4363ed2cbd6ed14d195a2379cf8148680380256f31b809bb77d1fe0bf064f
-
Filesize
770KB
MD5b4c30381dd37fea1c1c69bcb3ad48b32
SHA1869eca61396754586f7e85ebf65a334e01856740
SHA25666481ba6d9cbf3c7662fc7cfd867739077256f60f4165f76dfdcd9461500ae50
SHA5121e7bbdd7a75b748ff9a5f70b46766b0108effc84e0cc7c5d8a1f32e56136181060a4363ed2cbd6ed14d195a2379cf8148680380256f31b809bb77d1fe0bf064f
-
Filesize
745KB
MD5ce27e078a917088b7459c44570637b9d
SHA14d9e95fc9b97a1f21221f96ea8fbee55132e82b7
SHA2568804ae047c9ba998964a359f278f54fa1d671ed245b7dfe117625f1ce0d5e84f
SHA512492fdacef00a45dfe6d9db9c80b908bd0d9ebb4bf75c1f4053a8e281cfad5279646754a711484709de6f571487276ec19f71552522dc218fba8331bf6358f9ce
-
Filesize
3KB
MD5f636475c74627ddf7b3b6b6dfaa8d491
SHA1fb3a63977f8b0e07f18d313ace3e1f1223dc423b
SHA256e6e330d72d59551c9ba78464c4081280510901a82f66d94c84cc94ca4594e4b2
SHA512ba788afd76700c60fa8d899ea6ebc1c69594b09d9099c7cb4d408e290575c9ed89b0288df1a1ca9f1562564eb65f51f8add17f4c57eea7fe890b38592560fb96
-
Filesize
886KB
MD51433d7e71196529644716ffc72c261b2
SHA1f35147e7dc56f4e92856061b48c9f7a872e10385
SHA2562ae79c724f8c2a134c125315fc6ee929b7ce09260e80b61c9a9e915571103e3f
SHA512c363a35bd82214350439dcf6aaf9048b29f10aaeb3b1c3a69222792a94fab1009a5f6b6528df102ae082c129cce50ae7d646abc1dbd8ff9e788a9d05828c272c
-
C:\Users\Admin\AppData\Local\Temp\7zSAF34.tmp\[email protected]\bootstrap.js
Filesize2KB
MD5df13f711e20e9c80171846d4f2f7ae06
SHA156d29cda58427efe0e21d3880d39eb1b0ef60bee
SHA2566c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4
SHA5126c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e
-
C:\Users\Admin\AppData\Local\Temp\7zSAF34.tmp\[email protected]\chrome.manifest
Filesize35B
MD5b290fc4f7999670de2302b89fdc675b7
SHA1775458e579805c691b66364073754ac1a3a17ad1
SHA2564aeb58dacc82e643c5ea85f80e55d0b6e8419fbbe31e0721b5bbf5b6e3b66853
SHA51238836c05932f4a60c24eb3895297b3120ab910e65b1c874e2e444d2ce4d7ceb4ea87f4f90f742b160a694ec0eedd478bdea51e90e2ad8bada3424ed1ee4110df
-
C:\Users\Admin\AppData\Local\Temp\7zSAF34.tmp\[email protected]\content\bg.js
Filesize7KB
MD5eab77b77b16ef9beba04d11eaa80b27d
SHA103f6f3859c1dc41a40f71936b0f898f4bb98ebea
SHA256f0ce285d3bd0c814969abb0151f415ba163c9a7e0ca9e7d3bcb203357feb488e
SHA5129a0bf1c73c31febad96bc8ef6dcf1395a1ced1737880d5053725cfd69182b112e1ba13e5296649cb116cbf8ef68f480d886e01fb1b05c69fa02247c384b9a9b3
-
C:\Users\Admin\AppData\Local\Temp\7zSAF34.tmp\[email protected]\install.rdf
Filesize593B
MD5bc269e010eafe8c1a8c86dd870b9f9aa
SHA184001a63a5bccdcd19bf9c657d2f229922b2380e
SHA256c0c2bf94fae146d8fcbfa6f0e0c63d2b7f7532519d1fddfc8a5914935015caa0
SHA51291075d546661fd144d6f154365e124779375f2c4a6650786fe73ed320f90d525c2051e0143425d1e070722389390b5f4ebc59ea114b4ae59d625900af0e59d96
-
Filesize
146B
MD5646ca780dc2f0fa34dd192a853809560
SHA1dfb7d2bc8a60b05513e488fe02cbd6298b724850
SHA256866b68197c2639b2f57e5431cffa973de992d6b75a8e0e01900e1506d3a97dbb
SHA512f6764f625184f2bbe135fa63d8ce8e7a26613cda9fa4548bf0a2378ffd7581b87e5855dc260edad0f627ba7ea11f528b79840bf7279df73a9c1f4011ba17b5e0
-
Filesize
144B
MD5fca19198fd8af21016a8b1dec7980002
SHA1fd01a47d14004e17a625efe66cc46a06c786cf40
SHA256332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a
SHA51260f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47
-
Filesize
5KB
MD5fd030f9d73ac60984556fe8cafb10e0f
SHA153d58e1cfc0a28043005a740e1e967fc8d52b6d1
SHA2565168c6335cbfdbeb85567f30bb8a37201d4aef8a7fe2c90f1aaa6f64d11eefd4
SHA5125de7e74e8eb1c259d62afb757f8f69cfedb439fa0e34dc2fd88700a680b89e173d9d3e04c2c49a1752d66f90b0a1900a805a41d1323ff45bcb97c9db46202641
-
Filesize
531B
MD536d98318ab2b3b2585a30984db328afb
SHA1f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5
SHA256ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7
SHA5126f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a
-
Filesize
498B
MD5640199ea4621e34510de919f6a54436f
SHA1dc65dbfad02bd2688030bd56ca1cab85917a9937
SHA256e4aa7c089e32d14ddf584e9de6d007ec16581cd30c248ff7284bc0eb7757d4af
SHA512d64bc524d6df7c4c21a5ddfb0e6636317482ef4dc28006bd0a38d5e26c2db75626f216143026bf8acf3baa11d86c278e902c78afad4f806ca36f9e54bc75ff0a
-
Filesize
745KB
MD5ce27e078a917088b7459c44570637b9d
SHA14d9e95fc9b97a1f21221f96ea8fbee55132e82b7
SHA2568804ae047c9ba998964a359f278f54fa1d671ed245b7dfe117625f1ce0d5e84f
SHA512492fdacef00a45dfe6d9db9c80b908bd0d9ebb4bf75c1f4053a8e281cfad5279646754a711484709de6f571487276ec19f71552522dc218fba8331bf6358f9ce
-
Filesize
886KB
MD51433d7e71196529644716ffc72c261b2
SHA1f35147e7dc56f4e92856061b48c9f7a872e10385
SHA2562ae79c724f8c2a134c125315fc6ee929b7ce09260e80b61c9a9e915571103e3f
SHA512c363a35bd82214350439dcf6aaf9048b29f10aaeb3b1c3a69222792a94fab1009a5f6b6528df102ae082c129cce50ae7d646abc1dbd8ff9e788a9d05828c272c
-
Filesize
886KB
MD51433d7e71196529644716ffc72c261b2
SHA1f35147e7dc56f4e92856061b48c9f7a872e10385
SHA2562ae79c724f8c2a134c125315fc6ee929b7ce09260e80b61c9a9e915571103e3f
SHA512c363a35bd82214350439dcf6aaf9048b29f10aaeb3b1c3a69222792a94fab1009a5f6b6528df102ae082c129cce50ae7d646abc1dbd8ff9e788a9d05828c272c
-
Filesize
770KB
MD5b4c30381dd37fea1c1c69bcb3ad48b32
SHA1869eca61396754586f7e85ebf65a334e01856740
SHA25666481ba6d9cbf3c7662fc7cfd867739077256f60f4165f76dfdcd9461500ae50
SHA5121e7bbdd7a75b748ff9a5f70b46766b0108effc84e0cc7c5d8a1f32e56136181060a4363ed2cbd6ed14d195a2379cf8148680380256f31b809bb77d1fe0bf064f