Analysis
-
max time kernel
179s -
max time network
197s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 19:36
Static task
static1
Behavioral task
behavioral1
Sample
c40c2c6cab9e303b00f5c453b56ae8079f769df819f2b6d4e386e44d155037fe.exe
Resource
win7-20220812-en
General
-
Target
c40c2c6cab9e303b00f5c453b56ae8079f769df819f2b6d4e386e44d155037fe.exe
-
Size
2.5MB
-
MD5
876dd8f46ee1cba676ce60175c20c52b
-
SHA1
41a421251fbf5348b82b905dfde83ab9c741b5f7
-
SHA256
c40c2c6cab9e303b00f5c453b56ae8079f769df819f2b6d4e386e44d155037fe
-
SHA512
a47708aa3d936a1745594764a2a56b3a239eb45fb485c7f3258e97da41d6cfc993c66f7ec8f9d142159f033309367a9881681ad25172a1cb1782e5615fa047fc
-
SSDEEP
49152:h1OsFsNQH0eNGTTOxTnkSM1XN+QMz3p6bOkAk+YetEW6FOCMwEFhjzdUwe:h1OSH0eNGunkt3+1z3p6iVCl
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
uMMj6HEnxtWDDv8.exepid process 1164 uMMj6HEnxtWDDv8.exe -
Loads dropped DLL 3 IoCs
Processes:
uMMj6HEnxtWDDv8.exeregsvr32.exeregsvr32.exepid process 1164 uMMj6HEnxtWDDv8.exe 2148 regsvr32.exe 2564 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 5 IoCs
Processes:
uMMj6HEnxtWDDv8.exedescription ioc process File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\dblinoemocgkdninkcbmjllfghhcfmid\2.0\manifest.json uMMj6HEnxtWDDv8.exe File created C:\Users\WDAGUtilityAccount\AppData\Local\Google\Chrome\User Data\Default\Extensions\dblinoemocgkdninkcbmjllfghhcfmid\2.0\manifest.json uMMj6HEnxtWDDv8.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\dblinoemocgkdninkcbmjllfghhcfmid\2.0\manifest.json uMMj6HEnxtWDDv8.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\dblinoemocgkdninkcbmjllfghhcfmid\2.0\manifest.json uMMj6HEnxtWDDv8.exe File created C:\Users\DefaultAccount\AppData\Local\Google\Chrome\User Data\Default\Extensions\dblinoemocgkdninkcbmjllfghhcfmid\2.0\manifest.json uMMj6HEnxtWDDv8.exe -
Installs/modifies Browser Helper Object 2 TTPs 9 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
uMMj6HEnxtWDDv8.exeregsvr32.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA} uMMj6HEnxtWDDv8.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects uMMj6HEnxtWDDv8.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ uMMj6HEnxtWDDv8.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{DBC80044-A445-435B-BC74-9C25C1C588A9} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} uMMj6HEnxtWDDv8.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ regsvr32.exe -
Drops file in Program Files directory 8 IoCs
Processes:
uMMj6HEnxtWDDv8.exedescription ioc process File created C:\Program Files (x86)\GoSave\nXbwbHrsWWkyMb.dat uMMj6HEnxtWDDv8.exe File opened for modification C:\Program Files (x86)\GoSave\nXbwbHrsWWkyMb.dat uMMj6HEnxtWDDv8.exe File created C:\Program Files (x86)\GoSave\nXbwbHrsWWkyMb.x64.dll uMMj6HEnxtWDDv8.exe File opened for modification C:\Program Files (x86)\GoSave\nXbwbHrsWWkyMb.x64.dll uMMj6HEnxtWDDv8.exe File created C:\Program Files (x86)\GoSave\nXbwbHrsWWkyMb.dll uMMj6HEnxtWDDv8.exe File opened for modification C:\Program Files (x86)\GoSave\nXbwbHrsWWkyMb.dll uMMj6HEnxtWDDv8.exe File created C:\Program Files (x86)\GoSave\nXbwbHrsWWkyMb.tlb uMMj6HEnxtWDDv8.exe File opened for modification C:\Program Files (x86)\GoSave\nXbwbHrsWWkyMb.tlb uMMj6HEnxtWDDv8.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
uMMj6HEnxtWDDv8.exepid process 1164 uMMj6HEnxtWDDv8.exe 1164 uMMj6HEnxtWDDv8.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
c40c2c6cab9e303b00f5c453b56ae8079f769df819f2b6d4e386e44d155037fe.exeuMMj6HEnxtWDDv8.exeregsvr32.exedescription pid process target process PID 1408 wrote to memory of 1164 1408 c40c2c6cab9e303b00f5c453b56ae8079f769df819f2b6d4e386e44d155037fe.exe uMMj6HEnxtWDDv8.exe PID 1408 wrote to memory of 1164 1408 c40c2c6cab9e303b00f5c453b56ae8079f769df819f2b6d4e386e44d155037fe.exe uMMj6HEnxtWDDv8.exe PID 1408 wrote to memory of 1164 1408 c40c2c6cab9e303b00f5c453b56ae8079f769df819f2b6d4e386e44d155037fe.exe uMMj6HEnxtWDDv8.exe PID 1164 wrote to memory of 2148 1164 uMMj6HEnxtWDDv8.exe regsvr32.exe PID 1164 wrote to memory of 2148 1164 uMMj6HEnxtWDDv8.exe regsvr32.exe PID 1164 wrote to memory of 2148 1164 uMMj6HEnxtWDDv8.exe regsvr32.exe PID 2148 wrote to memory of 2564 2148 regsvr32.exe regsvr32.exe PID 2148 wrote to memory of 2564 2148 regsvr32.exe regsvr32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c40c2c6cab9e303b00f5c453b56ae8079f769df819f2b6d4e386e44d155037fe.exe"C:\Users\Admin\AppData\Local\Temp\c40c2c6cab9e303b00f5c453b56ae8079f769df819f2b6d4e386e44d155037fe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\7zS2A3C.tmp\uMMj6HEnxtWDDv8.exe.\uMMj6HEnxtWDDv8.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\GoSave\nXbwbHrsWWkyMb.x64.dll"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\GoSave\nXbwbHrsWWkyMb.x64.dll"4⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
PID:2564
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5c006e2b68d4185ae7d54b151246f58d4
SHA161fec617c84ed17e255d69584bba007a3f5d6973
SHA256644d8fe5170c1a98e104cf8d128e7b0ebaa692c0bbfbf3b25acb4cc255c4f5de
SHA51201f1a8f28a4826d95e5259cdba5b13b6a1ec12411e8a8fd45c52e972f84a487aba397d84a4d7b9c9681c49a8e1d5d7c42a81d2e1c7a6173a77eb8fa17bacceb3
-
Filesize
754KB
MD50ea14ffbf9bc129f87d5a633ca028a12
SHA1c91e00a9d6590556a4c13a46cb6c934f84cf2b2b
SHA2569206058e3e04af4fb8d5c05ae8f088cf0a289ea0e4cd692c4f2d76439adb0d47
SHA5120cfd075335346690ead8c5aef2340b56ce07c59d6243ad102fee0053d64f1a7847e56ba27f5bbcac4048f2c1cf70038e7cdffafe1cc28994603fdd65d2bf7bb2
-
Filesize
891KB
MD5bef492ffc032769cde00802f48a17fab
SHA1a91e733c1269eb785f8e23dc475acac7432f0563
SHA256473507950695ec743b98e5ef4b8970b2c7e6936556903c94f7fa88917265255d
SHA5124f61d5f3a45d20cd00ed7ee6b874bf2dcbf248b8f65dfd8580c7148d6c71c316cace409be675a2ea919e8a12caf8690fafaf14c0f5479df55689401d2432afa0
-
Filesize
891KB
MD5bef492ffc032769cde00802f48a17fab
SHA1a91e733c1269eb785f8e23dc475acac7432f0563
SHA256473507950695ec743b98e5ef4b8970b2c7e6936556903c94f7fa88917265255d
SHA5124f61d5f3a45d20cd00ed7ee6b874bf2dcbf248b8f65dfd8580c7148d6c71c316cace409be675a2ea919e8a12caf8690fafaf14c0f5479df55689401d2432afa0
-
Filesize
891KB
MD5bef492ffc032769cde00802f48a17fab
SHA1a91e733c1269eb785f8e23dc475acac7432f0563
SHA256473507950695ec743b98e5ef4b8970b2c7e6936556903c94f7fa88917265255d
SHA5124f61d5f3a45d20cd00ed7ee6b874bf2dcbf248b8f65dfd8580c7148d6c71c316cace409be675a2ea919e8a12caf8690fafaf14c0f5479df55689401d2432afa0
-
Filesize
5KB
MD58b6c47d491912f49ad20ead521c01181
SHA164e6a8a3372978af682f2e47c5729d147ddfdbc6
SHA256615be935561801b78238fbb558f6b79a2fd2fe6b5966d5beb93910bf5b21699d
SHA5121fe909d1e0061d6b11eccc4a7171f134f2fdc2260fa7b8b6fb78dc5e9df18fbdbaba3539be78d348fa527167f458e9d6e85ce39f23cec8e5cb31988c2f78fa05
-
Filesize
142B
MD5039ffd12ce57a9b8a2d9d2bec9518327
SHA12b49beaacf54c9850942742a320c48cbc699f4db
SHA256ce668a43e7c2545c9915c80794f1c9b9757d0565dd90441146c7616943867edb
SHA512d05a624e1eecb762b45476e28f58d4728abd72db11e44245249af3de694dd5e197c6642ad94a1e5cb588debf1987d58071c101a5f872c9f33e2d56ee418888a7
-
Filesize
144B
MD5fca19198fd8af21016a8b1dec7980002
SHA1fd01a47d14004e17a625efe66cc46a06c786cf40
SHA256332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a
SHA51260f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47
-
Filesize
531B
MD536d98318ab2b3b2585a30984db328afb
SHA1f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5
SHA256ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7
SHA5126f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a
-
Filesize
498B
MD5640199ea4621e34510de919f6a54436f
SHA1dc65dbfad02bd2688030bd56ca1cab85917a9937
SHA256e4aa7c089e32d14ddf584e9de6d007ec16581cd30c248ff7284bc0eb7757d4af
SHA512d64bc524d6df7c4c21a5ddfb0e6636317482ef4dc28006bd0a38d5e26c2db75626f216143026bf8acf3baa11d86c278e902c78afad4f806ca36f9e54bc75ff0a
-
C:\Users\Admin\AppData\Local\Temp\7zS2A3C.tmp\[email protected]\bootstrap.js
Filesize2KB
MD5df13f711e20e9c80171846d4f2f7ae06
SHA156d29cda58427efe0e21d3880d39eb1b0ef60bee
SHA2566c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4
SHA5126c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e
-
C:\Users\Admin\AppData\Local\Temp\7zS2A3C.tmp\[email protected]\chrome.manifest
Filesize35B
MD553b8a7d575773567fe10f00dd2851be5
SHA1f82c15d0fd4275e974cc40a1ca892d855152434e
SHA2566043fc073d094cd11b662265ac4ae570c490f13b2af529b1fba8bfb6ebd4ccc8
SHA512ed44ec8e66744241c44d8865b6cbcc517814618c6b2a0893cae652b31d57222653309919c6beda8516874c21049aa1e2f195a8bb56a1df323589b93c819ea1a7
-
C:\Users\Admin\AppData\Local\Temp\7zS2A3C.tmp\[email protected]\content\bg.js
Filesize7KB
MD563c9021274e20710f98706b60cd5f068
SHA1adf38a8bb0391fa7d3194ae3ce24116b81aabc1d
SHA2562fc4ef4c1b7cb864401d1989b9bdffb6a09c83aa710ea83a2e985676154cfddb
SHA51292fec6c369221a65a2722b3fb5b61aa5e48b5687f116f2d61480c176fa4a728a3e78e3682df7096fa1b5c3aa17e5b9dc217ad92097e8f5a254e104b7c33035b3
-
C:\Users\Admin\AppData\Local\Temp\7zS2A3C.tmp\[email protected]\install.rdf
Filesize595B
MD569e3e21e1ae09b8d4dd5f839bd370bb5
SHA1220bd77e257a387fde084271168acbb51b97b496
SHA25616bcecfeb65bd5486abe73646996fc5cc7d0237c883822eb711aad3bcc989155
SHA512e5c9f5d7174aad66a607eb6625736258db9ccaa7b1cccb2bb2022ab57526f5d50d6f3ee56210e4fdab851fd80660fbc857698531f4743c38ec28638270bc192e
-
Filesize
754KB
MD50ea14ffbf9bc129f87d5a633ca028a12
SHA1c91e00a9d6590556a4c13a46cb6c934f84cf2b2b
SHA2569206058e3e04af4fb8d5c05ae8f088cf0a289ea0e4cd692c4f2d76439adb0d47
SHA5120cfd075335346690ead8c5aef2340b56ce07c59d6243ad102fee0053d64f1a7847e56ba27f5bbcac4048f2c1cf70038e7cdffafe1cc28994603fdd65d2bf7bb2
-
Filesize
3KB
MD54ab2bba691d66beca01f76ac65546fe8
SHA116f05ce91f3e2fe4b43452e24d56836fc65615af
SHA25612816936003f13a1711de73328e38f311926a4cc9d1a836f46c9ccc02b6fb06f
SHA512f034390bfd57618bbfd218c3df9e465dda8f4fa51fc0445c74e246472a4cde2bc0bfe4607cbc8cb31ac0edff62a84e954179fadddc2b644b8726cfa3e01694a2
-
Filesize
891KB
MD5bef492ffc032769cde00802f48a17fab
SHA1a91e733c1269eb785f8e23dc475acac7432f0563
SHA256473507950695ec743b98e5ef4b8970b2c7e6936556903c94f7fa88917265255d
SHA5124f61d5f3a45d20cd00ed7ee6b874bf2dcbf248b8f65dfd8580c7148d6c71c316cace409be675a2ea919e8a12caf8690fafaf14c0f5479df55689401d2432afa0
-
Filesize
6KB
MD5c006e2b68d4185ae7d54b151246f58d4
SHA161fec617c84ed17e255d69584bba007a3f5d6973
SHA256644d8fe5170c1a98e104cf8d128e7b0ebaa692c0bbfbf3b25acb4cc255c4f5de
SHA51201f1a8f28a4826d95e5259cdba5b13b6a1ec12411e8a8fd45c52e972f84a487aba397d84a4d7b9c9681c49a8e1d5d7c42a81d2e1c7a6173a77eb8fa17bacceb3
-
Filesize
774KB
MD5fac681323e2e0ea322ef16fa551cf1e8
SHA1744f89e591a6ced737cfe9214ce09c263de50211
SHA256537f2df71a2f21f943a39d1c6d093a442e7ee975ed3e29b733b8bc5bf646793c
SHA51222626bd0e79edac062b61d64234f563e3a8218703276a19a0b01749e2cad8387c8bd39bfe13810b787fb9e4c7f1669ea542e36bbf63c7c243fc68bb6fdf5c7b2
-
Filesize
774KB
MD5fac681323e2e0ea322ef16fa551cf1e8
SHA1744f89e591a6ced737cfe9214ce09c263de50211
SHA256537f2df71a2f21f943a39d1c6d093a442e7ee975ed3e29b733b8bc5bf646793c
SHA51222626bd0e79edac062b61d64234f563e3a8218703276a19a0b01749e2cad8387c8bd39bfe13810b787fb9e4c7f1669ea542e36bbf63c7c243fc68bb6fdf5c7b2