Analysis
-
max time kernel
223s -
max time network
333s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 19:40
Static task
static1
Behavioral task
behavioral1
Sample
c332be02842d59c284b6fd3ef5910864a98d802dcfad7b2fbdc26dcd2f1f1739.exe
Resource
win7-20221111-en
General
-
Target
c332be02842d59c284b6fd3ef5910864a98d802dcfad7b2fbdc26dcd2f1f1739.exe
-
Size
2.5MB
-
MD5
87c54474e544367a080b9e159443a24b
-
SHA1
9a37798757faa2b188d024172fe285c2dda824b1
-
SHA256
c332be02842d59c284b6fd3ef5910864a98d802dcfad7b2fbdc26dcd2f1f1739
-
SHA512
ed81bb702fa801a515e3f40819b5f3d4fcf06ff0274304fa815990383ce18b055ac4fadc0e528296ace84ba092e7019d8c3b997c7316bf16152b39c75fd082f7
-
SSDEEP
49152:h1OsCUc3R1YQeb1bR9qMS3te/+E+kzkeRutdQ3L3V/A9VeP:h1OHbRsTWe/Zl
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
jqbluyXs0iOlNSs.exepid process 560 jqbluyXs0iOlNSs.exe -
Loads dropped DLL 4 IoCs
Processes:
c332be02842d59c284b6fd3ef5910864a98d802dcfad7b2fbdc26dcd2f1f1739.exejqbluyXs0iOlNSs.exeregsvr32.exeregsvr32.exepid process 1032 c332be02842d59c284b6fd3ef5910864a98d802dcfad7b2fbdc26dcd2f1f1739.exe 560 jqbluyXs0iOlNSs.exe 1592 regsvr32.exe 1572 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 3 IoCs
Processes:
jqbluyXs0iOlNSs.exedescription ioc process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\lidpkphggjoimhlmmnhnngigibbpmhjf\1.3\manifest.json jqbluyXs0iOlNSs.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\lidpkphggjoimhlmmnhnngigibbpmhjf\1.3\manifest.json jqbluyXs0iOlNSs.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\lidpkphggjoimhlmmnhnngigibbpmhjf\1.3\manifest.json jqbluyXs0iOlNSs.exe -
Installs/modifies Browser Helper Object 2 TTPs 11 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
jqbluyXs0iOlNSs.exeregsvr32.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} jqbluyXs0iOlNSs.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects jqbluyXs0iOlNSs.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DBC80044-A445-435B-BC74-9C25C1C588A9} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{18DF081C-E8AD-4283-A596-FA578C2EBDC3} jqbluyXs0iOlNSs.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} jqbluyXs0iOlNSs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\ jqbluyXs0iOlNSs.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} regsvr32.exe -
Drops file in System32 directory 4 IoCs
Processes:
jqbluyXs0iOlNSs.exedescription ioc process File opened for modification C:\Windows\System32\GroupPolicy jqbluyXs0iOlNSs.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini jqbluyXs0iOlNSs.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol jqbluyXs0iOlNSs.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI jqbluyXs0iOlNSs.exe -
Drops file in Program Files directory 8 IoCs
Processes:
jqbluyXs0iOlNSs.exedescription ioc process File created C:\Program Files (x86)\Vaudix\SKEilhRVIRVlpl.dat jqbluyXs0iOlNSs.exe File opened for modification C:\Program Files (x86)\Vaudix\SKEilhRVIRVlpl.dat jqbluyXs0iOlNSs.exe File created C:\Program Files (x86)\Vaudix\SKEilhRVIRVlpl.x64.dll jqbluyXs0iOlNSs.exe File opened for modification C:\Program Files (x86)\Vaudix\SKEilhRVIRVlpl.x64.dll jqbluyXs0iOlNSs.exe File created C:\Program Files (x86)\Vaudix\SKEilhRVIRVlpl.dll jqbluyXs0iOlNSs.exe File opened for modification C:\Program Files (x86)\Vaudix\SKEilhRVIRVlpl.dll jqbluyXs0iOlNSs.exe File created C:\Program Files (x86)\Vaudix\SKEilhRVIRVlpl.tlb jqbluyXs0iOlNSs.exe File opened for modification C:\Program Files (x86)\Vaudix\SKEilhRVIRVlpl.tlb jqbluyXs0iOlNSs.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
jqbluyXs0iOlNSs.exepid process 560 jqbluyXs0iOlNSs.exe 560 jqbluyXs0iOlNSs.exe 560 jqbluyXs0iOlNSs.exe 560 jqbluyXs0iOlNSs.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
c332be02842d59c284b6fd3ef5910864a98d802dcfad7b2fbdc26dcd2f1f1739.exejqbluyXs0iOlNSs.exeregsvr32.exedescription pid process target process PID 1032 wrote to memory of 560 1032 c332be02842d59c284b6fd3ef5910864a98d802dcfad7b2fbdc26dcd2f1f1739.exe jqbluyXs0iOlNSs.exe PID 1032 wrote to memory of 560 1032 c332be02842d59c284b6fd3ef5910864a98d802dcfad7b2fbdc26dcd2f1f1739.exe jqbluyXs0iOlNSs.exe PID 1032 wrote to memory of 560 1032 c332be02842d59c284b6fd3ef5910864a98d802dcfad7b2fbdc26dcd2f1f1739.exe jqbluyXs0iOlNSs.exe PID 1032 wrote to memory of 560 1032 c332be02842d59c284b6fd3ef5910864a98d802dcfad7b2fbdc26dcd2f1f1739.exe jqbluyXs0iOlNSs.exe PID 560 wrote to memory of 1592 560 jqbluyXs0iOlNSs.exe regsvr32.exe PID 560 wrote to memory of 1592 560 jqbluyXs0iOlNSs.exe regsvr32.exe PID 560 wrote to memory of 1592 560 jqbluyXs0iOlNSs.exe regsvr32.exe PID 560 wrote to memory of 1592 560 jqbluyXs0iOlNSs.exe regsvr32.exe PID 560 wrote to memory of 1592 560 jqbluyXs0iOlNSs.exe regsvr32.exe PID 560 wrote to memory of 1592 560 jqbluyXs0iOlNSs.exe regsvr32.exe PID 560 wrote to memory of 1592 560 jqbluyXs0iOlNSs.exe regsvr32.exe PID 1592 wrote to memory of 1572 1592 regsvr32.exe regsvr32.exe PID 1592 wrote to memory of 1572 1592 regsvr32.exe regsvr32.exe PID 1592 wrote to memory of 1572 1592 regsvr32.exe regsvr32.exe PID 1592 wrote to memory of 1572 1592 regsvr32.exe regsvr32.exe PID 1592 wrote to memory of 1572 1592 regsvr32.exe regsvr32.exe PID 1592 wrote to memory of 1572 1592 regsvr32.exe regsvr32.exe PID 1592 wrote to memory of 1572 1592 regsvr32.exe regsvr32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c332be02842d59c284b6fd3ef5910864a98d802dcfad7b2fbdc26dcd2f1f1739.exe"C:\Users\Admin\AppData\Local\Temp\c332be02842d59c284b6fd3ef5910864a98d802dcfad7b2fbdc26dcd2f1f1739.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS36B.tmp\jqbluyXs0iOlNSs.exe.\jqbluyXs0iOlNSs.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\Vaudix\SKEilhRVIRVlpl.x64.dll"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\Vaudix\SKEilhRVIRVlpl.x64.dll"4⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Vaudix\SKEilhRVIRVlpl.datFilesize
6KB
MD5df7bf154faaa2682af7bc5456e4e9d1c
SHA19d4d1093bffbdb278a2de22a127a468bfbfd2ced
SHA2564a35cafda0d11f01a86d64df357543a2e5f2784c0792d9d322fc80887eb39cd8
SHA512511b5d25add7769963b63f82439cc7c6877d07f0a3e6d6e3fcbb1d61837c3d7f08ebafbce8f4c7de542f670879d5eb44f049bb4464433fbe6fabeac989a1fa99
-
C:\Program Files (x86)\Vaudix\SKEilhRVIRVlpl.x64.dllFilesize
874KB
MD5c204b63eda2256280c0d74669210c890
SHA10a66d21505519e92683ac9845c3ff9ee6e196332
SHA256505902d13946b15000ecb6aadb6946a298193dbef795f1d085a233ca5d7ab4f0
SHA5121bec19d922bbf35807826f156663338b9d0cfa221d41b531555577579646e5cbb5854a510da918c92755f10782e4f5fc8e49c4e4b24c32b7e800ca51691c7425
-
C:\Users\Admin\AppData\Local\Temp\7zS36B.tmp\3skTLk@e.net\bootstrap.jsFilesize
2KB
MD5df13f711e20e9c80171846d4f2f7ae06
SHA156d29cda58427efe0e21d3880d39eb1b0ef60bee
SHA2566c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4
SHA5126c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e
-
C:\Users\Admin\AppData\Local\Temp\7zS36B.tmp\3skTLk@e.net\chrome.manifestFilesize
35B
MD5ee059e85029b944e7b8ff0287c96c75f
SHA14430890ad9f04f016310713e96c8575529a0b50c
SHA256c769c607c8b7755083d6b0aa25d9de9a3c643cc5d60cd36c9f2b179b85106c1d
SHA512be529c344daf6840e28637e6e309d685990f220407ffd9ac7b09c304cf02888f133b844efd1219392bfb265280d3211bac1189dbb238240cf4d6b55fd14a1520
-
C:\Users\Admin\AppData\Local\Temp\7zS36B.tmp\3skTLk@e.net\content\bg.jsFilesize
8KB
MD56ee07e5d158cb3e572e793950dd4a557
SHA184762f07d04e40da2ec2e68471dfa3b4970507dc
SHA256c171fe4dc92379d274120825f049208b7ec5a6d95f6053bc5b4c22aad30196c8
SHA51219e830a2a5837e18bc3f7377806f1bb660f3e3c6480b60d43e0d91a6dc7aa2c35e5d61a8a4210b7d8f9c44b397e85cb66506732c90278ace257c7e5dff24facb
-
C:\Users\Admin\AppData\Local\Temp\7zS36B.tmp\3skTLk@e.net\install.rdfFilesize
594B
MD51bf4e91f06727bfab1907fdcc3b037eb
SHA1189d7a1b1c51fe8d2416ddd09dfbc0cd8d7208d8
SHA256cc38e1befb2e66b8823184b51758a671a2aed6a6ceaeb16305be1797830fad8c
SHA5122d02061a09ed73b611bcd036234363083c4dd7283d7f4a5f30e237813cb37262a10e3a346e55f56b474ce46ae75847b86bc3747db7899aa1ab33bb1791f586f1
-
C:\Users\Admin\AppData\Local\Temp\7zS36B.tmp\SKEilhRVIRVlpl.dllFilesize
744KB
MD5fc8b2dfce95210e4fe59b69a454ce14a
SHA146acd69f9bc55784091a572c8aa4d4d153a874f8
SHA2563b408b96d81cfe3167926bcb62020da4d95001d8d2c3fc4d67708ec21488f189
SHA5125ba3bb3437bb523721eac4e5c510b3fcb7b15090efeccd43075c8a42a776acad0c785431d7e2287e1b812556a30cd17bdde3d0d99f505a739c2042843d2cc1bf
-
C:\Users\Admin\AppData\Local\Temp\7zS36B.tmp\SKEilhRVIRVlpl.tlbFilesize
3KB
MD5662093ad59715d81e0a2b7cfbd4ac684
SHA183419c0803aa1c25a27b1fb8ad4a663d2d4878b0
SHA25668fc930e26f7f38e30df8f8f40d1232b81af62d4cf27a281a8f645788ad1f6c4
SHA5120eaffb7f011f548e1c6f8490c3d353fa05976140383df85663b5ef13be110d4847f08afe236a796a7f10a28895d29a7344e6d346389aa0780cc24af50fd66bf6
-
C:\Users\Admin\AppData\Local\Temp\7zS36B.tmp\SKEilhRVIRVlpl.x64.dllFilesize
874KB
MD5c204b63eda2256280c0d74669210c890
SHA10a66d21505519e92683ac9845c3ff9ee6e196332
SHA256505902d13946b15000ecb6aadb6946a298193dbef795f1d085a233ca5d7ab4f0
SHA5121bec19d922bbf35807826f156663338b9d0cfa221d41b531555577579646e5cbb5854a510da918c92755f10782e4f5fc8e49c4e4b24c32b7e800ca51691c7425
-
C:\Users\Admin\AppData\Local\Temp\7zS36B.tmp\jqbluyXs0iOlNSs.datFilesize
6KB
MD5df7bf154faaa2682af7bc5456e4e9d1c
SHA19d4d1093bffbdb278a2de22a127a468bfbfd2ced
SHA2564a35cafda0d11f01a86d64df357543a2e5f2784c0792d9d322fc80887eb39cd8
SHA512511b5d25add7769963b63f82439cc7c6877d07f0a3e6d6e3fcbb1d61837c3d7f08ebafbce8f4c7de542f670879d5eb44f049bb4464433fbe6fabeac989a1fa99
-
C:\Users\Admin\AppData\Local\Temp\7zS36B.tmp\jqbluyXs0iOlNSs.exeFilesize
762KB
MD5468f56fce4a9413059464fa7c9c3cc5f
SHA199dde68e6dca34b5787c1e2faeab1716f443e462
SHA2561b0cefe330725f38dd592a9900eeca832124643d3a170805ad7cd988dc312841
SHA51211bf2744d92faaa1e13bb316d3d56555fd5bb8a8248fde6bbca1f692cc55928ec901cc1cc79c09f236273e25712526dd629fd97aec4f062d469c9714d1a6a7d0
-
C:\Users\Admin\AppData\Local\Temp\7zS36B.tmp\jqbluyXs0iOlNSs.exeFilesize
762KB
MD5468f56fce4a9413059464fa7c9c3cc5f
SHA199dde68e6dca34b5787c1e2faeab1716f443e462
SHA2561b0cefe330725f38dd592a9900eeca832124643d3a170805ad7cd988dc312841
SHA51211bf2744d92faaa1e13bb316d3d56555fd5bb8a8248fde6bbca1f692cc55928ec901cc1cc79c09f236273e25712526dd629fd97aec4f062d469c9714d1a6a7d0
-
C:\Users\Admin\AppData\Local\Temp\7zS36B.tmp\lidpkphggjoimhlmmnhnngigibbpmhjf\MVXOMwfN.jsFilesize
6KB
MD5368049297a9c9bcd57445e90bc29d33e
SHA1acd4c12a0264eeb09a76c2f0b1a4569a9fd94b7e
SHA256dd0b164d0ef0692cfd3ef58f21656d14824e3acd7bc8f72e37e392790fb512ea
SHA512fbb93676e6c8c26435d993407c085df826aedfb6ea25026f1904c7c66ea988d5afafd761758bc1a99a670f0f8406a4032759c5210d7d26715479fe6123646da0
-
C:\Users\Admin\AppData\Local\Temp\7zS36B.tmp\lidpkphggjoimhlmmnhnngigibbpmhjf\background.htmlFilesize
145B
MD55075e9d0631e272d1870f497ff3bf53c
SHA1164c1727f502ea0fd60f8aec1609c64d4e70c3be
SHA256708bb741e429be980aca001e75c06b7785c1b578e2c4e9b438ab160ee10e2fe3
SHA51282190178471c277642120045463cf3330de680a2ada346546211d60cce0800394b83703e8e1fa5ec5c97eaf6026faa33bd5ea3e455c2518bd155590f173c6882
-
C:\Users\Admin\AppData\Local\Temp\7zS36B.tmp\lidpkphggjoimhlmmnhnngigibbpmhjf\content.jsFilesize
144B
MD5fca19198fd8af21016a8b1dec7980002
SHA1fd01a47d14004e17a625efe66cc46a06c786cf40
SHA256332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a
SHA51260f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47
-
C:\Users\Admin\AppData\Local\Temp\7zS36B.tmp\lidpkphggjoimhlmmnhnngigibbpmhjf\lsdb.jsFilesize
531B
MD536d98318ab2b3b2585a30984db328afb
SHA1f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5
SHA256ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7
SHA5126f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a
-
C:\Users\Admin\AppData\Local\Temp\7zS36B.tmp\lidpkphggjoimhlmmnhnngigibbpmhjf\manifest.jsonFilesize
498B
MD5664e2884e17f23553a19eee317642194
SHA1a28ccc088d6b6692646150f3e8f111e568723fb4
SHA256ee4ef853224cde2aa7e54351c02bc811af939202b82e19cbd1cc011fc3565191
SHA512b2cef8c4dfb6a0648f21c53393b982c9171d8a0344a94970c13866ebd2870de2cd99dab5984000b10802c54a748230104c7997c3d2cd3ac5e97c9355a4cb7ecb
-
\Program Files (x86)\Vaudix\SKEilhRVIRVlpl.dllFilesize
744KB
MD5fc8b2dfce95210e4fe59b69a454ce14a
SHA146acd69f9bc55784091a572c8aa4d4d153a874f8
SHA2563b408b96d81cfe3167926bcb62020da4d95001d8d2c3fc4d67708ec21488f189
SHA5125ba3bb3437bb523721eac4e5c510b3fcb7b15090efeccd43075c8a42a776acad0c785431d7e2287e1b812556a30cd17bdde3d0d99f505a739c2042843d2cc1bf
-
\Program Files (x86)\Vaudix\SKEilhRVIRVlpl.x64.dllFilesize
874KB
MD5c204b63eda2256280c0d74669210c890
SHA10a66d21505519e92683ac9845c3ff9ee6e196332
SHA256505902d13946b15000ecb6aadb6946a298193dbef795f1d085a233ca5d7ab4f0
SHA5121bec19d922bbf35807826f156663338b9d0cfa221d41b531555577579646e5cbb5854a510da918c92755f10782e4f5fc8e49c4e4b24c32b7e800ca51691c7425
-
\Program Files (x86)\Vaudix\SKEilhRVIRVlpl.x64.dllFilesize
874KB
MD5c204b63eda2256280c0d74669210c890
SHA10a66d21505519e92683ac9845c3ff9ee6e196332
SHA256505902d13946b15000ecb6aadb6946a298193dbef795f1d085a233ca5d7ab4f0
SHA5121bec19d922bbf35807826f156663338b9d0cfa221d41b531555577579646e5cbb5854a510da918c92755f10782e4f5fc8e49c4e4b24c32b7e800ca51691c7425
-
\Users\Admin\AppData\Local\Temp\7zS36B.tmp\jqbluyXs0iOlNSs.exeFilesize
762KB
MD5468f56fce4a9413059464fa7c9c3cc5f
SHA199dde68e6dca34b5787c1e2faeab1716f443e462
SHA2561b0cefe330725f38dd592a9900eeca832124643d3a170805ad7cd988dc312841
SHA51211bf2744d92faaa1e13bb316d3d56555fd5bb8a8248fde6bbca1f692cc55928ec901cc1cc79c09f236273e25712526dd629fd97aec4f062d469c9714d1a6a7d0
-
memory/560-56-0x0000000000000000-mapping.dmp
-
memory/1032-54-0x0000000074DA1000-0x0000000074DA3000-memory.dmpFilesize
8KB
-
memory/1572-77-0x0000000000000000-mapping.dmp
-
memory/1572-78-0x000007FEFB641000-0x000007FEFB643000-memory.dmpFilesize
8KB
-
memory/1592-73-0x0000000000000000-mapping.dmp