Analysis
-
max time kernel
20s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 19:41
Static task
static1
Behavioral task
behavioral1
Sample
c29041ac8f40814a571381deb81366011be95c05ccb0441b928c8c2a38795736.exe
Resource
win7-20221111-en
General
-
Target
c29041ac8f40814a571381deb81366011be95c05ccb0441b928c8c2a38795736.exe
-
Size
2.5MB
-
MD5
7daed4ed46369e858462c8e05fd4d64d
-
SHA1
e3c58eba9a6b5a4bdfbed9925d8490684893e622
-
SHA256
c29041ac8f40814a571381deb81366011be95c05ccb0441b928c8c2a38795736
-
SHA512
edcf185ce3056c0f716a453e04e19bd188232f620177f72b3b424dc0d84f75315abb0568176a4da50eda5c2e353f6a69ba86d06940b4aaeff2b4c8ffbac75556
-
SSDEEP
49152:h1OsPjtPNg3MaK+715e2Yl8Wd7dZcRGzPbXO2mg6P1Ql5PPLKMRnUDb:h1OujVNI71i86pZbz55PPLKMRUn
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
IB9VGFMzo0f3Y0s.exepid process 340 IB9VGFMzo0f3Y0s.exe -
Loads dropped DLL 4 IoCs
Processes:
c29041ac8f40814a571381deb81366011be95c05ccb0441b928c8c2a38795736.exeIB9VGFMzo0f3Y0s.exeregsvr32.exeregsvr32.exepid process 1516 c29041ac8f40814a571381deb81366011be95c05ccb0441b928c8c2a38795736.exe 340 IB9VGFMzo0f3Y0s.exe 1644 regsvr32.exe 1744 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 3 IoCs
Processes:
IB9VGFMzo0f3Y0s.exedescription ioc process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\lpapcpbhddnipgnoppmdfgidikhnmilo\1.0\manifest.json IB9VGFMzo0f3Y0s.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\lpapcpbhddnipgnoppmdfgidikhnmilo\1.0\manifest.json IB9VGFMzo0f3Y0s.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\lpapcpbhddnipgnoppmdfgidikhnmilo\1.0\manifest.json IB9VGFMzo0f3Y0s.exe -
Installs/modifies Browser Helper Object 2 TTPs 11 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
IB9VGFMzo0f3Y0s.exeregsvr32.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} IB9VGFMzo0f3Y0s.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} IB9VGFMzo0f3Y0s.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\ IB9VGFMzo0f3Y0s.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DBC80044-A445-435B-BC74-9C25C1C588A9} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{18DF081C-E8AD-4283-A596-FA578C2EBDC3} IB9VGFMzo0f3Y0s.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects IB9VGFMzo0f3Y0s.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ regsvr32.exe -
Drops file in Program Files directory 8 IoCs
Processes:
IB9VGFMzo0f3Y0s.exedescription ioc process File created C:\Program Files (x86)\YoutubeAdBlocke\HP2Qn1YkPerS9V.x64.dll IB9VGFMzo0f3Y0s.exe File opened for modification C:\Program Files (x86)\YoutubeAdBlocke\HP2Qn1YkPerS9V.x64.dll IB9VGFMzo0f3Y0s.exe File created C:\Program Files (x86)\YoutubeAdBlocke\HP2Qn1YkPerS9V.dll IB9VGFMzo0f3Y0s.exe File opened for modification C:\Program Files (x86)\YoutubeAdBlocke\HP2Qn1YkPerS9V.dll IB9VGFMzo0f3Y0s.exe File created C:\Program Files (x86)\YoutubeAdBlocke\HP2Qn1YkPerS9V.tlb IB9VGFMzo0f3Y0s.exe File opened for modification C:\Program Files (x86)\YoutubeAdBlocke\HP2Qn1YkPerS9V.tlb IB9VGFMzo0f3Y0s.exe File created C:\Program Files (x86)\YoutubeAdBlocke\HP2Qn1YkPerS9V.dat IB9VGFMzo0f3Y0s.exe File opened for modification C:\Program Files (x86)\YoutubeAdBlocke\HP2Qn1YkPerS9V.dat IB9VGFMzo0f3Y0s.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
IB9VGFMzo0f3Y0s.exepid process 340 IB9VGFMzo0f3Y0s.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
c29041ac8f40814a571381deb81366011be95c05ccb0441b928c8c2a38795736.exeIB9VGFMzo0f3Y0s.exeregsvr32.exedescription pid process target process PID 1516 wrote to memory of 340 1516 c29041ac8f40814a571381deb81366011be95c05ccb0441b928c8c2a38795736.exe IB9VGFMzo0f3Y0s.exe PID 1516 wrote to memory of 340 1516 c29041ac8f40814a571381deb81366011be95c05ccb0441b928c8c2a38795736.exe IB9VGFMzo0f3Y0s.exe PID 1516 wrote to memory of 340 1516 c29041ac8f40814a571381deb81366011be95c05ccb0441b928c8c2a38795736.exe IB9VGFMzo0f3Y0s.exe PID 1516 wrote to memory of 340 1516 c29041ac8f40814a571381deb81366011be95c05ccb0441b928c8c2a38795736.exe IB9VGFMzo0f3Y0s.exe PID 340 wrote to memory of 1644 340 IB9VGFMzo0f3Y0s.exe regsvr32.exe PID 340 wrote to memory of 1644 340 IB9VGFMzo0f3Y0s.exe regsvr32.exe PID 340 wrote to memory of 1644 340 IB9VGFMzo0f3Y0s.exe regsvr32.exe PID 340 wrote to memory of 1644 340 IB9VGFMzo0f3Y0s.exe regsvr32.exe PID 340 wrote to memory of 1644 340 IB9VGFMzo0f3Y0s.exe regsvr32.exe PID 340 wrote to memory of 1644 340 IB9VGFMzo0f3Y0s.exe regsvr32.exe PID 340 wrote to memory of 1644 340 IB9VGFMzo0f3Y0s.exe regsvr32.exe PID 1644 wrote to memory of 1744 1644 regsvr32.exe regsvr32.exe PID 1644 wrote to memory of 1744 1644 regsvr32.exe regsvr32.exe PID 1644 wrote to memory of 1744 1644 regsvr32.exe regsvr32.exe PID 1644 wrote to memory of 1744 1644 regsvr32.exe regsvr32.exe PID 1644 wrote to memory of 1744 1644 regsvr32.exe regsvr32.exe PID 1644 wrote to memory of 1744 1644 regsvr32.exe regsvr32.exe PID 1644 wrote to memory of 1744 1644 regsvr32.exe regsvr32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c29041ac8f40814a571381deb81366011be95c05ccb0441b928c8c2a38795736.exe"C:\Users\Admin\AppData\Local\Temp\c29041ac8f40814a571381deb81366011be95c05ccb0441b928c8c2a38795736.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS4AA8.tmp\IB9VGFMzo0f3Y0s.exe.\IB9VGFMzo0f3Y0s.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\YoutubeAdBlocke\HP2Qn1YkPerS9V.x64.dll"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\YoutubeAdBlocke\HP2Qn1YkPerS9V.x64.dll"4⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\YoutubeAdBlocke\HP2Qn1YkPerS9V.datFilesize
6KB
MD515043c54a933a47ecbe74691a725a067
SHA1ed7138f6956c69d574fc3a0e2a2b4704ec12b943
SHA256e9651019e5c7acb762fec8cb1adc4dcbca3f14a1c61fc93e4fd7a65da6e33f58
SHA512844ca5acd54d25d11e6c21d187937ac1bd6efaaf2d1f5975442d39addc36da94b0e11949ac4af0e15a0eb1d7a7b605446fd8e87915fd51a90dea1e51fbdff4d6
-
C:\Program Files (x86)\YoutubeAdBlocke\HP2Qn1YkPerS9V.x64.dllFilesize
879KB
MD5f60a9be9218f7d3c329205bd4f585ee7
SHA18b31e1d5b92ff6642cc5fb707ec76596ce84002c
SHA2567b08c02a0b7315c5b860b594d6486f85a8c182a1851313e1a6299810b896d394
SHA512a6a18d63220f92f80881aaf5f7ed936d7e317a50fe2fc0452f5b3c6793b5b6ffac782366c65d91d7cad1b5a68149f5fa9cd82cf57ba0208ea271c792bddee6a7
-
C:\Users\Admin\AppData\Local\Temp\7zS4AA8.tmp\HP2Qn1YkPerS9V.dllFilesize
741KB
MD502955857b45fa9ddd4229b9d67f65d93
SHA1a5fe5c71d62bd9648ab25660d7cae6eff98af3ed
SHA256839e59c1dd9fa6ce4ed8b4b964b32a3afdd5b6b621580c47cdad754868abe753
SHA5120b0c6a7754abead8aec777a1ee4330f4c5ee90aebde30266e6ad93f356f91abbe4a2bc3fdc924556edb82c3b4bd0f97191e72d6039bed14975d5e5b940af3261
-
C:\Users\Admin\AppData\Local\Temp\7zS4AA8.tmp\HP2Qn1YkPerS9V.tlbFilesize
3KB
MD575846c93e1f5b9d77fcc4520a65b4936
SHA1f4631b5f768bfa33063a96c7a0da478c1fb28791
SHA256c6843974e37a7eb67c2e6550cec7ffd63645d80f4bd9613430e5824b4604b08b
SHA512a51876207191e351f955e614be727f9b0141cce69d46f7bbf141a632306fe277de3372848c5b707da525d22bafca044b0a73c544a2a670d4056d33f37f7b328c
-
C:\Users\Admin\AppData\Local\Temp\7zS4AA8.tmp\HP2Qn1YkPerS9V.x64.dllFilesize
879KB
MD5f60a9be9218f7d3c329205bd4f585ee7
SHA18b31e1d5b92ff6642cc5fb707ec76596ce84002c
SHA2567b08c02a0b7315c5b860b594d6486f85a8c182a1851313e1a6299810b896d394
SHA512a6a18d63220f92f80881aaf5f7ed936d7e317a50fe2fc0452f5b3c6793b5b6ffac782366c65d91d7cad1b5a68149f5fa9cd82cf57ba0208ea271c792bddee6a7
-
C:\Users\Admin\AppData\Local\Temp\7zS4AA8.tmp\IB9VGFMzo0f3Y0s.datFilesize
6KB
MD515043c54a933a47ecbe74691a725a067
SHA1ed7138f6956c69d574fc3a0e2a2b4704ec12b943
SHA256e9651019e5c7acb762fec8cb1adc4dcbca3f14a1c61fc93e4fd7a65da6e33f58
SHA512844ca5acd54d25d11e6c21d187937ac1bd6efaaf2d1f5975442d39addc36da94b0e11949ac4af0e15a0eb1d7a7b605446fd8e87915fd51a90dea1e51fbdff4d6
-
C:\Users\Admin\AppData\Local\Temp\7zS4AA8.tmp\IB9VGFMzo0f3Y0s.exeFilesize
783KB
MD5e5f19b8f3fa9ba590482ee5d1c7ed005
SHA1e3d599ca32f07024e281f26e764ef09697aba822
SHA256688036044c4521a1841e9fb5a704d505bfc47c4fc80be111e9a321869a56f9b9
SHA512dde4cd947a2820da9a70c584ad136fc87bf68e272e3b5842967580165a602225fcb754966f2f5d3e66db87026c68f61055893b4d2033183ab5b35fe96d4e16ab
-
C:\Users\Admin\AppData\Local\Temp\7zS4AA8.tmp\IB9VGFMzo0f3Y0s.exeFilesize
783KB
MD5e5f19b8f3fa9ba590482ee5d1c7ed005
SHA1e3d599ca32f07024e281f26e764ef09697aba822
SHA256688036044c4521a1841e9fb5a704d505bfc47c4fc80be111e9a321869a56f9b9
SHA512dde4cd947a2820da9a70c584ad136fc87bf68e272e3b5842967580165a602225fcb754966f2f5d3e66db87026c68f61055893b4d2033183ab5b35fe96d4e16ab
-
C:\Users\Admin\AppData\Local\Temp\7zS4AA8.tmp\TDod2z@fzisq.org\bootstrap.jsFilesize
2KB
MD5df13f711e20e9c80171846d4f2f7ae06
SHA156d29cda58427efe0e21d3880d39eb1b0ef60bee
SHA2566c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4
SHA5126c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e
-
C:\Users\Admin\AppData\Local\Temp\7zS4AA8.tmp\TDod2z@fzisq.org\chrome.manifestFilesize
35B
MD54360c94dbd32d83ceeba974b467691e3
SHA1d14cdbf0654e815d5e88052026f789ed0f4202ec
SHA25610ec6825cefac86d754edb419862203c8f421312b826f55384f7b10e181c0874
SHA512a9a743d8bb4e7a31cfcdbfee3bc54c17c690ad0036a10e70bc0948645aaa06533fa08811e68175844712016ce06e3c198adb2b597b9659994a64bdb889b7e4b3
-
C:\Users\Admin\AppData\Local\Temp\7zS4AA8.tmp\TDod2z@fzisq.org\content\bg.jsFilesize
7KB
MD56f61518d69832e84a5e0d7f092b6e1f1
SHA1c17905482aae59e87dd37735cb44945d6a3a4ecd
SHA25622a6bed609afc0a1438842493e34da6c25fcb4e1da79e4d6ec5711b1a25feaeb
SHA512b3eda127f1d3a3893c212eac6bfcae4c9110497a2c1776d7aa197491e8e62a2acbd90df3d9efe4e03d2463ec8ecc7d63d592687cb7d1cca9a5c271111f83140a
-
C:\Users\Admin\AppData\Local\Temp\7zS4AA8.tmp\TDod2z@fzisq.org\install.rdfFilesize
607B
MD5da8e00cba36c7cb385ce786c5bc7e9a9
SHA1ce96e90fe11fd4d05e2190c24ec36ab3b44e3724
SHA2565cc973d242cdc6cba0b2c485e3587c0734fe14c01cabbcd8fd280e61f98c81e7
SHA51241f6bc966321bc39cd6ac5e627c2f25d51afc9160d94fc782fb207c79e5509a0401eb65416569664fd37b0f629041cbc369b2747651700e7afa1d68c116e48b8
-
C:\Users\Admin\AppData\Local\Temp\7zS4AA8.tmp\lpapcpbhddnipgnoppmdfgidikhnmilo\background.htmlFilesize
138B
MD52af9d5094619324a0751dc9935a8102f
SHA1f7d30ceba03e5962f25ab744a4fc4883cc5ab0ce
SHA256c3bfad0de1f1839e951ae1b02a83c052813fa9faf446da7a31481aa62576160a
SHA512b5e6117a93269bf58aaa8dd1383dff6d442184f32be2c146a8f03f6e3b1be6f620cba2e8a4953f265e486fe4c9d3a1e5997433c1e4e2ab913255991668566d8b
-
C:\Users\Admin\AppData\Local\Temp\7zS4AA8.tmp\lpapcpbhddnipgnoppmdfgidikhnmilo\content.jsFilesize
144B
MD5fca19198fd8af21016a8b1dec7980002
SHA1fd01a47d14004e17a625efe66cc46a06c786cf40
SHA256332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a
SHA51260f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47
-
C:\Users\Admin\AppData\Local\Temp\7zS4AA8.tmp\lpapcpbhddnipgnoppmdfgidikhnmilo\f.jsFilesize
5KB
MD57d3df737696c5a945cd4277ba5858c52
SHA13dd55ddda17d92bb8abc42506ae2eced731703a6
SHA256f3fe77bd5ae5eed7f1f2f959372742dc598e22b17cb12fc8276a400d5c4e580c
SHA5129678672f023d8589299ad0f900fcdcd3cc0cc0b5de3d0fb4827388bfb5d0134c919120298899ae1756fac27b920ff302642a49fef3bacc818f900711d93d08a5
-
C:\Users\Admin\AppData\Local\Temp\7zS4AA8.tmp\lpapcpbhddnipgnoppmdfgidikhnmilo\lsdb.jsFilesize
531B
MD536d98318ab2b3b2585a30984db328afb
SHA1f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5
SHA256ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7
SHA5126f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a
-
C:\Users\Admin\AppData\Local\Temp\7zS4AA8.tmp\lpapcpbhddnipgnoppmdfgidikhnmilo\manifest.jsonFilesize
507B
MD5d429395a45a9aa09e4ee9054e9196b30
SHA1c5dbab4e27650b07d4d159c305d08a9d578c3a3e
SHA256674fc32cde82ed69cb8595bbea9f70f69097062c39bd6a3a505227a4f4a45344
SHA5124a5bc7c005e573bf0cdb89489d676fb26c5fe116d397a6cd7a1ebb2cae9605b3d1657378e17d354cb102e93c39b32fa8d2963f375af37c871452f3170356101e
-
\Program Files (x86)\YoutubeAdBlocke\HP2Qn1YkPerS9V.dllFilesize
741KB
MD502955857b45fa9ddd4229b9d67f65d93
SHA1a5fe5c71d62bd9648ab25660d7cae6eff98af3ed
SHA256839e59c1dd9fa6ce4ed8b4b964b32a3afdd5b6b621580c47cdad754868abe753
SHA5120b0c6a7754abead8aec777a1ee4330f4c5ee90aebde30266e6ad93f356f91abbe4a2bc3fdc924556edb82c3b4bd0f97191e72d6039bed14975d5e5b940af3261
-
\Program Files (x86)\YoutubeAdBlocke\HP2Qn1YkPerS9V.x64.dllFilesize
879KB
MD5f60a9be9218f7d3c329205bd4f585ee7
SHA18b31e1d5b92ff6642cc5fb707ec76596ce84002c
SHA2567b08c02a0b7315c5b860b594d6486f85a8c182a1851313e1a6299810b896d394
SHA512a6a18d63220f92f80881aaf5f7ed936d7e317a50fe2fc0452f5b3c6793b5b6ffac782366c65d91d7cad1b5a68149f5fa9cd82cf57ba0208ea271c792bddee6a7
-
\Program Files (x86)\YoutubeAdBlocke\HP2Qn1YkPerS9V.x64.dllFilesize
879KB
MD5f60a9be9218f7d3c329205bd4f585ee7
SHA18b31e1d5b92ff6642cc5fb707ec76596ce84002c
SHA2567b08c02a0b7315c5b860b594d6486f85a8c182a1851313e1a6299810b896d394
SHA512a6a18d63220f92f80881aaf5f7ed936d7e317a50fe2fc0452f5b3c6793b5b6ffac782366c65d91d7cad1b5a68149f5fa9cd82cf57ba0208ea271c792bddee6a7
-
\Users\Admin\AppData\Local\Temp\7zS4AA8.tmp\IB9VGFMzo0f3Y0s.exeFilesize
783KB
MD5e5f19b8f3fa9ba590482ee5d1c7ed005
SHA1e3d599ca32f07024e281f26e764ef09697aba822
SHA256688036044c4521a1841e9fb5a704d505bfc47c4fc80be111e9a321869a56f9b9
SHA512dde4cd947a2820da9a70c584ad136fc87bf68e272e3b5842967580165a602225fcb754966f2f5d3e66db87026c68f61055893b4d2033183ab5b35fe96d4e16ab
-
memory/340-56-0x0000000000000000-mapping.dmp
-
memory/1516-54-0x0000000076161000-0x0000000076163000-memory.dmpFilesize
8KB
-
memory/1644-73-0x0000000000000000-mapping.dmp
-
memory/1744-77-0x0000000000000000-mapping.dmp
-
memory/1744-78-0x000007FEFBC61000-0x000007FEFBC63000-memory.dmpFilesize
8KB