Analysis

  • max time kernel
    20s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 19:41

General

  • Target

    c29041ac8f40814a571381deb81366011be95c05ccb0441b928c8c2a38795736.exe

  • Size

    2.5MB

  • MD5

    7daed4ed46369e858462c8e05fd4d64d

  • SHA1

    e3c58eba9a6b5a4bdfbed9925d8490684893e622

  • SHA256

    c29041ac8f40814a571381deb81366011be95c05ccb0441b928c8c2a38795736

  • SHA512

    edcf185ce3056c0f716a453e04e19bd188232f620177f72b3b424dc0d84f75315abb0568176a4da50eda5c2e353f6a69ba86d06940b4aaeff2b4c8ffbac75556

  • SSDEEP

    49152:h1OsPjtPNg3MaK+715e2Yl8Wd7dZcRGzPbXO2mg6P1Ql5PPLKMRnUDb:h1OujVNI71i86pZbz55PPLKMRUn

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 3 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 11 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c29041ac8f40814a571381deb81366011be95c05ccb0441b928c8c2a38795736.exe
    "C:\Users\Admin\AppData\Local\Temp\c29041ac8f40814a571381deb81366011be95c05ccb0441b928c8c2a38795736.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1516
    • C:\Users\Admin\AppData\Local\Temp\7zS4AA8.tmp\IB9VGFMzo0f3Y0s.exe
      .\IB9VGFMzo0f3Y0s.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops Chrome extension
      • Installs/modifies Browser Helper Object
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:340
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32.exe /s "C:\Program Files (x86)\YoutubeAdBlocke\HP2Qn1YkPerS9V.x64.dll"
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1644
        • C:\Windows\system32\regsvr32.exe
          /s "C:\Program Files (x86)\YoutubeAdBlocke\HP2Qn1YkPerS9V.x64.dll"
          4⤵
          • Loads dropped DLL
          • Installs/modifies Browser Helper Object
          PID:1744

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Browser Extensions

1
T1176

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\YoutubeAdBlocke\HP2Qn1YkPerS9V.dat
    Filesize

    6KB

    MD5

    15043c54a933a47ecbe74691a725a067

    SHA1

    ed7138f6956c69d574fc3a0e2a2b4704ec12b943

    SHA256

    e9651019e5c7acb762fec8cb1adc4dcbca3f14a1c61fc93e4fd7a65da6e33f58

    SHA512

    844ca5acd54d25d11e6c21d187937ac1bd6efaaf2d1f5975442d39addc36da94b0e11949ac4af0e15a0eb1d7a7b605446fd8e87915fd51a90dea1e51fbdff4d6

  • C:\Program Files (x86)\YoutubeAdBlocke\HP2Qn1YkPerS9V.x64.dll
    Filesize

    879KB

    MD5

    f60a9be9218f7d3c329205bd4f585ee7

    SHA1

    8b31e1d5b92ff6642cc5fb707ec76596ce84002c

    SHA256

    7b08c02a0b7315c5b860b594d6486f85a8c182a1851313e1a6299810b896d394

    SHA512

    a6a18d63220f92f80881aaf5f7ed936d7e317a50fe2fc0452f5b3c6793b5b6ffac782366c65d91d7cad1b5a68149f5fa9cd82cf57ba0208ea271c792bddee6a7

  • C:\Users\Admin\AppData\Local\Temp\7zS4AA8.tmp\HP2Qn1YkPerS9V.dll
    Filesize

    741KB

    MD5

    02955857b45fa9ddd4229b9d67f65d93

    SHA1

    a5fe5c71d62bd9648ab25660d7cae6eff98af3ed

    SHA256

    839e59c1dd9fa6ce4ed8b4b964b32a3afdd5b6b621580c47cdad754868abe753

    SHA512

    0b0c6a7754abead8aec777a1ee4330f4c5ee90aebde30266e6ad93f356f91abbe4a2bc3fdc924556edb82c3b4bd0f97191e72d6039bed14975d5e5b940af3261

  • C:\Users\Admin\AppData\Local\Temp\7zS4AA8.tmp\HP2Qn1YkPerS9V.tlb
    Filesize

    3KB

    MD5

    75846c93e1f5b9d77fcc4520a65b4936

    SHA1

    f4631b5f768bfa33063a96c7a0da478c1fb28791

    SHA256

    c6843974e37a7eb67c2e6550cec7ffd63645d80f4bd9613430e5824b4604b08b

    SHA512

    a51876207191e351f955e614be727f9b0141cce69d46f7bbf141a632306fe277de3372848c5b707da525d22bafca044b0a73c544a2a670d4056d33f37f7b328c

  • C:\Users\Admin\AppData\Local\Temp\7zS4AA8.tmp\HP2Qn1YkPerS9V.x64.dll
    Filesize

    879KB

    MD5

    f60a9be9218f7d3c329205bd4f585ee7

    SHA1

    8b31e1d5b92ff6642cc5fb707ec76596ce84002c

    SHA256

    7b08c02a0b7315c5b860b594d6486f85a8c182a1851313e1a6299810b896d394

    SHA512

    a6a18d63220f92f80881aaf5f7ed936d7e317a50fe2fc0452f5b3c6793b5b6ffac782366c65d91d7cad1b5a68149f5fa9cd82cf57ba0208ea271c792bddee6a7

  • C:\Users\Admin\AppData\Local\Temp\7zS4AA8.tmp\IB9VGFMzo0f3Y0s.dat
    Filesize

    6KB

    MD5

    15043c54a933a47ecbe74691a725a067

    SHA1

    ed7138f6956c69d574fc3a0e2a2b4704ec12b943

    SHA256

    e9651019e5c7acb762fec8cb1adc4dcbca3f14a1c61fc93e4fd7a65da6e33f58

    SHA512

    844ca5acd54d25d11e6c21d187937ac1bd6efaaf2d1f5975442d39addc36da94b0e11949ac4af0e15a0eb1d7a7b605446fd8e87915fd51a90dea1e51fbdff4d6

  • C:\Users\Admin\AppData\Local\Temp\7zS4AA8.tmp\IB9VGFMzo0f3Y0s.exe
    Filesize

    783KB

    MD5

    e5f19b8f3fa9ba590482ee5d1c7ed005

    SHA1

    e3d599ca32f07024e281f26e764ef09697aba822

    SHA256

    688036044c4521a1841e9fb5a704d505bfc47c4fc80be111e9a321869a56f9b9

    SHA512

    dde4cd947a2820da9a70c584ad136fc87bf68e272e3b5842967580165a602225fcb754966f2f5d3e66db87026c68f61055893b4d2033183ab5b35fe96d4e16ab

  • C:\Users\Admin\AppData\Local\Temp\7zS4AA8.tmp\IB9VGFMzo0f3Y0s.exe
    Filesize

    783KB

    MD5

    e5f19b8f3fa9ba590482ee5d1c7ed005

    SHA1

    e3d599ca32f07024e281f26e764ef09697aba822

    SHA256

    688036044c4521a1841e9fb5a704d505bfc47c4fc80be111e9a321869a56f9b9

    SHA512

    dde4cd947a2820da9a70c584ad136fc87bf68e272e3b5842967580165a602225fcb754966f2f5d3e66db87026c68f61055893b4d2033183ab5b35fe96d4e16ab

  • C:\Users\Admin\AppData\Local\Temp\7zS4AA8.tmp\TDod2z@fzisq.org\bootstrap.js
    Filesize

    2KB

    MD5

    df13f711e20e9c80171846d4f2f7ae06

    SHA1

    56d29cda58427efe0e21d3880d39eb1b0ef60bee

    SHA256

    6c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4

    SHA512

    6c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e

  • C:\Users\Admin\AppData\Local\Temp\7zS4AA8.tmp\TDod2z@fzisq.org\chrome.manifest
    Filesize

    35B

    MD5

    4360c94dbd32d83ceeba974b467691e3

    SHA1

    d14cdbf0654e815d5e88052026f789ed0f4202ec

    SHA256

    10ec6825cefac86d754edb419862203c8f421312b826f55384f7b10e181c0874

    SHA512

    a9a743d8bb4e7a31cfcdbfee3bc54c17c690ad0036a10e70bc0948645aaa06533fa08811e68175844712016ce06e3c198adb2b597b9659994a64bdb889b7e4b3

  • C:\Users\Admin\AppData\Local\Temp\7zS4AA8.tmp\TDod2z@fzisq.org\content\bg.js
    Filesize

    7KB

    MD5

    6f61518d69832e84a5e0d7f092b6e1f1

    SHA1

    c17905482aae59e87dd37735cb44945d6a3a4ecd

    SHA256

    22a6bed609afc0a1438842493e34da6c25fcb4e1da79e4d6ec5711b1a25feaeb

    SHA512

    b3eda127f1d3a3893c212eac6bfcae4c9110497a2c1776d7aa197491e8e62a2acbd90df3d9efe4e03d2463ec8ecc7d63d592687cb7d1cca9a5c271111f83140a

  • C:\Users\Admin\AppData\Local\Temp\7zS4AA8.tmp\TDod2z@fzisq.org\install.rdf
    Filesize

    607B

    MD5

    da8e00cba36c7cb385ce786c5bc7e9a9

    SHA1

    ce96e90fe11fd4d05e2190c24ec36ab3b44e3724

    SHA256

    5cc973d242cdc6cba0b2c485e3587c0734fe14c01cabbcd8fd280e61f98c81e7

    SHA512

    41f6bc966321bc39cd6ac5e627c2f25d51afc9160d94fc782fb207c79e5509a0401eb65416569664fd37b0f629041cbc369b2747651700e7afa1d68c116e48b8

  • C:\Users\Admin\AppData\Local\Temp\7zS4AA8.tmp\lpapcpbhddnipgnoppmdfgidikhnmilo\background.html
    Filesize

    138B

    MD5

    2af9d5094619324a0751dc9935a8102f

    SHA1

    f7d30ceba03e5962f25ab744a4fc4883cc5ab0ce

    SHA256

    c3bfad0de1f1839e951ae1b02a83c052813fa9faf446da7a31481aa62576160a

    SHA512

    b5e6117a93269bf58aaa8dd1383dff6d442184f32be2c146a8f03f6e3b1be6f620cba2e8a4953f265e486fe4c9d3a1e5997433c1e4e2ab913255991668566d8b

  • C:\Users\Admin\AppData\Local\Temp\7zS4AA8.tmp\lpapcpbhddnipgnoppmdfgidikhnmilo\content.js
    Filesize

    144B

    MD5

    fca19198fd8af21016a8b1dec7980002

    SHA1

    fd01a47d14004e17a625efe66cc46a06c786cf40

    SHA256

    332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a

    SHA512

    60f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47

  • C:\Users\Admin\AppData\Local\Temp\7zS4AA8.tmp\lpapcpbhddnipgnoppmdfgidikhnmilo\f.js
    Filesize

    5KB

    MD5

    7d3df737696c5a945cd4277ba5858c52

    SHA1

    3dd55ddda17d92bb8abc42506ae2eced731703a6

    SHA256

    f3fe77bd5ae5eed7f1f2f959372742dc598e22b17cb12fc8276a400d5c4e580c

    SHA512

    9678672f023d8589299ad0f900fcdcd3cc0cc0b5de3d0fb4827388bfb5d0134c919120298899ae1756fac27b920ff302642a49fef3bacc818f900711d93d08a5

  • C:\Users\Admin\AppData\Local\Temp\7zS4AA8.tmp\lpapcpbhddnipgnoppmdfgidikhnmilo\lsdb.js
    Filesize

    531B

    MD5

    36d98318ab2b3b2585a30984db328afb

    SHA1

    f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5

    SHA256

    ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7

    SHA512

    6f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a

  • C:\Users\Admin\AppData\Local\Temp\7zS4AA8.tmp\lpapcpbhddnipgnoppmdfgidikhnmilo\manifest.json
    Filesize

    507B

    MD5

    d429395a45a9aa09e4ee9054e9196b30

    SHA1

    c5dbab4e27650b07d4d159c305d08a9d578c3a3e

    SHA256

    674fc32cde82ed69cb8595bbea9f70f69097062c39bd6a3a505227a4f4a45344

    SHA512

    4a5bc7c005e573bf0cdb89489d676fb26c5fe116d397a6cd7a1ebb2cae9605b3d1657378e17d354cb102e93c39b32fa8d2963f375af37c871452f3170356101e

  • \Program Files (x86)\YoutubeAdBlocke\HP2Qn1YkPerS9V.dll
    Filesize

    741KB

    MD5

    02955857b45fa9ddd4229b9d67f65d93

    SHA1

    a5fe5c71d62bd9648ab25660d7cae6eff98af3ed

    SHA256

    839e59c1dd9fa6ce4ed8b4b964b32a3afdd5b6b621580c47cdad754868abe753

    SHA512

    0b0c6a7754abead8aec777a1ee4330f4c5ee90aebde30266e6ad93f356f91abbe4a2bc3fdc924556edb82c3b4bd0f97191e72d6039bed14975d5e5b940af3261

  • \Program Files (x86)\YoutubeAdBlocke\HP2Qn1YkPerS9V.x64.dll
    Filesize

    879KB

    MD5

    f60a9be9218f7d3c329205bd4f585ee7

    SHA1

    8b31e1d5b92ff6642cc5fb707ec76596ce84002c

    SHA256

    7b08c02a0b7315c5b860b594d6486f85a8c182a1851313e1a6299810b896d394

    SHA512

    a6a18d63220f92f80881aaf5f7ed936d7e317a50fe2fc0452f5b3c6793b5b6ffac782366c65d91d7cad1b5a68149f5fa9cd82cf57ba0208ea271c792bddee6a7

  • \Program Files (x86)\YoutubeAdBlocke\HP2Qn1YkPerS9V.x64.dll
    Filesize

    879KB

    MD5

    f60a9be9218f7d3c329205bd4f585ee7

    SHA1

    8b31e1d5b92ff6642cc5fb707ec76596ce84002c

    SHA256

    7b08c02a0b7315c5b860b594d6486f85a8c182a1851313e1a6299810b896d394

    SHA512

    a6a18d63220f92f80881aaf5f7ed936d7e317a50fe2fc0452f5b3c6793b5b6ffac782366c65d91d7cad1b5a68149f5fa9cd82cf57ba0208ea271c792bddee6a7

  • \Users\Admin\AppData\Local\Temp\7zS4AA8.tmp\IB9VGFMzo0f3Y0s.exe
    Filesize

    783KB

    MD5

    e5f19b8f3fa9ba590482ee5d1c7ed005

    SHA1

    e3d599ca32f07024e281f26e764ef09697aba822

    SHA256

    688036044c4521a1841e9fb5a704d505bfc47c4fc80be111e9a321869a56f9b9

    SHA512

    dde4cd947a2820da9a70c584ad136fc87bf68e272e3b5842967580165a602225fcb754966f2f5d3e66db87026c68f61055893b4d2033183ab5b35fe96d4e16ab

  • memory/340-56-0x0000000000000000-mapping.dmp
  • memory/1516-54-0x0000000076161000-0x0000000076163000-memory.dmp
    Filesize

    8KB

  • memory/1644-73-0x0000000000000000-mapping.dmp
  • memory/1744-77-0x0000000000000000-mapping.dmp
  • memory/1744-78-0x000007FEFBC61000-0x000007FEFBC63000-memory.dmp
    Filesize

    8KB