Analysis
-
max time kernel
36s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 19:48
Static task
static1
Behavioral task
behavioral1
Sample
c0817f3dc80d3f693f5d7280d30ed7f7fcf8087aee715982a1f9fc259b681896.exe
Resource
win7-20220812-en
General
-
Target
c0817f3dc80d3f693f5d7280d30ed7f7fcf8087aee715982a1f9fc259b681896.exe
-
Size
2.5MB
-
MD5
1400928994f84ba4ba3a5b2b2c212b2c
-
SHA1
10325cf989b6142dd1eb6653793e2b3ced2bd665
-
SHA256
c0817f3dc80d3f693f5d7280d30ed7f7fcf8087aee715982a1f9fc259b681896
-
SHA512
24b5aa7a38268465a7b6071904790e40c5bb8407f3eca467eeed0be545bc574962f1d1df7cfef032b308325e099ff23a1ebe21fe8f6311a40b13d7189f451cac
-
SSDEEP
49152:h1OsoyDFXmj+BHBALGk7GNIgSDjjQkzYznJKOZaB/IsxY:h1Od0JSqALGkqaDj7Y
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
SZ3v5EhvKb0LvpL.exepid process 1580 SZ3v5EhvKb0LvpL.exe -
Loads dropped DLL 4 IoCs
Processes:
c0817f3dc80d3f693f5d7280d30ed7f7fcf8087aee715982a1f9fc259b681896.exeSZ3v5EhvKb0LvpL.exeregsvr32.exeregsvr32.exepid process 1672 c0817f3dc80d3f693f5d7280d30ed7f7fcf8087aee715982a1f9fc259b681896.exe 1580 SZ3v5EhvKb0LvpL.exe 1652 regsvr32.exe 960 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 3 IoCs
Processes:
SZ3v5EhvKb0LvpL.exedescription ioc process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\nijcbdhklnbdjacnmijbdklhnjgekpjo\1.0\manifest.json SZ3v5EhvKb0LvpL.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\nijcbdhklnbdjacnmijbdklhnjgekpjo\1.0\manifest.json SZ3v5EhvKb0LvpL.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\nijcbdhklnbdjacnmijbdklhnjgekpjo\1.0\manifest.json SZ3v5EhvKb0LvpL.exe -
Installs/modifies Browser Helper Object 2 TTPs 11 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
SZ3v5EhvKb0LvpL.exeregsvr32.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} SZ3v5EhvKb0LvpL.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\ SZ3v5EhvKb0LvpL.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} SZ3v5EhvKb0LvpL.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects SZ3v5EhvKb0LvpL.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DBC80044-A445-435B-BC74-9C25C1C588A9} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{18DF081C-E8AD-4283-A596-FA578C2EBDC3} SZ3v5EhvKb0LvpL.exe -
Drops file in Program Files directory 8 IoCs
Processes:
SZ3v5EhvKb0LvpL.exedescription ioc process File created C:\Program Files (x86)\YoutubeAdBlocke\r1D4JwjU8FbFPC.dat SZ3v5EhvKb0LvpL.exe File opened for modification C:\Program Files (x86)\YoutubeAdBlocke\r1D4JwjU8FbFPC.dat SZ3v5EhvKb0LvpL.exe File created C:\Program Files (x86)\YoutubeAdBlocke\r1D4JwjU8FbFPC.x64.dll SZ3v5EhvKb0LvpL.exe File opened for modification C:\Program Files (x86)\YoutubeAdBlocke\r1D4JwjU8FbFPC.x64.dll SZ3v5EhvKb0LvpL.exe File created C:\Program Files (x86)\YoutubeAdBlocke\r1D4JwjU8FbFPC.dll SZ3v5EhvKb0LvpL.exe File opened for modification C:\Program Files (x86)\YoutubeAdBlocke\r1D4JwjU8FbFPC.dll SZ3v5EhvKb0LvpL.exe File created C:\Program Files (x86)\YoutubeAdBlocke\r1D4JwjU8FbFPC.tlb SZ3v5EhvKb0LvpL.exe File opened for modification C:\Program Files (x86)\YoutubeAdBlocke\r1D4JwjU8FbFPC.tlb SZ3v5EhvKb0LvpL.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
SZ3v5EhvKb0LvpL.exepid process 1580 SZ3v5EhvKb0LvpL.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
c0817f3dc80d3f693f5d7280d30ed7f7fcf8087aee715982a1f9fc259b681896.exeSZ3v5EhvKb0LvpL.exeregsvr32.exedescription pid process target process PID 1672 wrote to memory of 1580 1672 c0817f3dc80d3f693f5d7280d30ed7f7fcf8087aee715982a1f9fc259b681896.exe SZ3v5EhvKb0LvpL.exe PID 1672 wrote to memory of 1580 1672 c0817f3dc80d3f693f5d7280d30ed7f7fcf8087aee715982a1f9fc259b681896.exe SZ3v5EhvKb0LvpL.exe PID 1672 wrote to memory of 1580 1672 c0817f3dc80d3f693f5d7280d30ed7f7fcf8087aee715982a1f9fc259b681896.exe SZ3v5EhvKb0LvpL.exe PID 1672 wrote to memory of 1580 1672 c0817f3dc80d3f693f5d7280d30ed7f7fcf8087aee715982a1f9fc259b681896.exe SZ3v5EhvKb0LvpL.exe PID 1580 wrote to memory of 1652 1580 SZ3v5EhvKb0LvpL.exe regsvr32.exe PID 1580 wrote to memory of 1652 1580 SZ3v5EhvKb0LvpL.exe regsvr32.exe PID 1580 wrote to memory of 1652 1580 SZ3v5EhvKb0LvpL.exe regsvr32.exe PID 1580 wrote to memory of 1652 1580 SZ3v5EhvKb0LvpL.exe regsvr32.exe PID 1580 wrote to memory of 1652 1580 SZ3v5EhvKb0LvpL.exe regsvr32.exe PID 1580 wrote to memory of 1652 1580 SZ3v5EhvKb0LvpL.exe regsvr32.exe PID 1580 wrote to memory of 1652 1580 SZ3v5EhvKb0LvpL.exe regsvr32.exe PID 1652 wrote to memory of 960 1652 regsvr32.exe regsvr32.exe PID 1652 wrote to memory of 960 1652 regsvr32.exe regsvr32.exe PID 1652 wrote to memory of 960 1652 regsvr32.exe regsvr32.exe PID 1652 wrote to memory of 960 1652 regsvr32.exe regsvr32.exe PID 1652 wrote to memory of 960 1652 regsvr32.exe regsvr32.exe PID 1652 wrote to memory of 960 1652 regsvr32.exe regsvr32.exe PID 1652 wrote to memory of 960 1652 regsvr32.exe regsvr32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0817f3dc80d3f693f5d7280d30ed7f7fcf8087aee715982a1f9fc259b681896.exe"C:\Users\Admin\AppData\Local\Temp\c0817f3dc80d3f693f5d7280d30ed7f7fcf8087aee715982a1f9fc259b681896.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\7zS3D9D.tmp\SZ3v5EhvKb0LvpL.exe.\SZ3v5EhvKb0LvpL.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\YoutubeAdBlocke\r1D4JwjU8FbFPC.x64.dll"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\YoutubeAdBlocke\r1D4JwjU8FbFPC.x64.dll"4⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
PID:960
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5aa9ee923ba3c449442c06bb52b045757
SHA1e3befe5dbb00f1e8f6773ffe7e73dd7433cad2e1
SHA2561035aae9f414a1eb4ddbfdc982bea0f494b2bd5517d2c19f4f408decdba7d985
SHA51218824cf6cf0932a41c7ebf5c2027e7dd569084784ef7e118be94d0261a5c7ae4e4bb826d42993c2c5d941af85a18f6956e693cc008929f115bbf5dffd07397c7
-
Filesize
886KB
MD5eadda36c5638e64e055ca60e50caf427
SHA1822ae0491b2897790cb3e10920836e2ea40696e1
SHA256419d87b1e4cfdb1e6fc4bbaa8c05bdeec5bb2c1afe87544fe78aa875013a9cff
SHA51260fc2b64a30a972adfa94cfdd308887c590a8c15bc90b0a55692a860c6ca15cfe3fc7237102d7860bfd65764d479d37e62f0b09f94b4e3c76463821c6148cbb2
-
C:\Users\Admin\AppData\Local\Temp\7zS3D9D.tmp\[email protected]\bootstrap.js
Filesize2KB
MD5df13f711e20e9c80171846d4f2f7ae06
SHA156d29cda58427efe0e21d3880d39eb1b0ef60bee
SHA2566c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4
SHA5126c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e
-
C:\Users\Admin\AppData\Local\Temp\7zS3D9D.tmp\[email protected]\chrome.manifest
Filesize35B
MD5374051af7340747b7f7267841f479265
SHA13609a2d6aeb83810d80bfaf0c041967eb6af802f
SHA25645f512a83e9d2980922faecf4de640410b4cfa38b331d04a7fa2ffc430e2671a
SHA512fb9f86c4bdece489c575b6237e271e6afa6fa6c371ace083d59881ee83189a120d564579c5fd3a9bf9874b8a22f65ed58b8f1e9003585e4a8d8304f866a331ac
-
C:\Users\Admin\AppData\Local\Temp\7zS3D9D.tmp\[email protected]\content\bg.js
Filesize7KB
MD5f8e9dce317660d7f2fa5116aec28ca29
SHA11e5de21721974dd5ecb0da3a963106203ce8d780
SHA256cf2a53a7fe7880ef7d39e2250a6a75039eb94453f1d1cf25b887751a4a87fdee
SHA512c3b86ef5ef8a67f107931ba80dacf4e349384b3d298e9d1b08edc161c11d344d4861f27b4cdf658ba0d05b9ba653fcd896f85c277ce3e4779d0ae34569693e46
-
C:\Users\Admin\AppData\Local\Temp\7zS3D9D.tmp\[email protected]\install.rdf
Filesize607B
MD5d62c2966c9bb058a0e11b60fe69dcbfc
SHA1b7260c088416784d345b2dd06ed07a14954e0230
SHA2562f7fa0a5c05d059c4c2c502d73f8de9537c3ce6b93acb61113e2ec22b9236af5
SHA512b68bd337add7f240f8c0200e8f66d05dd0b92328232f921549778a1079b8a33df602892661af7881212bc3483fe1fdd2c5d2e7d5c76495f5788063bbf9126fc5
-
Filesize
6KB
MD5aa9ee923ba3c449442c06bb52b045757
SHA1e3befe5dbb00f1e8f6773ffe7e73dd7433cad2e1
SHA2561035aae9f414a1eb4ddbfdc982bea0f494b2bd5517d2c19f4f408decdba7d985
SHA51218824cf6cf0932a41c7ebf5c2027e7dd569084784ef7e118be94d0261a5c7ae4e4bb826d42993c2c5d941af85a18f6956e693cc008929f115bbf5dffd07397c7
-
Filesize
769KB
MD5926d03f373e2f0d6ecf16e30c941ad60
SHA1b5caf80c04b62525774f66262ce6b1ebeaa19315
SHA256b14f3bb56383bbb14a4341fd60674a9fc62505a69413ec25b9ff8dade8c63847
SHA5126aa4ade944470239569b56f7556df747c92218051a540e4d86006510cdee374718c7facc0f6089b5027b08aa728fc98538799d65343aef608ed91a704105a4a0
-
Filesize
769KB
MD5926d03f373e2f0d6ecf16e30c941ad60
SHA1b5caf80c04b62525774f66262ce6b1ebeaa19315
SHA256b14f3bb56383bbb14a4341fd60674a9fc62505a69413ec25b9ff8dade8c63847
SHA5126aa4ade944470239569b56f7556df747c92218051a540e4d86006510cdee374718c7facc0f6089b5027b08aa728fc98538799d65343aef608ed91a704105a4a0
-
Filesize
5KB
MD5fe92f391f09100b89a492fa0abce4f24
SHA17574bcdcd635904dbca18c44c286426cf3c9401b
SHA2563972f29323c516cb3bc161849ef7f03db2eef8a09a4ae20c8dd1153f6110cce1
SHA5122a40ee1034e998751c831700573b98c71b03aa77651d0401c05580a72c2fb30ffb0d7fab81f04bf19f2e1299405b7d66c2bee8c6fa90adb5503c4cbe5e450b5a
-
Filesize
144B
MD5a71e3bbcc2d9b1eb50df015a0232702c
SHA146a07b0d9c63450e3a6498799b583795bde9eb2c
SHA2566c37ff2020d06c3c0cdf3bed6e14e29c1b95ad94db8733032756885fb06969fd
SHA5123ddb4dcd2025cbae010558ef6726ca066c1846e8fe49a30e543b6e53cbd5d863cd0d17e4bbe53b5398ee10d12d219c375583367844b40998abcfa422c8f23629
-
Filesize
144B
MD5fca19198fd8af21016a8b1dec7980002
SHA1fd01a47d14004e17a625efe66cc46a06c786cf40
SHA256332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a
SHA51260f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47
-
Filesize
531B
MD536d98318ab2b3b2585a30984db328afb
SHA1f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5
SHA256ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7
SHA5126f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a
-
Filesize
507B
MD5d429395a45a9aa09e4ee9054e9196b30
SHA1c5dbab4e27650b07d4d159c305d08a9d578c3a3e
SHA256674fc32cde82ed69cb8595bbea9f70f69097062c39bd6a3a505227a4f4a45344
SHA5124a5bc7c005e573bf0cdb89489d676fb26c5fe116d397a6cd7a1ebb2cae9605b3d1657378e17d354cb102e93c39b32fa8d2963f375af37c871452f3170356101e
-
Filesize
749KB
MD505636af3aa9a36a4a1df7560231b520c
SHA194b0fb3246f9d757a44cc80401bab6720f7f5fb3
SHA2562c8c222a335b7872c49a0a0185d5cbf29481c8364e1d5d822afa532cfa77ee10
SHA512e8d8e47faf9d357cfae6c8e515426787111b2c4602390d7cc1eda04485a436ca7013c89061887fe45da2566c5dd2e1e04599af270062379b37444985d1f1d07c
-
Filesize
3KB
MD5aafd1d71b2778cd2369e1a2d7e7166d1
SHA1f6505a389d7e2be9d3ccc3ea4e052abc338fcbb5
SHA256b3772533d10176e84e6b87269bb0ab4dd783f34baa17eb2a7ad42078a2203e1c
SHA512df4ef691872946fb4bfebc6ce3699f56fc4c5846c1a8de6b16296717ef4f41b8e5b32c43e8dd56fe46731a91da93684889e78d42a92fa37eb38622d1d71353a0
-
Filesize
886KB
MD5eadda36c5638e64e055ca60e50caf427
SHA1822ae0491b2897790cb3e10920836e2ea40696e1
SHA256419d87b1e4cfdb1e6fc4bbaa8c05bdeec5bb2c1afe87544fe78aa875013a9cff
SHA51260fc2b64a30a972adfa94cfdd308887c590a8c15bc90b0a55692a860c6ca15cfe3fc7237102d7860bfd65764d479d37e62f0b09f94b4e3c76463821c6148cbb2
-
Filesize
749KB
MD505636af3aa9a36a4a1df7560231b520c
SHA194b0fb3246f9d757a44cc80401bab6720f7f5fb3
SHA2562c8c222a335b7872c49a0a0185d5cbf29481c8364e1d5d822afa532cfa77ee10
SHA512e8d8e47faf9d357cfae6c8e515426787111b2c4602390d7cc1eda04485a436ca7013c89061887fe45da2566c5dd2e1e04599af270062379b37444985d1f1d07c
-
Filesize
886KB
MD5eadda36c5638e64e055ca60e50caf427
SHA1822ae0491b2897790cb3e10920836e2ea40696e1
SHA256419d87b1e4cfdb1e6fc4bbaa8c05bdeec5bb2c1afe87544fe78aa875013a9cff
SHA51260fc2b64a30a972adfa94cfdd308887c590a8c15bc90b0a55692a860c6ca15cfe3fc7237102d7860bfd65764d479d37e62f0b09f94b4e3c76463821c6148cbb2
-
Filesize
886KB
MD5eadda36c5638e64e055ca60e50caf427
SHA1822ae0491b2897790cb3e10920836e2ea40696e1
SHA256419d87b1e4cfdb1e6fc4bbaa8c05bdeec5bb2c1afe87544fe78aa875013a9cff
SHA51260fc2b64a30a972adfa94cfdd308887c590a8c15bc90b0a55692a860c6ca15cfe3fc7237102d7860bfd65764d479d37e62f0b09f94b4e3c76463821c6148cbb2
-
Filesize
769KB
MD5926d03f373e2f0d6ecf16e30c941ad60
SHA1b5caf80c04b62525774f66262ce6b1ebeaa19315
SHA256b14f3bb56383bbb14a4341fd60674a9fc62505a69413ec25b9ff8dade8c63847
SHA5126aa4ade944470239569b56f7556df747c92218051a540e4d86006510cdee374718c7facc0f6089b5027b08aa728fc98538799d65343aef608ed91a704105a4a0