Analysis

  • max time kernel
    36s
  • max time network
    41s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 19:48

General

  • Target

    c0817f3dc80d3f693f5d7280d30ed7f7fcf8087aee715982a1f9fc259b681896.exe

  • Size

    2.5MB

  • MD5

    1400928994f84ba4ba3a5b2b2c212b2c

  • SHA1

    10325cf989b6142dd1eb6653793e2b3ced2bd665

  • SHA256

    c0817f3dc80d3f693f5d7280d30ed7f7fcf8087aee715982a1f9fc259b681896

  • SHA512

    24b5aa7a38268465a7b6071904790e40c5bb8407f3eca467eeed0be545bc574962f1d1df7cfef032b308325e099ff23a1ebe21fe8f6311a40b13d7189f451cac

  • SSDEEP

    49152:h1OsoyDFXmj+BHBALGk7GNIgSDjjQkzYznJKOZaB/IsxY:h1Od0JSqALGkqaDj7Y

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 3 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 11 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c0817f3dc80d3f693f5d7280d30ed7f7fcf8087aee715982a1f9fc259b681896.exe
    "C:\Users\Admin\AppData\Local\Temp\c0817f3dc80d3f693f5d7280d30ed7f7fcf8087aee715982a1f9fc259b681896.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1672
    • C:\Users\Admin\AppData\Local\Temp\7zS3D9D.tmp\SZ3v5EhvKb0LvpL.exe
      .\SZ3v5EhvKb0LvpL.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops Chrome extension
      • Installs/modifies Browser Helper Object
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1580
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32.exe /s "C:\Program Files (x86)\YoutubeAdBlocke\r1D4JwjU8FbFPC.x64.dll"
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1652
        • C:\Windows\system32\regsvr32.exe
          /s "C:\Program Files (x86)\YoutubeAdBlocke\r1D4JwjU8FbFPC.x64.dll"
          4⤵
          • Loads dropped DLL
          • Installs/modifies Browser Helper Object
          PID:960

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Browser Extensions

1
T1176

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\YoutubeAdBlocke\r1D4JwjU8FbFPC.dat
    Filesize

    6KB

    MD5

    aa9ee923ba3c449442c06bb52b045757

    SHA1

    e3befe5dbb00f1e8f6773ffe7e73dd7433cad2e1

    SHA256

    1035aae9f414a1eb4ddbfdc982bea0f494b2bd5517d2c19f4f408decdba7d985

    SHA512

    18824cf6cf0932a41c7ebf5c2027e7dd569084784ef7e118be94d0261a5c7ae4e4bb826d42993c2c5d941af85a18f6956e693cc008929f115bbf5dffd07397c7

  • C:\Program Files (x86)\YoutubeAdBlocke\r1D4JwjU8FbFPC.x64.dll
    Filesize

    886KB

    MD5

    eadda36c5638e64e055ca60e50caf427

    SHA1

    822ae0491b2897790cb3e10920836e2ea40696e1

    SHA256

    419d87b1e4cfdb1e6fc4bbaa8c05bdeec5bb2c1afe87544fe78aa875013a9cff

    SHA512

    60fc2b64a30a972adfa94cfdd308887c590a8c15bc90b0a55692a860c6ca15cfe3fc7237102d7860bfd65764d479d37e62f0b09f94b4e3c76463821c6148cbb2

  • C:\Users\Admin\AppData\Local\Temp\7zS3D9D.tmp\[email protected]\bootstrap.js
    Filesize

    2KB

    MD5

    df13f711e20e9c80171846d4f2f7ae06

    SHA1

    56d29cda58427efe0e21d3880d39eb1b0ef60bee

    SHA256

    6c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4

    SHA512

    6c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e

  • C:\Users\Admin\AppData\Local\Temp\7zS3D9D.tmp\[email protected]\chrome.manifest
    Filesize

    35B

    MD5

    374051af7340747b7f7267841f479265

    SHA1

    3609a2d6aeb83810d80bfaf0c041967eb6af802f

    SHA256

    45f512a83e9d2980922faecf4de640410b4cfa38b331d04a7fa2ffc430e2671a

    SHA512

    fb9f86c4bdece489c575b6237e271e6afa6fa6c371ace083d59881ee83189a120d564579c5fd3a9bf9874b8a22f65ed58b8f1e9003585e4a8d8304f866a331ac

  • C:\Users\Admin\AppData\Local\Temp\7zS3D9D.tmp\[email protected]\content\bg.js
    Filesize

    7KB

    MD5

    f8e9dce317660d7f2fa5116aec28ca29

    SHA1

    1e5de21721974dd5ecb0da3a963106203ce8d780

    SHA256

    cf2a53a7fe7880ef7d39e2250a6a75039eb94453f1d1cf25b887751a4a87fdee

    SHA512

    c3b86ef5ef8a67f107931ba80dacf4e349384b3d298e9d1b08edc161c11d344d4861f27b4cdf658ba0d05b9ba653fcd896f85c277ce3e4779d0ae34569693e46

  • C:\Users\Admin\AppData\Local\Temp\7zS3D9D.tmp\[email protected]\install.rdf
    Filesize

    607B

    MD5

    d62c2966c9bb058a0e11b60fe69dcbfc

    SHA1

    b7260c088416784d345b2dd06ed07a14954e0230

    SHA256

    2f7fa0a5c05d059c4c2c502d73f8de9537c3ce6b93acb61113e2ec22b9236af5

    SHA512

    b68bd337add7f240f8c0200e8f66d05dd0b92328232f921549778a1079b8a33df602892661af7881212bc3483fe1fdd2c5d2e7d5c76495f5788063bbf9126fc5

  • C:\Users\Admin\AppData\Local\Temp\7zS3D9D.tmp\SZ3v5EhvKb0LvpL.dat
    Filesize

    6KB

    MD5

    aa9ee923ba3c449442c06bb52b045757

    SHA1

    e3befe5dbb00f1e8f6773ffe7e73dd7433cad2e1

    SHA256

    1035aae9f414a1eb4ddbfdc982bea0f494b2bd5517d2c19f4f408decdba7d985

    SHA512

    18824cf6cf0932a41c7ebf5c2027e7dd569084784ef7e118be94d0261a5c7ae4e4bb826d42993c2c5d941af85a18f6956e693cc008929f115bbf5dffd07397c7

  • C:\Users\Admin\AppData\Local\Temp\7zS3D9D.tmp\SZ3v5EhvKb0LvpL.exe
    Filesize

    769KB

    MD5

    926d03f373e2f0d6ecf16e30c941ad60

    SHA1

    b5caf80c04b62525774f66262ce6b1ebeaa19315

    SHA256

    b14f3bb56383bbb14a4341fd60674a9fc62505a69413ec25b9ff8dade8c63847

    SHA512

    6aa4ade944470239569b56f7556df747c92218051a540e4d86006510cdee374718c7facc0f6089b5027b08aa728fc98538799d65343aef608ed91a704105a4a0

  • C:\Users\Admin\AppData\Local\Temp\7zS3D9D.tmp\SZ3v5EhvKb0LvpL.exe
    Filesize

    769KB

    MD5

    926d03f373e2f0d6ecf16e30c941ad60

    SHA1

    b5caf80c04b62525774f66262ce6b1ebeaa19315

    SHA256

    b14f3bb56383bbb14a4341fd60674a9fc62505a69413ec25b9ff8dade8c63847

    SHA512

    6aa4ade944470239569b56f7556df747c92218051a540e4d86006510cdee374718c7facc0f6089b5027b08aa728fc98538799d65343aef608ed91a704105a4a0

  • C:\Users\Admin\AppData\Local\Temp\7zS3D9D.tmp\nijcbdhklnbdjacnmijbdklhnjgekpjo\aa07nqg.js
    Filesize

    5KB

    MD5

    fe92f391f09100b89a492fa0abce4f24

    SHA1

    7574bcdcd635904dbca18c44c286426cf3c9401b

    SHA256

    3972f29323c516cb3bc161849ef7f03db2eef8a09a4ae20c8dd1153f6110cce1

    SHA512

    2a40ee1034e998751c831700573b98c71b03aa77651d0401c05580a72c2fb30ffb0d7fab81f04bf19f2e1299405b7d66c2bee8c6fa90adb5503c4cbe5e450b5a

  • C:\Users\Admin\AppData\Local\Temp\7zS3D9D.tmp\nijcbdhklnbdjacnmijbdklhnjgekpjo\background.html
    Filesize

    144B

    MD5

    a71e3bbcc2d9b1eb50df015a0232702c

    SHA1

    46a07b0d9c63450e3a6498799b583795bde9eb2c

    SHA256

    6c37ff2020d06c3c0cdf3bed6e14e29c1b95ad94db8733032756885fb06969fd

    SHA512

    3ddb4dcd2025cbae010558ef6726ca066c1846e8fe49a30e543b6e53cbd5d863cd0d17e4bbe53b5398ee10d12d219c375583367844b40998abcfa422c8f23629

  • C:\Users\Admin\AppData\Local\Temp\7zS3D9D.tmp\nijcbdhklnbdjacnmijbdklhnjgekpjo\content.js
    Filesize

    144B

    MD5

    fca19198fd8af21016a8b1dec7980002

    SHA1

    fd01a47d14004e17a625efe66cc46a06c786cf40

    SHA256

    332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a

    SHA512

    60f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47

  • C:\Users\Admin\AppData\Local\Temp\7zS3D9D.tmp\nijcbdhklnbdjacnmijbdklhnjgekpjo\lsdb.js
    Filesize

    531B

    MD5

    36d98318ab2b3b2585a30984db328afb

    SHA1

    f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5

    SHA256

    ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7

    SHA512

    6f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a

  • C:\Users\Admin\AppData\Local\Temp\7zS3D9D.tmp\nijcbdhklnbdjacnmijbdklhnjgekpjo\manifest.json
    Filesize

    507B

    MD5

    d429395a45a9aa09e4ee9054e9196b30

    SHA1

    c5dbab4e27650b07d4d159c305d08a9d578c3a3e

    SHA256

    674fc32cde82ed69cb8595bbea9f70f69097062c39bd6a3a505227a4f4a45344

    SHA512

    4a5bc7c005e573bf0cdb89489d676fb26c5fe116d397a6cd7a1ebb2cae9605b3d1657378e17d354cb102e93c39b32fa8d2963f375af37c871452f3170356101e

  • C:\Users\Admin\AppData\Local\Temp\7zS3D9D.tmp\r1D4JwjU8FbFPC.dll
    Filesize

    749KB

    MD5

    05636af3aa9a36a4a1df7560231b520c

    SHA1

    94b0fb3246f9d757a44cc80401bab6720f7f5fb3

    SHA256

    2c8c222a335b7872c49a0a0185d5cbf29481c8364e1d5d822afa532cfa77ee10

    SHA512

    e8d8e47faf9d357cfae6c8e515426787111b2c4602390d7cc1eda04485a436ca7013c89061887fe45da2566c5dd2e1e04599af270062379b37444985d1f1d07c

  • C:\Users\Admin\AppData\Local\Temp\7zS3D9D.tmp\r1D4JwjU8FbFPC.tlb
    Filesize

    3KB

    MD5

    aafd1d71b2778cd2369e1a2d7e7166d1

    SHA1

    f6505a389d7e2be9d3ccc3ea4e052abc338fcbb5

    SHA256

    b3772533d10176e84e6b87269bb0ab4dd783f34baa17eb2a7ad42078a2203e1c

    SHA512

    df4ef691872946fb4bfebc6ce3699f56fc4c5846c1a8de6b16296717ef4f41b8e5b32c43e8dd56fe46731a91da93684889e78d42a92fa37eb38622d1d71353a0

  • C:\Users\Admin\AppData\Local\Temp\7zS3D9D.tmp\r1D4JwjU8FbFPC.x64.dll
    Filesize

    886KB

    MD5

    eadda36c5638e64e055ca60e50caf427

    SHA1

    822ae0491b2897790cb3e10920836e2ea40696e1

    SHA256

    419d87b1e4cfdb1e6fc4bbaa8c05bdeec5bb2c1afe87544fe78aa875013a9cff

    SHA512

    60fc2b64a30a972adfa94cfdd308887c590a8c15bc90b0a55692a860c6ca15cfe3fc7237102d7860bfd65764d479d37e62f0b09f94b4e3c76463821c6148cbb2

  • \Program Files (x86)\YoutubeAdBlocke\r1D4JwjU8FbFPC.dll
    Filesize

    749KB

    MD5

    05636af3aa9a36a4a1df7560231b520c

    SHA1

    94b0fb3246f9d757a44cc80401bab6720f7f5fb3

    SHA256

    2c8c222a335b7872c49a0a0185d5cbf29481c8364e1d5d822afa532cfa77ee10

    SHA512

    e8d8e47faf9d357cfae6c8e515426787111b2c4602390d7cc1eda04485a436ca7013c89061887fe45da2566c5dd2e1e04599af270062379b37444985d1f1d07c

  • \Program Files (x86)\YoutubeAdBlocke\r1D4JwjU8FbFPC.x64.dll
    Filesize

    886KB

    MD5

    eadda36c5638e64e055ca60e50caf427

    SHA1

    822ae0491b2897790cb3e10920836e2ea40696e1

    SHA256

    419d87b1e4cfdb1e6fc4bbaa8c05bdeec5bb2c1afe87544fe78aa875013a9cff

    SHA512

    60fc2b64a30a972adfa94cfdd308887c590a8c15bc90b0a55692a860c6ca15cfe3fc7237102d7860bfd65764d479d37e62f0b09f94b4e3c76463821c6148cbb2

  • \Program Files (x86)\YoutubeAdBlocke\r1D4JwjU8FbFPC.x64.dll
    Filesize

    886KB

    MD5

    eadda36c5638e64e055ca60e50caf427

    SHA1

    822ae0491b2897790cb3e10920836e2ea40696e1

    SHA256

    419d87b1e4cfdb1e6fc4bbaa8c05bdeec5bb2c1afe87544fe78aa875013a9cff

    SHA512

    60fc2b64a30a972adfa94cfdd308887c590a8c15bc90b0a55692a860c6ca15cfe3fc7237102d7860bfd65764d479d37e62f0b09f94b4e3c76463821c6148cbb2

  • \Users\Admin\AppData\Local\Temp\7zS3D9D.tmp\SZ3v5EhvKb0LvpL.exe
    Filesize

    769KB

    MD5

    926d03f373e2f0d6ecf16e30c941ad60

    SHA1

    b5caf80c04b62525774f66262ce6b1ebeaa19315

    SHA256

    b14f3bb56383bbb14a4341fd60674a9fc62505a69413ec25b9ff8dade8c63847

    SHA512

    6aa4ade944470239569b56f7556df747c92218051a540e4d86006510cdee374718c7facc0f6089b5027b08aa728fc98538799d65343aef608ed91a704105a4a0

  • memory/960-77-0x0000000000000000-mapping.dmp
  • memory/960-78-0x000007FEFBC01000-0x000007FEFBC03000-memory.dmp
    Filesize

    8KB

  • memory/1580-56-0x0000000000000000-mapping.dmp
  • memory/1652-73-0x0000000000000000-mapping.dmp
  • memory/1672-54-0x0000000075BD1000-0x0000000075BD3000-memory.dmp
    Filesize

    8KB