Analysis
-
max time kernel
49s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 21:12
Static task
static1
Behavioral task
behavioral1
Sample
a68ee695d9f02800b49fc7f4090aadbc20dd6ec82716774815ba3d4bd051d198.exe
Resource
win7-20221111-en
General
-
Target
a68ee695d9f02800b49fc7f4090aadbc20dd6ec82716774815ba3d4bd051d198.exe
-
Size
2.5MB
-
MD5
5a373c875179051cadbaeed3617b6552
-
SHA1
7efa5b94e0e25290cc23439f095dacd82e2d9400
-
SHA256
a68ee695d9f02800b49fc7f4090aadbc20dd6ec82716774815ba3d4bd051d198
-
SHA512
d6fabab38cad836ed83be07f1e32fecef9ca080fcf8097e595fbadbed64ab4df9cb19e83c7a7728cbd5a4ab32194c51fa5a17ae55f58c04a900f54f5ab56eef7
-
SSDEEP
49152:h1OsKSQeb71DLvFzAqRmyyVchO4apKHcHhXa3FXWlPC1IS5zm:h1OpSQY1DCqkck4apyLqt
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
dti9qAfrVFs4Fal.exepid process 1292 dti9qAfrVFs4Fal.exe -
Loads dropped DLL 4 IoCs
Processes:
a68ee695d9f02800b49fc7f4090aadbc20dd6ec82716774815ba3d4bd051d198.exedti9qAfrVFs4Fal.exeregsvr32.exeregsvr32.exepid process 1968 a68ee695d9f02800b49fc7f4090aadbc20dd6ec82716774815ba3d4bd051d198.exe 1292 dti9qAfrVFs4Fal.exe 704 regsvr32.exe 836 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 3 IoCs
Processes:
dti9qAfrVFs4Fal.exedescription ioc process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\mjcpphpchbdnkomechomjbdonkplehnm\2.0\manifest.json dti9qAfrVFs4Fal.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\mjcpphpchbdnkomechomjbdonkplehnm\2.0\manifest.json dti9qAfrVFs4Fal.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\mjcpphpchbdnkomechomjbdonkplehnm\2.0\manifest.json dti9qAfrVFs4Fal.exe -
Installs/modifies Browser Helper Object 2 TTPs 11 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
dti9qAfrVFs4Fal.exeregsvr32.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} dti9qAfrVFs4Fal.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} dti9qAfrVFs4Fal.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\ dti9qAfrVFs4Fal.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DBC80044-A445-435B-BC74-9C25C1C588A9} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{18DF081C-E8AD-4283-A596-FA578C2EBDC3} dti9qAfrVFs4Fal.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects dti9qAfrVFs4Fal.exe -
Drops file in Program Files directory 8 IoCs
Processes:
dti9qAfrVFs4Fal.exedescription ioc process File created C:\Program Files (x86)\GoSave\9KYxnlsehaWOFk.dll dti9qAfrVFs4Fal.exe File opened for modification C:\Program Files (x86)\GoSave\9KYxnlsehaWOFk.dll dti9qAfrVFs4Fal.exe File created C:\Program Files (x86)\GoSave\9KYxnlsehaWOFk.tlb dti9qAfrVFs4Fal.exe File opened for modification C:\Program Files (x86)\GoSave\9KYxnlsehaWOFk.tlb dti9qAfrVFs4Fal.exe File created C:\Program Files (x86)\GoSave\9KYxnlsehaWOFk.dat dti9qAfrVFs4Fal.exe File opened for modification C:\Program Files (x86)\GoSave\9KYxnlsehaWOFk.dat dti9qAfrVFs4Fal.exe File created C:\Program Files (x86)\GoSave\9KYxnlsehaWOFk.x64.dll dti9qAfrVFs4Fal.exe File opened for modification C:\Program Files (x86)\GoSave\9KYxnlsehaWOFk.x64.dll dti9qAfrVFs4Fal.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
dti9qAfrVFs4Fal.exepid process 1292 dti9qAfrVFs4Fal.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
a68ee695d9f02800b49fc7f4090aadbc20dd6ec82716774815ba3d4bd051d198.exedti9qAfrVFs4Fal.exeregsvr32.exedescription pid process target process PID 1968 wrote to memory of 1292 1968 a68ee695d9f02800b49fc7f4090aadbc20dd6ec82716774815ba3d4bd051d198.exe dti9qAfrVFs4Fal.exe PID 1968 wrote to memory of 1292 1968 a68ee695d9f02800b49fc7f4090aadbc20dd6ec82716774815ba3d4bd051d198.exe dti9qAfrVFs4Fal.exe PID 1968 wrote to memory of 1292 1968 a68ee695d9f02800b49fc7f4090aadbc20dd6ec82716774815ba3d4bd051d198.exe dti9qAfrVFs4Fal.exe PID 1968 wrote to memory of 1292 1968 a68ee695d9f02800b49fc7f4090aadbc20dd6ec82716774815ba3d4bd051d198.exe dti9qAfrVFs4Fal.exe PID 1292 wrote to memory of 704 1292 dti9qAfrVFs4Fal.exe regsvr32.exe PID 1292 wrote to memory of 704 1292 dti9qAfrVFs4Fal.exe regsvr32.exe PID 1292 wrote to memory of 704 1292 dti9qAfrVFs4Fal.exe regsvr32.exe PID 1292 wrote to memory of 704 1292 dti9qAfrVFs4Fal.exe regsvr32.exe PID 1292 wrote to memory of 704 1292 dti9qAfrVFs4Fal.exe regsvr32.exe PID 1292 wrote to memory of 704 1292 dti9qAfrVFs4Fal.exe regsvr32.exe PID 1292 wrote to memory of 704 1292 dti9qAfrVFs4Fal.exe regsvr32.exe PID 704 wrote to memory of 836 704 regsvr32.exe regsvr32.exe PID 704 wrote to memory of 836 704 regsvr32.exe regsvr32.exe PID 704 wrote to memory of 836 704 regsvr32.exe regsvr32.exe PID 704 wrote to memory of 836 704 regsvr32.exe regsvr32.exe PID 704 wrote to memory of 836 704 regsvr32.exe regsvr32.exe PID 704 wrote to memory of 836 704 regsvr32.exe regsvr32.exe PID 704 wrote to memory of 836 704 regsvr32.exe regsvr32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a68ee695d9f02800b49fc7f4090aadbc20dd6ec82716774815ba3d4bd051d198.exe"C:\Users\Admin\AppData\Local\Temp\a68ee695d9f02800b49fc7f4090aadbc20dd6ec82716774815ba3d4bd051d198.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\7zSF603.tmp\dti9qAfrVFs4Fal.exe.\dti9qAfrVFs4Fal.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\GoSave\9KYxnlsehaWOFk.x64.dll"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:704 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\GoSave\9KYxnlsehaWOFk.x64.dll"4⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
PID:836
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5386dbd096324dee7f8b4d9cace61ad88
SHA103a26b9b7a405d577bcf1db5f5314cad753658ed
SHA2560fec18d91a8b755b88a463551ff56b9ecf4b8cd0ffe6b20f2816860f4b7070a8
SHA51295db6cac1f58d630ab2d85625b81e18c4de67c5e513c91cf4c4cddb617077f15ffce311f0e5ad5017979064a01a1fa0ec8e9d02e83d94c1cf9a6bc92992fe584
-
Filesize
886KB
MD51433d7e71196529644716ffc72c261b2
SHA1f35147e7dc56f4e92856061b48c9f7a872e10385
SHA2562ae79c724f8c2a134c125315fc6ee929b7ce09260e80b61c9a9e915571103e3f
SHA512c363a35bd82214350439dcf6aaf9048b29f10aaeb3b1c3a69222792a94fab1009a5f6b6528df102ae082c129cce50ae7d646abc1dbd8ff9e788a9d05828c272c
-
C:\Users\Admin\AppData\Local\Temp\7zSF603.tmp\[email protected]\bootstrap.js
Filesize2KB
MD5df13f711e20e9c80171846d4f2f7ae06
SHA156d29cda58427efe0e21d3880d39eb1b0ef60bee
SHA2566c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4
SHA5126c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e
-
C:\Users\Admin\AppData\Local\Temp\7zSF603.tmp\[email protected]\chrome.manifest
Filesize35B
MD5636a9b8c9edc4932852d03db7f76efb0
SHA1b5203f98ac3df078fdabdeef97d175aff0796e67
SHA256569ee951a5ce40bf6df0c55090e029ceffc070d9877c300a8ae63fb12c48fb53
SHA5124853fea087c8e7e4dc2e184ae313dc1afcaa87f61ed5fd156f41c28d8d927420ddfdb3c8ffbd108323fbd6a676561f91b978000b731e53076844a1266b9e7ec6
-
C:\Users\Admin\AppData\Local\Temp\7zSF603.tmp\[email protected]\content\bg.js
Filesize7KB
MD575d8eb105b993a5200929501ebbcffdd
SHA143be47300fc7dafb8fbb33669cb113d1e6ba3fa6
SHA2564056f18a626ee7af557d6dea19027af22babbde978b200294029d6eb9926d6fa
SHA512e73eb165b4aa8774eaa39410b07f4e09334bc1b65b167f4aec2a80a881f9c08a206fa87af2c16d8ef9f2068434fc1d034f704b0b18d54ef93bb7abb6dccfb4e0
-
C:\Users\Admin\AppData\Local\Temp\7zSF603.tmp\[email protected]\install.rdf
Filesize596B
MD5184021988d3cc237bfc63b7d515d4e72
SHA13a3f45cc076a17c2292cd989a12be281752f3e2b
SHA256688cb6e0cdc1f8c13143109c94bf551973f384c0c552b59d3e9fe3153a362b2d
SHA5124bc4d620695a1ec7cadc4ef57ddbe408d7c2bcdb35d103357ad9fc52d1863d220ef60fa320b531f8344941c9065996143d8b7f5db80a9453ef0882ea0423bc48
-
Filesize
745KB
MD5ce27e078a917088b7459c44570637b9d
SHA14d9e95fc9b97a1f21221f96ea8fbee55132e82b7
SHA2568804ae047c9ba998964a359f278f54fa1d671ed245b7dfe117625f1ce0d5e84f
SHA512492fdacef00a45dfe6d9db9c80b908bd0d9ebb4bf75c1f4053a8e281cfad5279646754a711484709de6f571487276ec19f71552522dc218fba8331bf6358f9ce
-
Filesize
3KB
MD5f636475c74627ddf7b3b6b6dfaa8d491
SHA1fb3a63977f8b0e07f18d313ace3e1f1223dc423b
SHA256e6e330d72d59551c9ba78464c4081280510901a82f66d94c84cc94ca4594e4b2
SHA512ba788afd76700c60fa8d899ea6ebc1c69594b09d9099c7cb4d408e290575c9ed89b0288df1a1ca9f1562564eb65f51f8add17f4c57eea7fe890b38592560fb96
-
Filesize
886KB
MD51433d7e71196529644716ffc72c261b2
SHA1f35147e7dc56f4e92856061b48c9f7a872e10385
SHA2562ae79c724f8c2a134c125315fc6ee929b7ce09260e80b61c9a9e915571103e3f
SHA512c363a35bd82214350439dcf6aaf9048b29f10aaeb3b1c3a69222792a94fab1009a5f6b6528df102ae082c129cce50ae7d646abc1dbd8ff9e788a9d05828c272c
-
Filesize
6KB
MD5386dbd096324dee7f8b4d9cace61ad88
SHA103a26b9b7a405d577bcf1db5f5314cad753658ed
SHA2560fec18d91a8b755b88a463551ff56b9ecf4b8cd0ffe6b20f2816860f4b7070a8
SHA51295db6cac1f58d630ab2d85625b81e18c4de67c5e513c91cf4c4cddb617077f15ffce311f0e5ad5017979064a01a1fa0ec8e9d02e83d94c1cf9a6bc92992fe584
-
Filesize
770KB
MD5b4c30381dd37fea1c1c69bcb3ad48b32
SHA1869eca61396754586f7e85ebf65a334e01856740
SHA25666481ba6d9cbf3c7662fc7cfd867739077256f60f4165f76dfdcd9461500ae50
SHA5121e7bbdd7a75b748ff9a5f70b46766b0108effc84e0cc7c5d8a1f32e56136181060a4363ed2cbd6ed14d195a2379cf8148680380256f31b809bb77d1fe0bf064f
-
Filesize
770KB
MD5b4c30381dd37fea1c1c69bcb3ad48b32
SHA1869eca61396754586f7e85ebf65a334e01856740
SHA25666481ba6d9cbf3c7662fc7cfd867739077256f60f4165f76dfdcd9461500ae50
SHA5121e7bbdd7a75b748ff9a5f70b46766b0108effc84e0cc7c5d8a1f32e56136181060a4363ed2cbd6ed14d195a2379cf8148680380256f31b809bb77d1fe0bf064f
-
Filesize
5KB
MD50cc793cbb1d4fc0c91782bf80be15f6f
SHA17220513eca722831d7e0c09556b92c9c0545342e
SHA2565580fce8f42246d69ef33ebdef4fb4ca974040e565ebad2d7303d7af3d87eaed
SHA512f89076ae8a077458704b18dfb9dae41caf121187c06e267e53ba246d095d2dace5a21d0f809c68e4b34c1408fdd793a3da33c76515a022e7a2fe35c1a936f621
-
Filesize
142B
MD526183b65c97bb21873c0e3a7ee435f42
SHA17b3aa2317e1306cfaeeff9e4d4fca04eef330133
SHA256f57c708b5a55be13a628cd815363dffe574f23950638c1ff3963c534b48d919f
SHA51253df2435dfc8effaa0baad61a62460ee21dc4bd940301960346b6dc02bfc7b5145670f19da21dc8db6604bf761469bfdfa8595cf312cfcc7d36780b32f570e0c
-
Filesize
144B
MD5fca19198fd8af21016a8b1dec7980002
SHA1fd01a47d14004e17a625efe66cc46a06c786cf40
SHA256332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a
SHA51260f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47
-
Filesize
531B
MD536d98318ab2b3b2585a30984db328afb
SHA1f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5
SHA256ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7
SHA5126f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a
-
Filesize
498B
MD5640199ea4621e34510de919f6a54436f
SHA1dc65dbfad02bd2688030bd56ca1cab85917a9937
SHA256e4aa7c089e32d14ddf584e9de6d007ec16581cd30c248ff7284bc0eb7757d4af
SHA512d64bc524d6df7c4c21a5ddfb0e6636317482ef4dc28006bd0a38d5e26c2db75626f216143026bf8acf3baa11d86c278e902c78afad4f806ca36f9e54bc75ff0a
-
Filesize
745KB
MD5ce27e078a917088b7459c44570637b9d
SHA14d9e95fc9b97a1f21221f96ea8fbee55132e82b7
SHA2568804ae047c9ba998964a359f278f54fa1d671ed245b7dfe117625f1ce0d5e84f
SHA512492fdacef00a45dfe6d9db9c80b908bd0d9ebb4bf75c1f4053a8e281cfad5279646754a711484709de6f571487276ec19f71552522dc218fba8331bf6358f9ce
-
Filesize
886KB
MD51433d7e71196529644716ffc72c261b2
SHA1f35147e7dc56f4e92856061b48c9f7a872e10385
SHA2562ae79c724f8c2a134c125315fc6ee929b7ce09260e80b61c9a9e915571103e3f
SHA512c363a35bd82214350439dcf6aaf9048b29f10aaeb3b1c3a69222792a94fab1009a5f6b6528df102ae082c129cce50ae7d646abc1dbd8ff9e788a9d05828c272c
-
Filesize
886KB
MD51433d7e71196529644716ffc72c261b2
SHA1f35147e7dc56f4e92856061b48c9f7a872e10385
SHA2562ae79c724f8c2a134c125315fc6ee929b7ce09260e80b61c9a9e915571103e3f
SHA512c363a35bd82214350439dcf6aaf9048b29f10aaeb3b1c3a69222792a94fab1009a5f6b6528df102ae082c129cce50ae7d646abc1dbd8ff9e788a9d05828c272c
-
Filesize
770KB
MD5b4c30381dd37fea1c1c69bcb3ad48b32
SHA1869eca61396754586f7e85ebf65a334e01856740
SHA25666481ba6d9cbf3c7662fc7cfd867739077256f60f4165f76dfdcd9461500ae50
SHA5121e7bbdd7a75b748ff9a5f70b46766b0108effc84e0cc7c5d8a1f32e56136181060a4363ed2cbd6ed14d195a2379cf8148680380256f31b809bb77d1fe0bf064f