Analysis

  • max time kernel
    49s
  • max time network
    32s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 21:12

General

  • Target

    a68ee695d9f02800b49fc7f4090aadbc20dd6ec82716774815ba3d4bd051d198.exe

  • Size

    2.5MB

  • MD5

    5a373c875179051cadbaeed3617b6552

  • SHA1

    7efa5b94e0e25290cc23439f095dacd82e2d9400

  • SHA256

    a68ee695d9f02800b49fc7f4090aadbc20dd6ec82716774815ba3d4bd051d198

  • SHA512

    d6fabab38cad836ed83be07f1e32fecef9ca080fcf8097e595fbadbed64ab4df9cb19e83c7a7728cbd5a4ab32194c51fa5a17ae55f58c04a900f54f5ab56eef7

  • SSDEEP

    49152:h1OsKSQeb71DLvFzAqRmyyVchO4apKHcHhXa3FXWlPC1IS5zm:h1OpSQY1DCqkck4apyLqt

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 3 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 11 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a68ee695d9f02800b49fc7f4090aadbc20dd6ec82716774815ba3d4bd051d198.exe
    "C:\Users\Admin\AppData\Local\Temp\a68ee695d9f02800b49fc7f4090aadbc20dd6ec82716774815ba3d4bd051d198.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1968
    • C:\Users\Admin\AppData\Local\Temp\7zSF603.tmp\dti9qAfrVFs4Fal.exe
      .\dti9qAfrVFs4Fal.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops Chrome extension
      • Installs/modifies Browser Helper Object
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1292
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32.exe /s "C:\Program Files (x86)\GoSave\9KYxnlsehaWOFk.x64.dll"
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:704
        • C:\Windows\system32\regsvr32.exe
          /s "C:\Program Files (x86)\GoSave\9KYxnlsehaWOFk.x64.dll"
          4⤵
          • Loads dropped DLL
          • Installs/modifies Browser Helper Object
          PID:836

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\GoSave\9KYxnlsehaWOFk.dat

    Filesize

    6KB

    MD5

    386dbd096324dee7f8b4d9cace61ad88

    SHA1

    03a26b9b7a405d577bcf1db5f5314cad753658ed

    SHA256

    0fec18d91a8b755b88a463551ff56b9ecf4b8cd0ffe6b20f2816860f4b7070a8

    SHA512

    95db6cac1f58d630ab2d85625b81e18c4de67c5e513c91cf4c4cddb617077f15ffce311f0e5ad5017979064a01a1fa0ec8e9d02e83d94c1cf9a6bc92992fe584

  • C:\Program Files (x86)\GoSave\9KYxnlsehaWOFk.x64.dll

    Filesize

    886KB

    MD5

    1433d7e71196529644716ffc72c261b2

    SHA1

    f35147e7dc56f4e92856061b48c9f7a872e10385

    SHA256

    2ae79c724f8c2a134c125315fc6ee929b7ce09260e80b61c9a9e915571103e3f

    SHA512

    c363a35bd82214350439dcf6aaf9048b29f10aaeb3b1c3a69222792a94fab1009a5f6b6528df102ae082c129cce50ae7d646abc1dbd8ff9e788a9d05828c272c

  • C:\Users\Admin\AppData\Local\Temp\7zSF603.tmp\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    df13f711e20e9c80171846d4f2f7ae06

    SHA1

    56d29cda58427efe0e21d3880d39eb1b0ef60bee

    SHA256

    6c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4

    SHA512

    6c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e

  • C:\Users\Admin\AppData\Local\Temp\7zSF603.tmp\[email protected]\chrome.manifest

    Filesize

    35B

    MD5

    636a9b8c9edc4932852d03db7f76efb0

    SHA1

    b5203f98ac3df078fdabdeef97d175aff0796e67

    SHA256

    569ee951a5ce40bf6df0c55090e029ceffc070d9877c300a8ae63fb12c48fb53

    SHA512

    4853fea087c8e7e4dc2e184ae313dc1afcaa87f61ed5fd156f41c28d8d927420ddfdb3c8ffbd108323fbd6a676561f91b978000b731e53076844a1266b9e7ec6

  • C:\Users\Admin\AppData\Local\Temp\7zSF603.tmp\[email protected]\content\bg.js

    Filesize

    7KB

    MD5

    75d8eb105b993a5200929501ebbcffdd

    SHA1

    43be47300fc7dafb8fbb33669cb113d1e6ba3fa6

    SHA256

    4056f18a626ee7af557d6dea19027af22babbde978b200294029d6eb9926d6fa

    SHA512

    e73eb165b4aa8774eaa39410b07f4e09334bc1b65b167f4aec2a80a881f9c08a206fa87af2c16d8ef9f2068434fc1d034f704b0b18d54ef93bb7abb6dccfb4e0

  • C:\Users\Admin\AppData\Local\Temp\7zSF603.tmp\[email protected]\install.rdf

    Filesize

    596B

    MD5

    184021988d3cc237bfc63b7d515d4e72

    SHA1

    3a3f45cc076a17c2292cd989a12be281752f3e2b

    SHA256

    688cb6e0cdc1f8c13143109c94bf551973f384c0c552b59d3e9fe3153a362b2d

    SHA512

    4bc4d620695a1ec7cadc4ef57ddbe408d7c2bcdb35d103357ad9fc52d1863d220ef60fa320b531f8344941c9065996143d8b7f5db80a9453ef0882ea0423bc48

  • C:\Users\Admin\AppData\Local\Temp\7zSF603.tmp\9KYxnlsehaWOFk.dll

    Filesize

    745KB

    MD5

    ce27e078a917088b7459c44570637b9d

    SHA1

    4d9e95fc9b97a1f21221f96ea8fbee55132e82b7

    SHA256

    8804ae047c9ba998964a359f278f54fa1d671ed245b7dfe117625f1ce0d5e84f

    SHA512

    492fdacef00a45dfe6d9db9c80b908bd0d9ebb4bf75c1f4053a8e281cfad5279646754a711484709de6f571487276ec19f71552522dc218fba8331bf6358f9ce

  • C:\Users\Admin\AppData\Local\Temp\7zSF603.tmp\9KYxnlsehaWOFk.tlb

    Filesize

    3KB

    MD5

    f636475c74627ddf7b3b6b6dfaa8d491

    SHA1

    fb3a63977f8b0e07f18d313ace3e1f1223dc423b

    SHA256

    e6e330d72d59551c9ba78464c4081280510901a82f66d94c84cc94ca4594e4b2

    SHA512

    ba788afd76700c60fa8d899ea6ebc1c69594b09d9099c7cb4d408e290575c9ed89b0288df1a1ca9f1562564eb65f51f8add17f4c57eea7fe890b38592560fb96

  • C:\Users\Admin\AppData\Local\Temp\7zSF603.tmp\9KYxnlsehaWOFk.x64.dll

    Filesize

    886KB

    MD5

    1433d7e71196529644716ffc72c261b2

    SHA1

    f35147e7dc56f4e92856061b48c9f7a872e10385

    SHA256

    2ae79c724f8c2a134c125315fc6ee929b7ce09260e80b61c9a9e915571103e3f

    SHA512

    c363a35bd82214350439dcf6aaf9048b29f10aaeb3b1c3a69222792a94fab1009a5f6b6528df102ae082c129cce50ae7d646abc1dbd8ff9e788a9d05828c272c

  • C:\Users\Admin\AppData\Local\Temp\7zSF603.tmp\dti9qAfrVFs4Fal.dat

    Filesize

    6KB

    MD5

    386dbd096324dee7f8b4d9cace61ad88

    SHA1

    03a26b9b7a405d577bcf1db5f5314cad753658ed

    SHA256

    0fec18d91a8b755b88a463551ff56b9ecf4b8cd0ffe6b20f2816860f4b7070a8

    SHA512

    95db6cac1f58d630ab2d85625b81e18c4de67c5e513c91cf4c4cddb617077f15ffce311f0e5ad5017979064a01a1fa0ec8e9d02e83d94c1cf9a6bc92992fe584

  • C:\Users\Admin\AppData\Local\Temp\7zSF603.tmp\dti9qAfrVFs4Fal.exe

    Filesize

    770KB

    MD5

    b4c30381dd37fea1c1c69bcb3ad48b32

    SHA1

    869eca61396754586f7e85ebf65a334e01856740

    SHA256

    66481ba6d9cbf3c7662fc7cfd867739077256f60f4165f76dfdcd9461500ae50

    SHA512

    1e7bbdd7a75b748ff9a5f70b46766b0108effc84e0cc7c5d8a1f32e56136181060a4363ed2cbd6ed14d195a2379cf8148680380256f31b809bb77d1fe0bf064f

  • C:\Users\Admin\AppData\Local\Temp\7zSF603.tmp\dti9qAfrVFs4Fal.exe

    Filesize

    770KB

    MD5

    b4c30381dd37fea1c1c69bcb3ad48b32

    SHA1

    869eca61396754586f7e85ebf65a334e01856740

    SHA256

    66481ba6d9cbf3c7662fc7cfd867739077256f60f4165f76dfdcd9461500ae50

    SHA512

    1e7bbdd7a75b748ff9a5f70b46766b0108effc84e0cc7c5d8a1f32e56136181060a4363ed2cbd6ed14d195a2379cf8148680380256f31b809bb77d1fe0bf064f

  • C:\Users\Admin\AppData\Local\Temp\7zSF603.tmp\mjcpphpchbdnkomechomjbdonkplehnm\CQQp0.js

    Filesize

    5KB

    MD5

    0cc793cbb1d4fc0c91782bf80be15f6f

    SHA1

    7220513eca722831d7e0c09556b92c9c0545342e

    SHA256

    5580fce8f42246d69ef33ebdef4fb4ca974040e565ebad2d7303d7af3d87eaed

    SHA512

    f89076ae8a077458704b18dfb9dae41caf121187c06e267e53ba246d095d2dace5a21d0f809c68e4b34c1408fdd793a3da33c76515a022e7a2fe35c1a936f621

  • C:\Users\Admin\AppData\Local\Temp\7zSF603.tmp\mjcpphpchbdnkomechomjbdonkplehnm\background.html

    Filesize

    142B

    MD5

    26183b65c97bb21873c0e3a7ee435f42

    SHA1

    7b3aa2317e1306cfaeeff9e4d4fca04eef330133

    SHA256

    f57c708b5a55be13a628cd815363dffe574f23950638c1ff3963c534b48d919f

    SHA512

    53df2435dfc8effaa0baad61a62460ee21dc4bd940301960346b6dc02bfc7b5145670f19da21dc8db6604bf761469bfdfa8595cf312cfcc7d36780b32f570e0c

  • C:\Users\Admin\AppData\Local\Temp\7zSF603.tmp\mjcpphpchbdnkomechomjbdonkplehnm\content.js

    Filesize

    144B

    MD5

    fca19198fd8af21016a8b1dec7980002

    SHA1

    fd01a47d14004e17a625efe66cc46a06c786cf40

    SHA256

    332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a

    SHA512

    60f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47

  • C:\Users\Admin\AppData\Local\Temp\7zSF603.tmp\mjcpphpchbdnkomechomjbdonkplehnm\lsdb.js

    Filesize

    531B

    MD5

    36d98318ab2b3b2585a30984db328afb

    SHA1

    f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5

    SHA256

    ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7

    SHA512

    6f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a

  • C:\Users\Admin\AppData\Local\Temp\7zSF603.tmp\mjcpphpchbdnkomechomjbdonkplehnm\manifest.json

    Filesize

    498B

    MD5

    640199ea4621e34510de919f6a54436f

    SHA1

    dc65dbfad02bd2688030bd56ca1cab85917a9937

    SHA256

    e4aa7c089e32d14ddf584e9de6d007ec16581cd30c248ff7284bc0eb7757d4af

    SHA512

    d64bc524d6df7c4c21a5ddfb0e6636317482ef4dc28006bd0a38d5e26c2db75626f216143026bf8acf3baa11d86c278e902c78afad4f806ca36f9e54bc75ff0a

  • \Program Files (x86)\GoSave\9KYxnlsehaWOFk.dll

    Filesize

    745KB

    MD5

    ce27e078a917088b7459c44570637b9d

    SHA1

    4d9e95fc9b97a1f21221f96ea8fbee55132e82b7

    SHA256

    8804ae047c9ba998964a359f278f54fa1d671ed245b7dfe117625f1ce0d5e84f

    SHA512

    492fdacef00a45dfe6d9db9c80b908bd0d9ebb4bf75c1f4053a8e281cfad5279646754a711484709de6f571487276ec19f71552522dc218fba8331bf6358f9ce

  • \Program Files (x86)\GoSave\9KYxnlsehaWOFk.x64.dll

    Filesize

    886KB

    MD5

    1433d7e71196529644716ffc72c261b2

    SHA1

    f35147e7dc56f4e92856061b48c9f7a872e10385

    SHA256

    2ae79c724f8c2a134c125315fc6ee929b7ce09260e80b61c9a9e915571103e3f

    SHA512

    c363a35bd82214350439dcf6aaf9048b29f10aaeb3b1c3a69222792a94fab1009a5f6b6528df102ae082c129cce50ae7d646abc1dbd8ff9e788a9d05828c272c

  • \Program Files (x86)\GoSave\9KYxnlsehaWOFk.x64.dll

    Filesize

    886KB

    MD5

    1433d7e71196529644716ffc72c261b2

    SHA1

    f35147e7dc56f4e92856061b48c9f7a872e10385

    SHA256

    2ae79c724f8c2a134c125315fc6ee929b7ce09260e80b61c9a9e915571103e3f

    SHA512

    c363a35bd82214350439dcf6aaf9048b29f10aaeb3b1c3a69222792a94fab1009a5f6b6528df102ae082c129cce50ae7d646abc1dbd8ff9e788a9d05828c272c

  • \Users\Admin\AppData\Local\Temp\7zSF603.tmp\dti9qAfrVFs4Fal.exe

    Filesize

    770KB

    MD5

    b4c30381dd37fea1c1c69bcb3ad48b32

    SHA1

    869eca61396754586f7e85ebf65a334e01856740

    SHA256

    66481ba6d9cbf3c7662fc7cfd867739077256f60f4165f76dfdcd9461500ae50

    SHA512

    1e7bbdd7a75b748ff9a5f70b46766b0108effc84e0cc7c5d8a1f32e56136181060a4363ed2cbd6ed14d195a2379cf8148680380256f31b809bb77d1fe0bf064f

  • memory/704-73-0x0000000000000000-mapping.dmp

  • memory/836-77-0x0000000000000000-mapping.dmp

  • memory/836-78-0x000007FEFBF81000-0x000007FEFBF83000-memory.dmp

    Filesize

    8KB

  • memory/1292-56-0x0000000000000000-mapping.dmp

  • memory/1968-54-0x0000000075761000-0x0000000075763000-memory.dmp

    Filesize

    8KB