Analysis
-
max time kernel
242s -
max time network
334s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 21:14
Static task
static1
Behavioral task
behavioral1
Sample
a5cc03f777fa5f90f82022bc2bb27ca441f36010a6d5153ad538d56f13977bd9.exe
Resource
win7-20221111-en
General
-
Target
a5cc03f777fa5f90f82022bc2bb27ca441f36010a6d5153ad538d56f13977bd9.exe
-
Size
2.5MB
-
MD5
8ecd9f77fa4eebed9f1115f1eb84534b
-
SHA1
2bf490591f7fd0143e76f693ad1eb6d2f812177e
-
SHA256
a5cc03f777fa5f90f82022bc2bb27ca441f36010a6d5153ad538d56f13977bd9
-
SHA512
2bbe8a5c36ac81842c58f0b865e52e041fd3be2b7de9d50420ccea548c6e2650ad2455ace4269ec0bbc0e6f174b97a5b8ea3ed443e32c40054b800e7fd5df99f
-
SSDEEP
49152:h1OslIPtchP5IawtcvlV3COH8qA0OOMC1gqEaejGfrJ:h1OiIPtrkvlBCOHgBC1
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
GLdEKbeYYh5GRbz.exepid process 1180 GLdEKbeYYh5GRbz.exe -
Loads dropped DLL 4 IoCs
Processes:
a5cc03f777fa5f90f82022bc2bb27ca441f36010a6d5153ad538d56f13977bd9.exeGLdEKbeYYh5GRbz.exeregsvr32.exeregsvr32.exepid process 1516 a5cc03f777fa5f90f82022bc2bb27ca441f36010a6d5153ad538d56f13977bd9.exe 1180 GLdEKbeYYh5GRbz.exe 1632 regsvr32.exe 872 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 3 IoCs
Processes:
GLdEKbeYYh5GRbz.exedescription ioc process File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\dogjmgnnajhnfnmggeaamkdahjjoinen\2.0\manifest.json GLdEKbeYYh5GRbz.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\dogjmgnnajhnfnmggeaamkdahjjoinen\2.0\manifest.json GLdEKbeYYh5GRbz.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\dogjmgnnajhnfnmggeaamkdahjjoinen\2.0\manifest.json GLdEKbeYYh5GRbz.exe -
Installs/modifies Browser Helper Object 2 TTPs 11 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
GLdEKbeYYh5GRbz.exeregsvr32.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects GLdEKbeYYh5GRbz.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{18DF081C-E8AD-4283-A596-FA578C2EBDC3} GLdEKbeYYh5GRbz.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} GLdEKbeYYh5GRbz.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DBC80044-A445-435B-BC74-9C25C1C588A9} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} GLdEKbeYYh5GRbz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\ GLdEKbeYYh5GRbz.exe -
Drops file in Program Files directory 8 IoCs
Processes:
GLdEKbeYYh5GRbz.exedescription ioc process File created C:\Program Files (x86)\GoSave\ox2uuckzwQ04kh.dat GLdEKbeYYh5GRbz.exe File opened for modification C:\Program Files (x86)\GoSave\ox2uuckzwQ04kh.dat GLdEKbeYYh5GRbz.exe File created C:\Program Files (x86)\GoSave\ox2uuckzwQ04kh.x64.dll GLdEKbeYYh5GRbz.exe File opened for modification C:\Program Files (x86)\GoSave\ox2uuckzwQ04kh.x64.dll GLdEKbeYYh5GRbz.exe File created C:\Program Files (x86)\GoSave\ox2uuckzwQ04kh.dll GLdEKbeYYh5GRbz.exe File opened for modification C:\Program Files (x86)\GoSave\ox2uuckzwQ04kh.dll GLdEKbeYYh5GRbz.exe File created C:\Program Files (x86)\GoSave\ox2uuckzwQ04kh.tlb GLdEKbeYYh5GRbz.exe File opened for modification C:\Program Files (x86)\GoSave\ox2uuckzwQ04kh.tlb GLdEKbeYYh5GRbz.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
GLdEKbeYYh5GRbz.exepid process 1180 GLdEKbeYYh5GRbz.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
a5cc03f777fa5f90f82022bc2bb27ca441f36010a6d5153ad538d56f13977bd9.exeGLdEKbeYYh5GRbz.exeregsvr32.exedescription pid process target process PID 1516 wrote to memory of 1180 1516 a5cc03f777fa5f90f82022bc2bb27ca441f36010a6d5153ad538d56f13977bd9.exe GLdEKbeYYh5GRbz.exe PID 1516 wrote to memory of 1180 1516 a5cc03f777fa5f90f82022bc2bb27ca441f36010a6d5153ad538d56f13977bd9.exe GLdEKbeYYh5GRbz.exe PID 1516 wrote to memory of 1180 1516 a5cc03f777fa5f90f82022bc2bb27ca441f36010a6d5153ad538d56f13977bd9.exe GLdEKbeYYh5GRbz.exe PID 1516 wrote to memory of 1180 1516 a5cc03f777fa5f90f82022bc2bb27ca441f36010a6d5153ad538d56f13977bd9.exe GLdEKbeYYh5GRbz.exe PID 1180 wrote to memory of 1632 1180 GLdEKbeYYh5GRbz.exe regsvr32.exe PID 1180 wrote to memory of 1632 1180 GLdEKbeYYh5GRbz.exe regsvr32.exe PID 1180 wrote to memory of 1632 1180 GLdEKbeYYh5GRbz.exe regsvr32.exe PID 1180 wrote to memory of 1632 1180 GLdEKbeYYh5GRbz.exe regsvr32.exe PID 1180 wrote to memory of 1632 1180 GLdEKbeYYh5GRbz.exe regsvr32.exe PID 1180 wrote to memory of 1632 1180 GLdEKbeYYh5GRbz.exe regsvr32.exe PID 1180 wrote to memory of 1632 1180 GLdEKbeYYh5GRbz.exe regsvr32.exe PID 1632 wrote to memory of 872 1632 regsvr32.exe regsvr32.exe PID 1632 wrote to memory of 872 1632 regsvr32.exe regsvr32.exe PID 1632 wrote to memory of 872 1632 regsvr32.exe regsvr32.exe PID 1632 wrote to memory of 872 1632 regsvr32.exe regsvr32.exe PID 1632 wrote to memory of 872 1632 regsvr32.exe regsvr32.exe PID 1632 wrote to memory of 872 1632 regsvr32.exe regsvr32.exe PID 1632 wrote to memory of 872 1632 regsvr32.exe regsvr32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5cc03f777fa5f90f82022bc2bb27ca441f36010a6d5153ad538d56f13977bd9.exe"C:\Users\Admin\AppData\Local\Temp\a5cc03f777fa5f90f82022bc2bb27ca441f36010a6d5153ad538d56f13977bd9.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\7zSEE27.tmp\GLdEKbeYYh5GRbz.exe.\GLdEKbeYYh5GRbz.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\GoSave\ox2uuckzwQ04kh.x64.dll"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\GoSave\ox2uuckzwQ04kh.x64.dll"4⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
PID:872
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD51d455dfea62c0e27263fb9058b173740
SHA1bba7fa4a82268c0314b5fe6aa61e273cf7fb6a3f
SHA2566db13f355b10e4c60c34017890a4168d62f0bdf6acfbb79ce0e875d4d3d9f468
SHA51290a25d09e65e1a127f34c1dbd6b10341aeea97e9c3b6f745a2651ab257334992325530891f193e0b7dbdd9701e004ed32d874ffba04e4d440175a0a501f89426
-
Filesize
881KB
MD58cb4c5980306da615fd3a3c0b7124d95
SHA104c3ab5e547e3644e8627f9a548a56c112792499
SHA256ce12f2e485306ea9a8bd019ffd6a62d846259bac4ba0ec71d81b43ab32470d43
SHA5121852f4cf028c72869f215a8efff6c7244e2c67cde1230eb633a0d700fce957774dade7a50fcd7b760f395b3e242a5701ab88496e5551f778d208bcf182e0bedf
-
Filesize
6KB
MD51d455dfea62c0e27263fb9058b173740
SHA1bba7fa4a82268c0314b5fe6aa61e273cf7fb6a3f
SHA2566db13f355b10e4c60c34017890a4168d62f0bdf6acfbb79ce0e875d4d3d9f468
SHA51290a25d09e65e1a127f34c1dbd6b10341aeea97e9c3b6f745a2651ab257334992325530891f193e0b7dbdd9701e004ed32d874ffba04e4d440175a0a501f89426
-
Filesize
787KB
MD57b2176326be202922b35e876bab7ff83
SHA1e7e8a0feb3fd78413b5c6d636a72bd28254bcea8
SHA256292a3ad5628c78a7956e3ff9e30e484453ca674ced5a37894415eef1055051c4
SHA512369d238f1118fe730bb49e44058999e0afca237d722ac68e3272c8e9ad27e97c368c8380f7d0c35a233ad44341e4f368fdb8a385f9b82789c1266a9b0024dd69
-
Filesize
787KB
MD57b2176326be202922b35e876bab7ff83
SHA1e7e8a0feb3fd78413b5c6d636a72bd28254bcea8
SHA256292a3ad5628c78a7956e3ff9e30e484453ca674ced5a37894415eef1055051c4
SHA512369d238f1118fe730bb49e44058999e0afca237d722ac68e3272c8e9ad27e97c368c8380f7d0c35a233ad44341e4f368fdb8a385f9b82789c1266a9b0024dd69
-
C:\Users\Admin\AppData\Local\Temp\7zSEE27.tmp\[email protected]\bootstrap.js
Filesize2KB
MD5df13f711e20e9c80171846d4f2f7ae06
SHA156d29cda58427efe0e21d3880d39eb1b0ef60bee
SHA2566c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4
SHA5126c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e
-
C:\Users\Admin\AppData\Local\Temp\7zSEE27.tmp\[email protected]\chrome.manifest
Filesize35B
MD51c47d3d6585e84b3daa0ca5e0d28432c
SHA100b501d8f59cd24f4f42e4da3cae5713b147cc36
SHA256d33589851124657ef914e27b5adeb763cd7d90cbe64366adb61f8e58f02fd5eb
SHA512ae85633a958f00888ceb8ad2115c0b39e87cdff155564ad01eff5c1829451f96ece4cc8109742ae749383043929b634fd0be098b470264fe1b4c6ab10ec71ba3
-
C:\Users\Admin\AppData\Local\Temp\7zSEE27.tmp\[email protected]\content\bg.js
Filesize7KB
MD5563d43792e93e1ee19684849bc27328e
SHA1b7a144fdd20742700e25be0a835f18da41151d9e
SHA256c4c640f7fc5496472d53ec7e0118d52f5fad11625765a865606a9afb2e130438
SHA5125705e9d04b884aefa39d70d364925530333ac024101b0a28619b89171283fc81bbfeeffa422d106cbfc0ce60914a8d54eeb6312f585bf2bb5864ed1f966ca568
-
C:\Users\Admin\AppData\Local\Temp\7zSEE27.tmp\[email protected]\install.rdf
Filesize590B
MD5fc43334b1228f12bb27210e432c53d50
SHA159f31965c6a8fafe1f840d42fc90fe5dd8a07d39
SHA2566566d74e58cc511b421c84d694085e31ff4b98e6d00597c164168ed1f9decf1d
SHA512188669602699100507a7034eb4362dea3c39146d58b340f4f4d100b266c3573ea5f5f57f2782526573fa20a7db353f3ce7f1d2d9f3cc18926affa004ff182d64
-
Filesize
146B
MD5aa9454bae2984f7c56880e7a6d355414
SHA104ce9227ad695a7c4e819d5a3cc758d121a6b8d9
SHA2563c8df18427dc6bcf40ac4b4a5c1a26f64503234dc44933d3a6cd4fa6843cdafb
SHA512ea588af99ea374cb7dc5b7d30dd66aeaa815afb49bb414c5c172cfa4d8f36ce20f43545ab3c514022477608f438895118bdc1ce6f87e130efd8d65be31122bfe
-
Filesize
144B
MD5fca19198fd8af21016a8b1dec7980002
SHA1fd01a47d14004e17a625efe66cc46a06c786cf40
SHA256332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a
SHA51260f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47
-
Filesize
531B
MD536d98318ab2b3b2585a30984db328afb
SHA1f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5
SHA256ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7
SHA5126f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a
-
Filesize
498B
MD5640199ea4621e34510de919f6a54436f
SHA1dc65dbfad02bd2688030bd56ca1cab85917a9937
SHA256e4aa7c089e32d14ddf584e9de6d007ec16581cd30c248ff7284bc0eb7757d4af
SHA512d64bc524d6df7c4c21a5ddfb0e6636317482ef4dc28006bd0a38d5e26c2db75626f216143026bf8acf3baa11d86c278e902c78afad4f806ca36f9e54bc75ff0a
-
Filesize
5KB
MD555a280208a8cae10c54f77900c002cbe
SHA1c40d31436fd416eadd5652ffc01cb93bc38d9d8c
SHA256667fb0811a3ebc5281869b12d30035d55a6fd0e8412569a4248d3d721ec4cf8c
SHA512158a0002f15971a3e207014d7a3b0e35aa2c374f70785c922f585ace89ce4ba55b79bfebec113d9ebf819a15845325a8b345cd7d96f53694c2f4d2df0273e94f
-
Filesize
747KB
MD5075a34d90e4395f320b3266b2a6cc2c0
SHA1c04c7386f13b45f5cc8424109d369e1e2427e5ec
SHA25682550996793875d5d60d0479968dd63ff127ac705aca610110bc3f6ca127e8dc
SHA5122618fb83c62bfd2ea6925d15417a86144d0133c1db3d6020b93ff6bac19adf47c1d31a10fcc31010e0fd6c2bd6f0a4537763715c57b74ad094ce8d6aedbf896a
-
Filesize
3KB
MD580b66ebf00d9d7c1904175c81cf3b1e1
SHA125edfc73c30f45e1254ddec9bdc5854d0f5c3c1b
SHA2565691ef6a5460131e8fbebeed40d4f0fb81ff49e25a08d45df2178bb8d486672a
SHA512396db976a5a56df11be3f46e16908341b33be7b374c92674550a563885012c056b7213ab873745e98bf4681bf12882632260363c578105decda25a2d249fdb9d
-
Filesize
881KB
MD58cb4c5980306da615fd3a3c0b7124d95
SHA104c3ab5e547e3644e8627f9a548a56c112792499
SHA256ce12f2e485306ea9a8bd019ffd6a62d846259bac4ba0ec71d81b43ab32470d43
SHA5121852f4cf028c72869f215a8efff6c7244e2c67cde1230eb633a0d700fce957774dade7a50fcd7b760f395b3e242a5701ab88496e5551f778d208bcf182e0bedf
-
Filesize
747KB
MD5075a34d90e4395f320b3266b2a6cc2c0
SHA1c04c7386f13b45f5cc8424109d369e1e2427e5ec
SHA25682550996793875d5d60d0479968dd63ff127ac705aca610110bc3f6ca127e8dc
SHA5122618fb83c62bfd2ea6925d15417a86144d0133c1db3d6020b93ff6bac19adf47c1d31a10fcc31010e0fd6c2bd6f0a4537763715c57b74ad094ce8d6aedbf896a
-
Filesize
881KB
MD58cb4c5980306da615fd3a3c0b7124d95
SHA104c3ab5e547e3644e8627f9a548a56c112792499
SHA256ce12f2e485306ea9a8bd019ffd6a62d846259bac4ba0ec71d81b43ab32470d43
SHA5121852f4cf028c72869f215a8efff6c7244e2c67cde1230eb633a0d700fce957774dade7a50fcd7b760f395b3e242a5701ab88496e5551f778d208bcf182e0bedf
-
Filesize
881KB
MD58cb4c5980306da615fd3a3c0b7124d95
SHA104c3ab5e547e3644e8627f9a548a56c112792499
SHA256ce12f2e485306ea9a8bd019ffd6a62d846259bac4ba0ec71d81b43ab32470d43
SHA5121852f4cf028c72869f215a8efff6c7244e2c67cde1230eb633a0d700fce957774dade7a50fcd7b760f395b3e242a5701ab88496e5551f778d208bcf182e0bedf
-
Filesize
787KB
MD57b2176326be202922b35e876bab7ff83
SHA1e7e8a0feb3fd78413b5c6d636a72bd28254bcea8
SHA256292a3ad5628c78a7956e3ff9e30e484453ca674ced5a37894415eef1055051c4
SHA512369d238f1118fe730bb49e44058999e0afca237d722ac68e3272c8e9ad27e97c368c8380f7d0c35a233ad44341e4f368fdb8a385f9b82789c1266a9b0024dd69