Analysis

  • max time kernel
    3s
  • max time network
    30s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 22:18

General

  • Target

    38e53b000a39d89f2e9196415766d046c056080557b3d1b3d43f10afb09ec627.exe

  • Size

    4.1MB

  • MD5

    bc86c3323999c7fc4ae41e87e1bdaae3

  • SHA1

    5f35c2f05c7119702a4f71c41672e635c54e486b

  • SHA256

    38e53b000a39d89f2e9196415766d046c056080557b3d1b3d43f10afb09ec627

  • SHA512

    da1774acd7af93cc1822cfd14b1f2b473314b5df2cdc4b5e3dfb6052da4acef54e9582a99267b2facf27b14933e7a3a40b3b287626201c5bcb56892dbc06d543

  • SSDEEP

    98304:dCcdTavEvKj+lN7FtMVbAaFa4oLN2Cmm3TbiQWsKf+0gcwXysMos+JrTl2bVIQHT:dTDU+b4oIvo

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs 4 IoCs
  • Loads dropped DLL 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 8 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 8 IoCs
  • Modifies Internet Explorer settings 1 TTPs 8 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\38e53b000a39d89f2e9196415766d046c056080557b3d1b3d43f10afb09ec627.exe
    "C:\Users\Admin\AppData\Local\Temp\38e53b000a39d89f2e9196415766d046c056080557b3d1b3d43f10afb09ec627.exe"
    1⤵
    • Loads dropped DLL
    • Installs/modifies Browser Helper Object
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1356
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32.exe /s "C:\Program Files (x86)\GoSiave\1EkZ44ONVlv7kF.x64.dll"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1036
      • C:\Windows\system32\regsvr32.exe
        /s "C:\Program Files (x86)\GoSiave\1EkZ44ONVlv7kF.x64.dll"
        3⤵
        • Registers COM server for autorun
        • Loads dropped DLL
        • Installs/modifies Browser Helper Object
        • Modifies Internet Explorer settings
        • Modifies registry class
        PID:1648

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\GoSiave\1EkZ44ONVlv7kF.dat
    Filesize

    3KB

    MD5

    af4ab9268e825238c7f916b96aec779a

    SHA1

    c251368cbcddfd9add0646a9ec2d8f372d21bd72

    SHA256

    825834a34592f5c370c5258009a1e3661234253074c794f657e41d6f2018b488

    SHA512

    24e42d7ea9e7b83e4f16c198d1f43ea6e3ab41a1c27ee3350f602b370890d2975b6eee7fa2a7c2b83d389e7e3b6fea8759b44987da1918747bebf2f7ceceac76

  • C:\Program Files (x86)\GoSiave\1EkZ44ONVlv7kF.tlb
    Filesize

    3KB

    MD5

    115d6d22fe2278653b9b429687bc4cdc

    SHA1

    0098ed796e103cd85780a48c00c65942010187fc

    SHA256

    55cdbc42ce94a3e3115a4c53fff47473525ed9af69ae774bbbd78a83ab60c9f3

    SHA512

    ba72fde0fba9c78d03da94d50e77fcd2469c9f6242ad2a475cc67f2f76742f1435af105d4c2c5353bb3f1083a423d702f461b0fe63e63edc774f4c6aada19bd6

  • C:\Program Files (x86)\GoSiave\1EkZ44ONVlv7kF.x64.dll
    Filesize

    695KB

    MD5

    fb4a23e7f4ef5c4cdaa5a87ed0eff861

    SHA1

    f1fb97557ccc7c54dec798931f59bf0085e40fa2

    SHA256

    b64a38d8fa5b1be931e49e53f5c0ec1a5c1d47f17cd33484bde4cd05b3f8a1d4

    SHA512

    42bd11ca1dc2ad2da4500e6fbf1ecaac739f530e63362fdee01b5bb2f4e44ed4da78db9799ba5e2bb9ac79ef4b64b5be683aa6fdf20bca0660f9031c8dc0c127

  • \Program Files (x86)\GoSiave\1EkZ44ONVlv7kF.dll
    Filesize

    615KB

    MD5

    1eaa91e0947d30dd98e8fef4de5511c0

    SHA1

    100957224870c455f723a3023485c1367e778428

    SHA256

    770877c5eeb92ae93fc752e2648bf63811f9d33b322c7b24a25d12f881ff343c

    SHA512

    a1263ed470cb4b07ccda33d7220315810dc21d6d79a629ced6e07e2f61c9b6706dc8a58765d18eac91d2184e3ab0a2f2e84148e16e7426b7fa68b6315f1d2a3d

  • \Program Files (x86)\GoSiave\1EkZ44ONVlv7kF.x64.dll
    Filesize

    695KB

    MD5

    fb4a23e7f4ef5c4cdaa5a87ed0eff861

    SHA1

    f1fb97557ccc7c54dec798931f59bf0085e40fa2

    SHA256

    b64a38d8fa5b1be931e49e53f5c0ec1a5c1d47f17cd33484bde4cd05b3f8a1d4

    SHA512

    42bd11ca1dc2ad2da4500e6fbf1ecaac739f530e63362fdee01b5bb2f4e44ed4da78db9799ba5e2bb9ac79ef4b64b5be683aa6fdf20bca0660f9031c8dc0c127

  • \Program Files (x86)\GoSiave\1EkZ44ONVlv7kF.x64.dll
    Filesize

    695KB

    MD5

    fb4a23e7f4ef5c4cdaa5a87ed0eff861

    SHA1

    f1fb97557ccc7c54dec798931f59bf0085e40fa2

    SHA256

    b64a38d8fa5b1be931e49e53f5c0ec1a5c1d47f17cd33484bde4cd05b3f8a1d4

    SHA512

    42bd11ca1dc2ad2da4500e6fbf1ecaac739f530e63362fdee01b5bb2f4e44ed4da78db9799ba5e2bb9ac79ef4b64b5be683aa6fdf20bca0660f9031c8dc0c127

  • memory/1036-61-0x0000000000000000-mapping.dmp
  • memory/1356-54-0x0000000075091000-0x0000000075093000-memory.dmp
    Filesize

    8KB

  • memory/1356-55-0x0000000002A00000-0x0000000002AA1000-memory.dmp
    Filesize

    644KB

  • memory/1648-65-0x0000000000000000-mapping.dmp
  • memory/1648-66-0x000007FEFB9C1000-0x000007FEFB9C3000-memory.dmp
    Filesize

    8KB