Analysis
-
max time kernel
45s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25/11/2022, 22:33
Static task
static1
Behavioral task
behavioral1
Sample
20eefaac6a4b66d018a6c3ac42bfc5978327f98bb89b68d5b152378e19191d19.exe
Resource
win7-20220812-en
General
-
Target
20eefaac6a4b66d018a6c3ac42bfc5978327f98bb89b68d5b152378e19191d19.exe
-
Size
2.1MB
-
MD5
b0e5f882b4ea113fa011fc54e96989e3
-
SHA1
31b2920f4f33366155bb4181cf92e3984c381c5d
-
SHA256
20eefaac6a4b66d018a6c3ac42bfc5978327f98bb89b68d5b152378e19191d19
-
SHA512
7c08f2f0af7c60aead87a5b785caa1e7e6df16e2122b87a258cc38c1836a451f9ff24229514e7836edb5b9a15316db6eaf6b139960e13b4dab6fc3b67a610958
-
SSDEEP
49152:h1Os8hvaZG1MVEtzijkTvu2x/uw4B8FHFF6I:h1OTvaxMziy3D
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1516 p0ojBTkCLB46fm7.exe -
Loads dropped DLL 4 IoCs
pid Process 624 20eefaac6a4b66d018a6c3ac42bfc5978327f98bb89b68d5b152378e19191d19.exe 1516 p0ojBTkCLB46fm7.exe 940 regsvr32.exe 876 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofkilcjmhhglmniacplooepfcpcnpmbi\200\manifest.json p0ojBTkCLB46fm7.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofkilcjmhhglmniacplooepfcpcnpmbi\200\manifest.json p0ojBTkCLB46fm7.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofkilcjmhhglmniacplooepfcpcnpmbi\200\manifest.json p0ojBTkCLB46fm7.exe -
Installs/modifies Browser Helper Object 2 TTPs 11 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{18DF081C-E8AD-4283-A596-FA578C2EBDC3} p0ojBTkCLB46fm7.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} p0ojBTkCLB46fm7.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects p0ojBTkCLB46fm7.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DBC80044-A445-435B-BC74-9C25C1C588A9} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} p0ojBTkCLB46fm7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\ p0ojBTkCLB46fm7.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ regsvr32.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files (x86)\BrrowwsoeReShioop\qfuLJbkQ4rxzRZ.tlb p0ojBTkCLB46fm7.exe File opened for modification C:\Program Files (x86)\BrrowwsoeReShioop\qfuLJbkQ4rxzRZ.tlb p0ojBTkCLB46fm7.exe File created C:\Program Files (x86)\BrrowwsoeReShioop\qfuLJbkQ4rxzRZ.dat p0ojBTkCLB46fm7.exe File opened for modification C:\Program Files (x86)\BrrowwsoeReShioop\qfuLJbkQ4rxzRZ.dat p0ojBTkCLB46fm7.exe File created C:\Program Files (x86)\BrrowwsoeReShioop\qfuLJbkQ4rxzRZ.x64.dll p0ojBTkCLB46fm7.exe File opened for modification C:\Program Files (x86)\BrrowwsoeReShioop\qfuLJbkQ4rxzRZ.x64.dll p0ojBTkCLB46fm7.exe File created C:\Program Files (x86)\BrrowwsoeReShioop\qfuLJbkQ4rxzRZ.dll p0ojBTkCLB46fm7.exe File opened for modification C:\Program Files (x86)\BrrowwsoeReShioop\qfuLJbkQ4rxzRZ.dll p0ojBTkCLB46fm7.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 624 wrote to memory of 1516 624 20eefaac6a4b66d018a6c3ac42bfc5978327f98bb89b68d5b152378e19191d19.exe 28 PID 624 wrote to memory of 1516 624 20eefaac6a4b66d018a6c3ac42bfc5978327f98bb89b68d5b152378e19191d19.exe 28 PID 624 wrote to memory of 1516 624 20eefaac6a4b66d018a6c3ac42bfc5978327f98bb89b68d5b152378e19191d19.exe 28 PID 624 wrote to memory of 1516 624 20eefaac6a4b66d018a6c3ac42bfc5978327f98bb89b68d5b152378e19191d19.exe 28 PID 1516 wrote to memory of 940 1516 p0ojBTkCLB46fm7.exe 29 PID 1516 wrote to memory of 940 1516 p0ojBTkCLB46fm7.exe 29 PID 1516 wrote to memory of 940 1516 p0ojBTkCLB46fm7.exe 29 PID 1516 wrote to memory of 940 1516 p0ojBTkCLB46fm7.exe 29 PID 1516 wrote to memory of 940 1516 p0ojBTkCLB46fm7.exe 29 PID 1516 wrote to memory of 940 1516 p0ojBTkCLB46fm7.exe 29 PID 1516 wrote to memory of 940 1516 p0ojBTkCLB46fm7.exe 29 PID 940 wrote to memory of 876 940 regsvr32.exe 30 PID 940 wrote to memory of 876 940 regsvr32.exe 30 PID 940 wrote to memory of 876 940 regsvr32.exe 30 PID 940 wrote to memory of 876 940 regsvr32.exe 30 PID 940 wrote to memory of 876 940 regsvr32.exe 30 PID 940 wrote to memory of 876 940 regsvr32.exe 30 PID 940 wrote to memory of 876 940 regsvr32.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\20eefaac6a4b66d018a6c3ac42bfc5978327f98bb89b68d5b152378e19191d19.exe"C:\Users\Admin\AppData\Local\Temp\20eefaac6a4b66d018a6c3ac42bfc5978327f98bb89b68d5b152378e19191d19.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Users\Admin\AppData\Local\Temp\7zS66FE.tmp\p0ojBTkCLB46fm7.exe.\p0ojBTkCLB46fm7.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\BrrowwsoeReShioop\qfuLJbkQ4rxzRZ.x64.dll"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\BrrowwsoeReShioop\qfuLJbkQ4rxzRZ.x64.dll"4⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
PID:876
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5b9c6a01269824e904026aac49b60ae05
SHA105154a6a4673f42fd23995a92731c1d5abf7964e
SHA2564c427bb5c4f8950c12d0e40451876a403cd52013bf5d64366592047ac70c386d
SHA5123a666647b96040a643e1d6779e477a81bd9afa8601c026e516cb9dc3d794b5fa5036c143b23ff2662bc4b7a0b2a243534740e9cd32a04b27b07880e6dedffd2d
-
Filesize
695KB
MD52af06e7424e4f53fa8ee2b8daf4cdaa3
SHA10a09aa095e38211b8fc512d2e9f8f7cf12159a19
SHA25681f98c4034227951bd4ad5e6d6a823bd112602f3550fd7066a01f16b8c8aca69
SHA5126bcaa8998bd7971f41bebc8433be949cf48d98c0eb70c643b7b7a1b50d2b4cf66412efb170684f36f1987c1992ba88350f815ea18a3cf50caf8ce97bbb961b16
-
C:\Users\Admin\AppData\Local\Temp\7zS66FE.tmp\[email protected]\bootstrap.js
Filesize2KB
MD5df13f711e20e9c80171846d4f2f7ae06
SHA156d29cda58427efe0e21d3880d39eb1b0ef60bee
SHA2566c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4
SHA5126c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e
-
C:\Users\Admin\AppData\Local\Temp\7zS66FE.tmp\[email protected]\chrome.manifest
Filesize35B
MD52aced921a5e085e5c0cf7c70bcff2f40
SHA13dd559880994217d6163cac7a87fd81d3c5fec79
SHA2562a85e5a159e4310b26e8cd0c79553303bd50f2cc032a951439c852e444483d2c
SHA512e142b50307ed1cab814a0a30148843d430db514b79645270e16dfc81bed8dd8cf8269d02dba3898c1e9e8c012779a86fc51f0de41a009df4493093b9a2b6763d
-
C:\Users\Admin\AppData\Local\Temp\7zS66FE.tmp\[email protected]\content\bg.js
Filesize7KB
MD548106dd53c210cac3ef3936ae11a6ff0
SHA1c0e79ea7fae8dd55a9a0e0720904797dbc5b175e
SHA256e85b5bc3738b5b104f554cea7e0f4d60d408871ce19f711d14a5e1006c6454ab
SHA5127425860740238c78db04dad86af69234eeee88b344fb6f4834d8dbf5e9629d1790a6dd342b4f1bb886ef0cbed4a63f3147f142adc7ad93fa91bd27a5269c161a
-
C:\Users\Admin\AppData\Local\Temp\7zS66FE.tmp\[email protected]\install.rdf
Filesize608B
MD5f3d01d6372a6964702063920a1d7e15d
SHA18829f29a89bb956b8e7f1718171b788f8493306c
SHA256f5893a2985cf0752a779bfd619d7ad36e33491d8ec4fb141d22a1c23a529ff87
SHA512b43ee69fae44a8d1502e94168b7b46c6a02d09bf4ef17559c04ee8f46c4d3ddc056b6677219ca8bbc471e096c5050bda30ff2b20490b5fa877372c4793734e39
-
Filesize
140B
MD5996943e1d102f53f2b8dfa390a9c1078
SHA1911add610ea62e6bc22d016dd62d957016cdee71
SHA256d3c3d4b51f07e7e360f66427d4e0eb40bfc9947418ffcf7d24137e21d34af5c5
SHA51279c85da6c7ce895caf52963a3b4a24234bd61f8b109dbc278321e0eeb4c28915e7a62bf7baa7fe02c90e44755ce57c8eb91f943e0d87b01ea184172d6e5ef859
-
Filesize
144B
MD5fca19198fd8af21016a8b1dec7980002
SHA1fd01a47d14004e17a625efe66cc46a06c786cf40
SHA256332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a
SHA51260f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47
-
Filesize
531B
MD536d98318ab2b3b2585a30984db328afb
SHA1f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5
SHA256ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7
SHA5126f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a
-
Filesize
509B
MD57b82091172334e7309e76969f776e938
SHA10441248b05b232c5d82c92a44f376a90c86ac760
SHA2563d20b3564a2af6779cd09feb0a73e4c289b84caa239ab945b6c4dfdd89a7bb23
SHA51275b156ffd4c7101f34a66cc47a1fa9a3511f331899f9acda793dea5104f8df33206c8616b5ebfacd5d1366650f64e59ae48dc5e159d49b1eeed702d5dc6f4308
-
Filesize
5KB
MD5729bbbd9d81eea7d98636a7399917bcd
SHA1c36523045fab7faf0509dd4f39bc3e2507834bed
SHA256ed68f7b0fa2bc01fcfbfb35297e3119345faa3c64bb2c872e6bc80bd3ab410b4
SHA5128759872c3567133a32e0d569f0ba211b2c40347ddb0588be1298a191853e8b7ae37ceab346c6bf40939b0fd98ab24ef58e5fe7403ab88c899d273d8ec0d5b842
-
Filesize
6KB
MD5b9c6a01269824e904026aac49b60ae05
SHA105154a6a4673f42fd23995a92731c1d5abf7964e
SHA2564c427bb5c4f8950c12d0e40451876a403cd52013bf5d64366592047ac70c386d
SHA5123a666647b96040a643e1d6779e477a81bd9afa8601c026e516cb9dc3d794b5fa5036c143b23ff2662bc4b7a0b2a243534740e9cd32a04b27b07880e6dedffd2d
-
Filesize
634KB
MD5bd1503d4eaae5e7f2a8cdbd9a88ec02a
SHA1730280a7839bb46bdeeaa47797d926f8d57e1da1
SHA256724380928512fc5261d5f42e64f7705fcdeae1410f24a8ec6b0a2ba783675cb4
SHA5120dc06ce8e78f6b0ebbe65723791ea4ffde8a9d55534dda1b02e81f1a109fce77f26e4bdfb9fd18b5ca9f4d9ff2454e6b05eca325539148512f762b5d2f225c7b
-
Filesize
634KB
MD5bd1503d4eaae5e7f2a8cdbd9a88ec02a
SHA1730280a7839bb46bdeeaa47797d926f8d57e1da1
SHA256724380928512fc5261d5f42e64f7705fcdeae1410f24a8ec6b0a2ba783675cb4
SHA5120dc06ce8e78f6b0ebbe65723791ea4ffde8a9d55534dda1b02e81f1a109fce77f26e4bdfb9fd18b5ca9f4d9ff2454e6b05eca325539148512f762b5d2f225c7b
-
Filesize
618KB
MD5f180a95d8673cd01ce4af0ff678fa099
SHA18592fe958436e14ef9ace437ac4445ecca22e35e
SHA256d40aa49822621713e0f79f6c9a187468251fc22559cb1bbd6b5f71a94819eeb7
SHA5123dda5f3133df4c00c03d8b3fb539b37e2e6b26d0384d3674cefa9595136f9eaa4b9d21c0e806a9ec3cfadfb782a30e344145abbf87bca813de056f84c6fb13c9
-
Filesize
3KB
MD58af6f42a5b16ced04702514d47052053
SHA1f06e43c9710e27b38063652217874f6fc8515ea0
SHA2560fc752f18e2f21a6d0b45fb9769deefe70d4690e72225037a37d1dc0553ae8ed
SHA5122d1fedf6693f0347d9265436fbc17515fa9a904db54170181ca7a6d5c64a4928494a20a1eb489d646602ed2769e570bfb5835bffd241a53a8fe64d5767b9234b
-
Filesize
695KB
MD52af06e7424e4f53fa8ee2b8daf4cdaa3
SHA10a09aa095e38211b8fc512d2e9f8f7cf12159a19
SHA25681f98c4034227951bd4ad5e6d6a823bd112602f3550fd7066a01f16b8c8aca69
SHA5126bcaa8998bd7971f41bebc8433be949cf48d98c0eb70c643b7b7a1b50d2b4cf66412efb170684f36f1987c1992ba88350f815ea18a3cf50caf8ce97bbb961b16
-
Filesize
618KB
MD5f180a95d8673cd01ce4af0ff678fa099
SHA18592fe958436e14ef9ace437ac4445ecca22e35e
SHA256d40aa49822621713e0f79f6c9a187468251fc22559cb1bbd6b5f71a94819eeb7
SHA5123dda5f3133df4c00c03d8b3fb539b37e2e6b26d0384d3674cefa9595136f9eaa4b9d21c0e806a9ec3cfadfb782a30e344145abbf87bca813de056f84c6fb13c9
-
Filesize
695KB
MD52af06e7424e4f53fa8ee2b8daf4cdaa3
SHA10a09aa095e38211b8fc512d2e9f8f7cf12159a19
SHA25681f98c4034227951bd4ad5e6d6a823bd112602f3550fd7066a01f16b8c8aca69
SHA5126bcaa8998bd7971f41bebc8433be949cf48d98c0eb70c643b7b7a1b50d2b4cf66412efb170684f36f1987c1992ba88350f815ea18a3cf50caf8ce97bbb961b16
-
Filesize
695KB
MD52af06e7424e4f53fa8ee2b8daf4cdaa3
SHA10a09aa095e38211b8fc512d2e9f8f7cf12159a19
SHA25681f98c4034227951bd4ad5e6d6a823bd112602f3550fd7066a01f16b8c8aca69
SHA5126bcaa8998bd7971f41bebc8433be949cf48d98c0eb70c643b7b7a1b50d2b4cf66412efb170684f36f1987c1992ba88350f815ea18a3cf50caf8ce97bbb961b16
-
Filesize
634KB
MD5bd1503d4eaae5e7f2a8cdbd9a88ec02a
SHA1730280a7839bb46bdeeaa47797d926f8d57e1da1
SHA256724380928512fc5261d5f42e64f7705fcdeae1410f24a8ec6b0a2ba783675cb4
SHA5120dc06ce8e78f6b0ebbe65723791ea4ffde8a9d55534dda1b02e81f1a109fce77f26e4bdfb9fd18b5ca9f4d9ff2454e6b05eca325539148512f762b5d2f225c7b