Analysis
-
max time kernel
9s -
max time network
78s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 01:58
Static task
static1
Behavioral task
behavioral1
Sample
4969d93323149eadb8dfe0bebddc37f5b0a1c416dd762f06b45bd1732c970c93.exe
Resource
win7-20221111-en
General
-
Target
4969d93323149eadb8dfe0bebddc37f5b0a1c416dd762f06b45bd1732c970c93.exe
-
Size
2.5MB
-
MD5
26712654792f59b40b30e1b17ce1b8b0
-
SHA1
832f1641473da56b1e8b9b11196186e5ba9251d6
-
SHA256
4969d93323149eadb8dfe0bebddc37f5b0a1c416dd762f06b45bd1732c970c93
-
SHA512
f17f27a050df6140a178ed51f1f5d00a1a7013db0ba85bf1fbe8a9c56e5303ac1b2a2b367eec8d72865becdbe0e46ed78bbb120a15fd40c5c780c0b789dd2d34
-
SSDEEP
49152:h1OsMZtE/e06bzN8IPMA3u3uenuu0X6vA3rYAqXz0+gmTyCA8:h1OxCezbzNve3ueE+n
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
xoV2ZbiGao7SE4k.exepid process 2032 xoV2ZbiGao7SE4k.exe -
Loads dropped DLL 4 IoCs
Processes:
4969d93323149eadb8dfe0bebddc37f5b0a1c416dd762f06b45bd1732c970c93.exexoV2ZbiGao7SE4k.exeregsvr32.exeregsvr32.exepid process 1728 4969d93323149eadb8dfe0bebddc37f5b0a1c416dd762f06b45bd1732c970c93.exe 2032 xoV2ZbiGao7SE4k.exe 580 regsvr32.exe 1400 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 3 IoCs
Processes:
xoV2ZbiGao7SE4k.exedescription ioc process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\bmapppldmlkbjcbepjempdimppfdmnla\5.2\manifest.json xoV2ZbiGao7SE4k.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\bmapppldmlkbjcbepjempdimppfdmnla\5.2\manifest.json xoV2ZbiGao7SE4k.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\bmapppldmlkbjcbepjempdimppfdmnla\5.2\manifest.json xoV2ZbiGao7SE4k.exe -
Installs/modifies Browser Helper Object 2 TTPs 11 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
xoV2ZbiGao7SE4k.exeregsvr32.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{18DF081C-E8AD-4283-A596-FA578C2EBDC3} xoV2ZbiGao7SE4k.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} xoV2ZbiGao7SE4k.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects xoV2ZbiGao7SE4k.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} xoV2ZbiGao7SE4k.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\ xoV2ZbiGao7SE4k.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DBC80044-A445-435B-BC74-9C25C1C588A9} regsvr32.exe -
Drops file in Program Files directory 8 IoCs
Processes:
xoV2ZbiGao7SE4k.exedescription ioc process File opened for modification C:\Program Files (x86)\PriceLess\yocbfmojwiDpxQ.dll xoV2ZbiGao7SE4k.exe File created C:\Program Files (x86)\PriceLess\yocbfmojwiDpxQ.tlb xoV2ZbiGao7SE4k.exe File opened for modification C:\Program Files (x86)\PriceLess\yocbfmojwiDpxQ.tlb xoV2ZbiGao7SE4k.exe File created C:\Program Files (x86)\PriceLess\yocbfmojwiDpxQ.dat xoV2ZbiGao7SE4k.exe File opened for modification C:\Program Files (x86)\PriceLess\yocbfmojwiDpxQ.dat xoV2ZbiGao7SE4k.exe File created C:\Program Files (x86)\PriceLess\yocbfmojwiDpxQ.x64.dll xoV2ZbiGao7SE4k.exe File opened for modification C:\Program Files (x86)\PriceLess\yocbfmojwiDpxQ.x64.dll xoV2ZbiGao7SE4k.exe File created C:\Program Files (x86)\PriceLess\yocbfmojwiDpxQ.dll xoV2ZbiGao7SE4k.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
xoV2ZbiGao7SE4k.exepid process 2032 xoV2ZbiGao7SE4k.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
4969d93323149eadb8dfe0bebddc37f5b0a1c416dd762f06b45bd1732c970c93.exexoV2ZbiGao7SE4k.exeregsvr32.exedescription pid process target process PID 1728 wrote to memory of 2032 1728 4969d93323149eadb8dfe0bebddc37f5b0a1c416dd762f06b45bd1732c970c93.exe xoV2ZbiGao7SE4k.exe PID 1728 wrote to memory of 2032 1728 4969d93323149eadb8dfe0bebddc37f5b0a1c416dd762f06b45bd1732c970c93.exe xoV2ZbiGao7SE4k.exe PID 1728 wrote to memory of 2032 1728 4969d93323149eadb8dfe0bebddc37f5b0a1c416dd762f06b45bd1732c970c93.exe xoV2ZbiGao7SE4k.exe PID 1728 wrote to memory of 2032 1728 4969d93323149eadb8dfe0bebddc37f5b0a1c416dd762f06b45bd1732c970c93.exe xoV2ZbiGao7SE4k.exe PID 2032 wrote to memory of 580 2032 xoV2ZbiGao7SE4k.exe regsvr32.exe PID 2032 wrote to memory of 580 2032 xoV2ZbiGao7SE4k.exe regsvr32.exe PID 2032 wrote to memory of 580 2032 xoV2ZbiGao7SE4k.exe regsvr32.exe PID 2032 wrote to memory of 580 2032 xoV2ZbiGao7SE4k.exe regsvr32.exe PID 2032 wrote to memory of 580 2032 xoV2ZbiGao7SE4k.exe regsvr32.exe PID 2032 wrote to memory of 580 2032 xoV2ZbiGao7SE4k.exe regsvr32.exe PID 2032 wrote to memory of 580 2032 xoV2ZbiGao7SE4k.exe regsvr32.exe PID 580 wrote to memory of 1400 580 regsvr32.exe regsvr32.exe PID 580 wrote to memory of 1400 580 regsvr32.exe regsvr32.exe PID 580 wrote to memory of 1400 580 regsvr32.exe regsvr32.exe PID 580 wrote to memory of 1400 580 regsvr32.exe regsvr32.exe PID 580 wrote to memory of 1400 580 regsvr32.exe regsvr32.exe PID 580 wrote to memory of 1400 580 regsvr32.exe regsvr32.exe PID 580 wrote to memory of 1400 580 regsvr32.exe regsvr32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4969d93323149eadb8dfe0bebddc37f5b0a1c416dd762f06b45bd1732c970c93.exe"C:\Users\Admin\AppData\Local\Temp\4969d93323149eadb8dfe0bebddc37f5b0a1c416dd762f06b45bd1732c970c93.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS65A7.tmp\xoV2ZbiGao7SE4k.exe.\xoV2ZbiGao7SE4k.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\PriceLess\yocbfmojwiDpxQ.x64.dll"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\PriceLess\yocbfmojwiDpxQ.x64.dll"4⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\PriceLess\yocbfmojwiDpxQ.datFilesize
6KB
MD52fbd3934d4805fdaa67a014b15b5c1e9
SHA13607b36cf1e4d65decb05ae4cac89a65a6fa7b31
SHA2568dff4fa9960f74021090e38b7576d99fc7de0514e9b9067cf7a3e4833eacb419
SHA51246ba0c7901d7432490409e8e5f717fe7284caa338026ab103d7b6258baf556cb0f23cb9cdac10e3b649d20c140eaf59d0ecd52e25017417b2da3752aa73d38df
-
C:\Program Files (x86)\PriceLess\yocbfmojwiDpxQ.x64.dllFilesize
893KB
MD5b96e579558a6cc0ddbb3d672d26dd1ef
SHA1d568cc1ac22ada8f0703bf6a5c5bb836a578ce44
SHA25672f2e5818632af4cb7bb0adf08831852c7a55704c8a10e7a231da08fd2a20bfd
SHA512f77e402ab40f76a70ac9a5b77ba8e8040735646afa7b92a3d333ce1504be18023a30a9f0ff6e99c751fafd92776f56b7980b98a191ec92c6c11f0a1acc759e01
-
C:\Users\Admin\AppData\Local\Temp\7zS65A7.tmp\[email protected]\bootstrap.jsFilesize
2KB
MD5df13f711e20e9c80171846d4f2f7ae06
SHA156d29cda58427efe0e21d3880d39eb1b0ef60bee
SHA2566c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4
SHA5126c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e
-
C:\Users\Admin\AppData\Local\Temp\7zS65A7.tmp\[email protected]\chrome.manifestFilesize
35B
MD5d4d6fbde153bcc5d43ef3f390c4fea53
SHA15a5f672a9684ee6d35b3847da61face1f405f9da
SHA2565ef4517469fdd90097bdcee31b8a340b074646f2ed52b41ab0eea1939da64220
SHA5124ca68f0e1ddf24151a800524a97c70bf8d32ad0b357dac9a631e804d854ab05525ceb14c1963fe2e95ce13ff629094fba497ecddee904db0ef37f1e092874489
-
C:\Users\Admin\AppData\Local\Temp\7zS65A7.tmp\[email protected]\content\bg.jsFilesize
7KB
MD5b186fa081d08f2661cab37bc2558e0aa
SHA13e4bb5d15e848a3eaee3334aa80be347212d1fa6
SHA256861dfe936f5dfa15990e1561240dfe5768831d6e255f612c3be458c9e40d35a9
SHA51291f2d48f4bc9de35199a0ca68a9e8f29d8203a0dbd54ca82762330c81cc8699e4233dea5388174886edab19188659b3dccbeece61b3ef111e150320d4458b21f
-
C:\Users\Admin\AppData\Local\Temp\7zS65A7.tmp\[email protected]\install.rdfFilesize
597B
MD53151f0ef10a3ffa45cb8b4c340251234
SHA19ed15f1b023f9c6625a01ce390b879e30d673cde
SHA256318f33fec17b533993257b31f8623232ca8733405aa77b0609f415cebfc1b35e
SHA512ba9fd0390d91e6be910bb5eac6d5e05b81eb5d36a067e72a1fffd0a41614e63e79e388c327df0be4c39dade19d23f401652c9b681090ca939606ac1ce5efc818
-
C:\Users\Admin\AppData\Local\Temp\7zS65A7.tmp\bmapppldmlkbjcbepjempdimppfdmnla\C31S.jsFilesize
5KB
MD583b6e4f4426a153d3cb6ef9ab8277738
SHA1bd2d3062910de924c4bef3e18cac7a064e136849
SHA256e9f8e95003c67b739ccc6c365033939ef6098b3ab277f489c2e79d90833005fd
SHA512ff83e0fb65e7b35a5bc1709ae8521fdd088caca56f30b6ba1c212b51a42e381fc6fccf7ae1f774b0bc2558b4520ec5aeef63ac5d6c6bb7ad88b247016744ea1d
-
C:\Users\Admin\AppData\Local\Temp\7zS65A7.tmp\bmapppldmlkbjcbepjempdimppfdmnla\background.htmlFilesize
141B
MD58dca1a97e154ef748f91caa791c1d1ab
SHA1c9cdd9764ebed508408cca771c223a66e9a17577
SHA2568f4177167b4f3d991794c0999eac3daa9c6e1c6901fd724510355f065a0cfee6
SHA512b3de0c8590b969f145d920b310ea1e84cd1e0d95427a76191aec4e3c4aca4f7d2062e21b133d447348d2a42a965338052ba118e62a5f3bd9240e18c1467c3076
-
C:\Users\Admin\AppData\Local\Temp\7zS65A7.tmp\bmapppldmlkbjcbepjempdimppfdmnla\content.jsFilesize
144B
MD5fca19198fd8af21016a8b1dec7980002
SHA1fd01a47d14004e17a625efe66cc46a06c786cf40
SHA256332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a
SHA51260f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47
-
C:\Users\Admin\AppData\Local\Temp\7zS65A7.tmp\bmapppldmlkbjcbepjempdimppfdmnla\lsdb.jsFilesize
531B
MD536d98318ab2b3b2585a30984db328afb
SHA1f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5
SHA256ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7
SHA5126f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a
-
C:\Users\Admin\AppData\Local\Temp\7zS65A7.tmp\bmapppldmlkbjcbepjempdimppfdmnla\manifest.jsonFilesize
501B
MD59d9d74bfa8e9ace025b834b96419d05e
SHA1f5e56a100b0208b88335859cec692d867ffb572b
SHA256a54dc66b61256c08f2bf60f507673814d263effe532fd8e6e1e1d662eca1d265
SHA5124c8b216a781da9d366d5ea49e66dda6313c1f12947e59119782d14fe07ffa2db9de5b4e818f6e58088dd90f167ac8168796887676e0eacf7a86d2c9f7c3c1512
-
C:\Users\Admin\AppData\Local\Temp\7zS65A7.tmp\xoV2ZbiGao7SE4k.datFilesize
6KB
MD52fbd3934d4805fdaa67a014b15b5c1e9
SHA13607b36cf1e4d65decb05ae4cac89a65a6fa7b31
SHA2568dff4fa9960f74021090e38b7576d99fc7de0514e9b9067cf7a3e4833eacb419
SHA51246ba0c7901d7432490409e8e5f717fe7284caa338026ab103d7b6258baf556cb0f23cb9cdac10e3b649d20c140eaf59d0ecd52e25017417b2da3752aa73d38df
-
C:\Users\Admin\AppData\Local\Temp\7zS65A7.tmp\xoV2ZbiGao7SE4k.exeFilesize
772KB
MD54abcac1eb111b2788f36023711e193e0
SHA1c8e24c1a58cd988446d33797421c6049f6aab0c4
SHA256c54b01f36010744726e69c473ab871f3dd0503333a428fa09d7216c3c3d1d661
SHA512ee17678d90889efd8ed5541d0fb718df71cc9a4bc38247b93404a50974bfab521a16224c05ee883b350c8e4d85b00bf99a5a8441644d95acc94529d22970650e
-
C:\Users\Admin\AppData\Local\Temp\7zS65A7.tmp\xoV2ZbiGao7SE4k.exeFilesize
772KB
MD54abcac1eb111b2788f36023711e193e0
SHA1c8e24c1a58cd988446d33797421c6049f6aab0c4
SHA256c54b01f36010744726e69c473ab871f3dd0503333a428fa09d7216c3c3d1d661
SHA512ee17678d90889efd8ed5541d0fb718df71cc9a4bc38247b93404a50974bfab521a16224c05ee883b350c8e4d85b00bf99a5a8441644d95acc94529d22970650e
-
C:\Users\Admin\AppData\Local\Temp\7zS65A7.tmp\yocbfmojwiDpxQ.dllFilesize
751KB
MD587001de7a8833d23634ec0c0de46ed11
SHA1f882def1c6415a35de7e00689b48850fd4f8911b
SHA256a40c397aa1d9c03137df2edf100a2b26fe61b59d88ed3a61d8ad611a03adb2ef
SHA512f85974d0f67fb26a20ad168fe75b6934807f6c9cc89ac213dd76f2fd904e18082e4e3f4fde4e16e5cec71a8ed3f90f01d7f7f9cf7bbde566c81f3fbc410a8320
-
C:\Users\Admin\AppData\Local\Temp\7zS65A7.tmp\yocbfmojwiDpxQ.tlbFilesize
3KB
MD55fd1bc9f95b4e7a454686d485ecbffb8
SHA1ef424291398acd85b8ebb2d0cac0c713c362e160
SHA2568d3c02cc5277c8e19048fcdfbc924b0f3993503e77005299aa9babd3b0394370
SHA512da30648ec44ba495a2dac68aefb0cbbe9644f72dcec6cd4b96c261bdeccd61fceb85b1eab9f90c99fab89c55f2c69a0fb67e691e50b7fbb59533e7f0b0609c4c
-
C:\Users\Admin\AppData\Local\Temp\7zS65A7.tmp\yocbfmojwiDpxQ.x64.dllFilesize
893KB
MD5b96e579558a6cc0ddbb3d672d26dd1ef
SHA1d568cc1ac22ada8f0703bf6a5c5bb836a578ce44
SHA25672f2e5818632af4cb7bb0adf08831852c7a55704c8a10e7a231da08fd2a20bfd
SHA512f77e402ab40f76a70ac9a5b77ba8e8040735646afa7b92a3d333ce1504be18023a30a9f0ff6e99c751fafd92776f56b7980b98a191ec92c6c11f0a1acc759e01
-
\Program Files (x86)\PriceLess\yocbfmojwiDpxQ.dllFilesize
751KB
MD587001de7a8833d23634ec0c0de46ed11
SHA1f882def1c6415a35de7e00689b48850fd4f8911b
SHA256a40c397aa1d9c03137df2edf100a2b26fe61b59d88ed3a61d8ad611a03adb2ef
SHA512f85974d0f67fb26a20ad168fe75b6934807f6c9cc89ac213dd76f2fd904e18082e4e3f4fde4e16e5cec71a8ed3f90f01d7f7f9cf7bbde566c81f3fbc410a8320
-
\Program Files (x86)\PriceLess\yocbfmojwiDpxQ.x64.dllFilesize
893KB
MD5b96e579558a6cc0ddbb3d672d26dd1ef
SHA1d568cc1ac22ada8f0703bf6a5c5bb836a578ce44
SHA25672f2e5818632af4cb7bb0adf08831852c7a55704c8a10e7a231da08fd2a20bfd
SHA512f77e402ab40f76a70ac9a5b77ba8e8040735646afa7b92a3d333ce1504be18023a30a9f0ff6e99c751fafd92776f56b7980b98a191ec92c6c11f0a1acc759e01
-
\Program Files (x86)\PriceLess\yocbfmojwiDpxQ.x64.dllFilesize
893KB
MD5b96e579558a6cc0ddbb3d672d26dd1ef
SHA1d568cc1ac22ada8f0703bf6a5c5bb836a578ce44
SHA25672f2e5818632af4cb7bb0adf08831852c7a55704c8a10e7a231da08fd2a20bfd
SHA512f77e402ab40f76a70ac9a5b77ba8e8040735646afa7b92a3d333ce1504be18023a30a9f0ff6e99c751fafd92776f56b7980b98a191ec92c6c11f0a1acc759e01
-
\Users\Admin\AppData\Local\Temp\7zS65A7.tmp\xoV2ZbiGao7SE4k.exeFilesize
772KB
MD54abcac1eb111b2788f36023711e193e0
SHA1c8e24c1a58cd988446d33797421c6049f6aab0c4
SHA256c54b01f36010744726e69c473ab871f3dd0503333a428fa09d7216c3c3d1d661
SHA512ee17678d90889efd8ed5541d0fb718df71cc9a4bc38247b93404a50974bfab521a16224c05ee883b350c8e4d85b00bf99a5a8441644d95acc94529d22970650e
-
memory/580-73-0x0000000000000000-mapping.dmp
-
memory/1400-77-0x0000000000000000-mapping.dmp
-
memory/1400-78-0x000007FEFBFC1000-0x000007FEFBFC3000-memory.dmpFilesize
8KB
-
memory/1728-54-0x0000000075881000-0x0000000075883000-memory.dmpFilesize
8KB
-
memory/2032-56-0x0000000000000000-mapping.dmp