Analysis

  • max time kernel
    91s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2022 03:43

General

  • Target

    262df9260b5bd63d6862efdead6a56bb89476ab9730233525d705e02d5a064aa.exe

  • Size

    4.6MB

  • MD5

    82785805b50a6fdae1a07c7d15987180

  • SHA1

    4847916e5782f741535d98177f83fc767ca74652

  • SHA256

    262df9260b5bd63d6862efdead6a56bb89476ab9730233525d705e02d5a064aa

  • SHA512

    06744ac273fe99a7bea0ef3709afef074eaf376c1758f37f6059478a1e3e004da1fd1e6e6388e32607499b448599114325fd0049b8085ceb9c11822fd0b7a2bc

  • SSDEEP

    98304:kcNYTQWN2AY10jOcT/4Akx+YmZW9f+WcZV:DY4XAkxOPV

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs 4 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 8 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 8 IoCs
  • Modifies Internet Explorer settings 1 TTPs 8 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\262df9260b5bd63d6862efdead6a56bb89476ab9730233525d705e02d5a064aa.exe
    "C:\Users\Admin\AppData\Local\Temp\262df9260b5bd63d6862efdead6a56bb89476ab9730233525d705e02d5a064aa.exe"
    1⤵
    • Loads dropped DLL
    • Installs/modifies Browser Helper Object
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:4872
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32.exe /s "C:\Program Files (x86)\YoutubeAdBlocke\3oBuOyuk7ePrKD.x64.dll"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2396
      • C:\Windows\system32\regsvr32.exe
        /s "C:\Program Files (x86)\YoutubeAdBlocke\3oBuOyuk7ePrKD.x64.dll"
        3⤵
        • Registers COM server for autorun
        • Loads dropped DLL
        • Installs/modifies Browser Helper Object
        • Modifies Internet Explorer settings
        • Modifies registry class
        PID:3188

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Browser Extensions

1
T1176

Defense Evasion

Modify Registry

3
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\YoutubeAdBlocke\3oBuOyuk7ePrKD.dat
    Filesize

    4KB

    MD5

    6a10793ef7abfe4c8d7d01c3b25754a3

    SHA1

    c2eb6dd4ffca2bebfbc090ad87226116797d1017

    SHA256

    b732657b3cbee7ca5209e68482c9f2df1137fc2d7caeb8726ad9f5f452725b8f

    SHA512

    decb1d7bd0e2503ca1d40a5b02495dff9eff074e111a9b15648a31f01cbb6dee9d7e0b691805658533a41147f96aa6f4ff9ccb5d4ec3b2000519d542a7964a13

  • C:\Program Files (x86)\YoutubeAdBlocke\3oBuOyuk7ePrKD.dll
    Filesize

    741KB

    MD5

    0f2db92a7d763af605b6273a4aa18382

    SHA1

    c9e6e9eb3c2050c86afa1b79e437ea8c8252573f

    SHA256

    ebdf480f55d619da9a5f23810ef174f5e789d81899bf4f63371cfd95e402658a

    SHA512

    824230a31cd7e7410c369dae190c1a3bec7498f52740b484e5d09c76265dbd71fb989f5ce889ca8a4f1ae28eb740e39d020b9581aa0496ae394d6ff3874038e5

  • C:\Program Files (x86)\YoutubeAdBlocke\3oBuOyuk7ePrKD.tlb
    Filesize

    3KB

    MD5

    b826030b97202e2efa7f7a60493c61a7

    SHA1

    8145289ac846d579df907dc43fa79fa5866f2930

    SHA256

    df318425290a57dbdaffd19be838eb1317d38d00be224272168375251cb2f83f

    SHA512

    246becba94b93fa2e79e9938efe94fd325e18ecd1ce93f642e184ba89d230a5cdf5596272e6ace3a7e9440e5aa9eb153bb8bc5ab6f3bc518fca9b790d4f8d6db

  • C:\Program Files (x86)\YoutubeAdBlocke\3oBuOyuk7ePrKD.x64.dll
    Filesize

    879KB

    MD5

    0b282547d65c4597ac0f2c5cc09c3b37

    SHA1

    43a626f01c7ead04cee4b8523b02ee7248271051

    SHA256

    c8dbfff7b084eb5ff31be01fbd03f392b4c7cb192e904810c7a9e60b985be846

    SHA512

    541a816d8981656a697f96a89daad2a2d84c9f4a0769175babf8a2785ad6580c2fc3180575a8feeab39f5956176ef4ed4c80f433b557775c359ca3659219da30

  • C:\Program Files (x86)\YoutubeAdBlocke\3oBuOyuk7ePrKD.x64.dll
    Filesize

    879KB

    MD5

    0b282547d65c4597ac0f2c5cc09c3b37

    SHA1

    43a626f01c7ead04cee4b8523b02ee7248271051

    SHA256

    c8dbfff7b084eb5ff31be01fbd03f392b4c7cb192e904810c7a9e60b985be846

    SHA512

    541a816d8981656a697f96a89daad2a2d84c9f4a0769175babf8a2785ad6580c2fc3180575a8feeab39f5956176ef4ed4c80f433b557775c359ca3659219da30

  • C:\Program Files (x86)\YoutubeAdBlocke\3oBuOyuk7ePrKD.x64.dll
    Filesize

    879KB

    MD5

    0b282547d65c4597ac0f2c5cc09c3b37

    SHA1

    43a626f01c7ead04cee4b8523b02ee7248271051

    SHA256

    c8dbfff7b084eb5ff31be01fbd03f392b4c7cb192e904810c7a9e60b985be846

    SHA512

    541a816d8981656a697f96a89daad2a2d84c9f4a0769175babf8a2785ad6580c2fc3180575a8feeab39f5956176ef4ed4c80f433b557775c359ca3659219da30

  • memory/2396-138-0x0000000000000000-mapping.dmp
  • memory/3188-141-0x0000000000000000-mapping.dmp
  • memory/4872-132-0x0000000003510000-0x00000000035D7000-memory.dmp
    Filesize

    796KB