Analysis

  • max time kernel
    91s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2022 07:51

General

  • Target

    5a04cf35851abe115775db16526b2cd75da93a42112a42bcdaa9429ebefc4040.exe

  • Size

    3.8MB

  • MD5

    2cb206017f00720a63b4a82e8fae6ecd

  • SHA1

    f54a4866e10674dead6fab4f872fd2686612177d

  • SHA256

    5a04cf35851abe115775db16526b2cd75da93a42112a42bcdaa9429ebefc4040

  • SHA512

    19cd9a742afbb5d6451b21b741e5dc826d4d096d9f1475abcc6ed9640ef1c29b1a53da462dc79aa5524027d1c8be171435d02569ff4c624d4038383fdd068705

  • SSDEEP

    98304:u7QXHhOlA3138ESBHN2bsNgGcw/3r12W:u78++S5Nsmgtw/3r

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs 4 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 8 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 8 IoCs
  • Modifies Internet Explorer settings 1 TTPs 8 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5a04cf35851abe115775db16526b2cd75da93a42112a42bcdaa9429ebefc4040.exe
    "C:\Users\Admin\AppData\Local\Temp\5a04cf35851abe115775db16526b2cd75da93a42112a42bcdaa9429ebefc4040.exe"
    1⤵
    • Loads dropped DLL
    • Installs/modifies Browser Helper Object
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:516
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32.exe /s "C:\Program Files (x86)\YoutuibeAdBllocke\6ZG2Tr7Gvm1Wm5.x64.dll"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1412
      • C:\Windows\system32\regsvr32.exe
        /s "C:\Program Files (x86)\YoutuibeAdBllocke\6ZG2Tr7Gvm1Wm5.x64.dll"
        3⤵
        • Registers COM server for autorun
        • Loads dropped DLL
        • Installs/modifies Browser Helper Object
        • Modifies Internet Explorer settings
        • Modifies registry class
        PID:3424

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\YoutuibeAdBllocke\6ZG2Tr7Gvm1Wm5.dat
    Filesize

    4KB

    MD5

    3f2815fd8197edb75b6114db987c9819

    SHA1

    8a3a82da1c4e825d9cb8c1c0a57a9a3ad451d605

    SHA256

    644e1d456a9691e06c06281b136ea6aa51ab8abba0c7793bd291006d7d80cde6

    SHA512

    88ff9f49abe283be5b4e8bf04ca7768660e6602c9a28d3622c0c6670d4a312263f3c54d93ae3efedccae14d08d09caed07f31b267e1fee4bad341fc6fce2b06b

  • C:\Program Files (x86)\YoutuibeAdBllocke\6ZG2Tr7Gvm1Wm5.dll
    Filesize

    625KB

    MD5

    49e3aa05fd12d46378562076ba891c45

    SHA1

    f0148c9fa6c1e85fc5de0dc6ba431afce879a413

    SHA256

    e6b44a59abdb03063677994a629f9fedfcdf6d260f08fe0c3310f695ffe07a03

    SHA512

    5b3a621b346be1b491532852986f81e760f5c3bf6da37a7322450158eb55a909f7aab64ea23e66460b1391befced96773848df8c0d1a97c10c8c4a29d8e73d63

  • C:\Program Files (x86)\YoutuibeAdBllocke\6ZG2Tr7Gvm1Wm5.tlb
    Filesize

    3KB

    MD5

    36d231ded951508eeebd6bbef5735022

    SHA1

    7949bcdbce50763c077b5d246fa2b5905441a93f

    SHA256

    24f68061351b8581b5957f809f633d7d1ead66a63ed15bea75eb4a6a34065b35

    SHA512

    739df458e0b7f5ee723efb3f2000eb597a1925cafd5d8d9820af80d3e5ec5d9d05be4a3812e05a66626ec0cc9016c26747b4f32ea295adad3b8cd9dccbe9980f

  • C:\Program Files (x86)\YoutuibeAdBllocke\6ZG2Tr7Gvm1Wm5.x64.dll
    Filesize

    705KB

    MD5

    d0dddc88b23690f45e8ed5961c6adc3b

    SHA1

    13a26135ab4d5ead0ac5f9085d93668f47a213c8

    SHA256

    ce01d16963d962552d89e2ca5b4d4d8fef18d58b534c4646f59ef01516f1f133

    SHA512

    3cb3f9287ec33c2557107c07786167e71eac14aff6d1b99d5622c1fd8c641e9a64a24c47d2bd21a7d2b2f50a86173e383278e538bb15e2d813ed6f80f1781b43

  • C:\Program Files (x86)\YoutuibeAdBllocke\6ZG2Tr7Gvm1Wm5.x64.dll
    Filesize

    705KB

    MD5

    d0dddc88b23690f45e8ed5961c6adc3b

    SHA1

    13a26135ab4d5ead0ac5f9085d93668f47a213c8

    SHA256

    ce01d16963d962552d89e2ca5b4d4d8fef18d58b534c4646f59ef01516f1f133

    SHA512

    3cb3f9287ec33c2557107c07786167e71eac14aff6d1b99d5622c1fd8c641e9a64a24c47d2bd21a7d2b2f50a86173e383278e538bb15e2d813ed6f80f1781b43

  • C:\Program Files (x86)\YoutuibeAdBllocke\6ZG2Tr7Gvm1Wm5.x64.dll
    Filesize

    705KB

    MD5

    d0dddc88b23690f45e8ed5961c6adc3b

    SHA1

    13a26135ab4d5ead0ac5f9085d93668f47a213c8

    SHA256

    ce01d16963d962552d89e2ca5b4d4d8fef18d58b534c4646f59ef01516f1f133

    SHA512

    3cb3f9287ec33c2557107c07786167e71eac14aff6d1b99d5622c1fd8c641e9a64a24c47d2bd21a7d2b2f50a86173e383278e538bb15e2d813ed6f80f1781b43

  • memory/516-132-0x0000000002EA0000-0x0000000002F42000-memory.dmp
    Filesize

    648KB

  • memory/1412-138-0x0000000000000000-mapping.dmp
  • memory/3424-141-0x0000000000000000-mapping.dmp