Analysis

  • max time kernel
    35s
  • max time network
    41s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25/11/2022, 13:55

General

  • Target

    b6cc6d80f01683cb9c13e2055f8eeed7155e7639453c592d0476cf89b3869905.exe

  • Size

    2.0MB

  • MD5

    bc9db3fcbeb0b535cb6c58384629ce09

  • SHA1

    2c74f114e8190ca0c9335cc39d986ee803855503

  • SHA256

    b6cc6d80f01683cb9c13e2055f8eeed7155e7639453c592d0476cf89b3869905

  • SHA512

    c112022d11c49e9fd9d1d4b2355fcb5cef53b6e1496dc3217baa1316741be3e501a889e67bd5b90c19d57f7490ac8cd95cf0cf44f1e18fc90bec839d98436c56

  • SSDEEP

    24576:h1OYdaOWSuVW1jLH2NuSk/EWygQAlHE/HsvleTzEmupJcjoCQ40MMvppEWJbjSSu:h1OsDyjkEWygQuk/HsNyz2pJxCeg3j9

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 3 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 11 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 8 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b6cc6d80f01683cb9c13e2055f8eeed7155e7639453c592d0476cf89b3869905.exe
    "C:\Users\Admin\AppData\Local\Temp\b6cc6d80f01683cb9c13e2055f8eeed7155e7639453c592d0476cf89b3869905.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1344
    • C:\Users\Admin\AppData\Local\Temp\7zS7781.tmp\HWVoC984QKVbkJx.exe
      .\HWVoC984QKVbkJx.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops Chrome extension
      • Installs/modifies Browser Helper Object
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:1556
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32.exe /s "C:\Program Files (x86)\GOSauvee\6QquKnv948m5PD.x64.dll"
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:952
        • C:\Windows\system32\regsvr32.exe
          /s "C:\Program Files (x86)\GOSauvee\6QquKnv948m5PD.x64.dll"
          4⤵
          • Loads dropped DLL
          • Installs/modifies Browser Helper Object
          PID:1936

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\GOSauvee\6QquKnv948m5PD.dat

          Filesize

          6KB

          MD5

          37c5afc8e197073bad304b7c8cf2c14d

          SHA1

          248605e9429c662d56bb7ddd0b2c48a9adfcd700

          SHA256

          6f4b3508fd350ab172340d5f32c91d189d9e02894d6916b95540707c357638d2

          SHA512

          5399665095647c6f33b484b9398b8bf37779b74fe5db5e9594a31c5259a8f31a550d0d8e57b254d3330a07322dba45b62cd6b5f43870801be34b32d95ecb0efb

        • C:\Program Files (x86)\GOSauvee\6QquKnv948m5PD.x64.dll

          Filesize

          679KB

          MD5

          2248a27000a39605618b39ed313bb860

          SHA1

          dc83459cd843029e7e1ae82dee04c7a930a16bf8

          SHA256

          39f7f2287a8604c54e11b83e4ec834b8f2c9a528c231bf98c2b8b38949ab4d18

          SHA512

          b4207d8b954bbeb466c59c883d09de11a3c3e1169f531cfbc853fa9c6f34a1b786999b334f73637a243ba08f0a532a7f672772acb7f27d31820fcf49ca74d801

        • C:\Users\Admin\AppData\Local\Temp\7zS7781.tmp\6QquKnv948m5PD.dll

          Filesize

          601KB

          MD5

          b2d96a149b60854cc5b1507669d2a304

          SHA1

          bdc467f91f97157135a105655a64cdbe0329726e

          SHA256

          0cf7b5e1246bb9e2ffd69eac2374f058415680a2b8c83e973c56704686f7732c

          SHA512

          169123d99ac34c6905abbe3f5bcb8b0f56e7c5ac5f4b51c9fd66d71c629aa71fab5f968d8b864c477fe63c47cede0fb2e59ce531f923d0e6b4729c462cead138

        • C:\Users\Admin\AppData\Local\Temp\7zS7781.tmp\6QquKnv948m5PD.tlb

          Filesize

          3KB

          MD5

          ed92e596a3dd1aeb2a2a6f9507d95bd6

          SHA1

          f9e9123daf4781d41717e4a6be6e8f53d021a649

          SHA256

          434a86d8dcdfc895780d8346f36c99e5cde98bc919590af06d07f1e73745ee58

          SHA512

          ed3c52387f6e7d173c7058f13238be3a6604dd98b86cc03831ec737d43b2d2060182e2d9865b3c13d5dc39fcc7286cb589c041ba75999ca075d1e9237fab3473

        • C:\Users\Admin\AppData\Local\Temp\7zS7781.tmp\6QquKnv948m5PD.x64.dll

          Filesize

          679KB

          MD5

          2248a27000a39605618b39ed313bb860

          SHA1

          dc83459cd843029e7e1ae82dee04c7a930a16bf8

          SHA256

          39f7f2287a8604c54e11b83e4ec834b8f2c9a528c231bf98c2b8b38949ab4d18

          SHA512

          b4207d8b954bbeb466c59c883d09de11a3c3e1169f531cfbc853fa9c6f34a1b786999b334f73637a243ba08f0a532a7f672772acb7f27d31820fcf49ca74d801

        • C:\Users\Admin\AppData\Local\Temp\7zS7781.tmp\HWVoC984QKVbkJx.dat

          Filesize

          6KB

          MD5

          37c5afc8e197073bad304b7c8cf2c14d

          SHA1

          248605e9429c662d56bb7ddd0b2c48a9adfcd700

          SHA256

          6f4b3508fd350ab172340d5f32c91d189d9e02894d6916b95540707c357638d2

          SHA512

          5399665095647c6f33b484b9398b8bf37779b74fe5db5e9594a31c5259a8f31a550d0d8e57b254d3330a07322dba45b62cd6b5f43870801be34b32d95ecb0efb

        • C:\Users\Admin\AppData\Local\Temp\7zS7781.tmp\HWVoC984QKVbkJx.exe

          Filesize

          649KB

          MD5

          524bc23df65cfdcc39056b69feba32e5

          SHA1

          2a88ec175c164ff14b69d1d5b21384e60400a191

          SHA256

          0d0d750316b3e35d6c625c8b883fcffa80ffff52c24921f324baf0197b89dcea

          SHA512

          483f1c25253ec362be18b1640bf24cca9439d843f12011c56a9c67f2a7622c3d26b6f1bb4e16e4435edf371a4dcb637d625ef1bceda7d1e0d76cb8accbdb67bd

        • C:\Users\Admin\AppData\Local\Temp\7zS7781.tmp\HWVoC984QKVbkJx.exe

          Filesize

          649KB

          MD5

          524bc23df65cfdcc39056b69feba32e5

          SHA1

          2a88ec175c164ff14b69d1d5b21384e60400a191

          SHA256

          0d0d750316b3e35d6c625c8b883fcffa80ffff52c24921f324baf0197b89dcea

          SHA512

          483f1c25253ec362be18b1640bf24cca9439d843f12011c56a9c67f2a7622c3d26b6f1bb4e16e4435edf371a4dcb637d625ef1bceda7d1e0d76cb8accbdb67bd

        • C:\Users\Admin\AppData\Local\Temp\7zS7781.tmp\cejdidfgjacaafihcccjlmkcaepilaep\Cluc3P.js

          Filesize

          5KB

          MD5

          51cf4010d3971205182830b8a603d80c

          SHA1

          6cc4206d6d918b7a52031b1c795887b72ca5e3ff

          SHA256

          cc2fb3fa7e31cfc4ad2ed2375fbb606a6bad157f459ae8e4875f4b365372e198

          SHA512

          f32807d8f69946a1ba9b84ab7ea2253240454dfa0841b5904d0a5804121e64ea353d608c18c91d13d0a54f8497d8a651288e29384b04a82e5cc60b396643f33b

        • C:\Users\Admin\AppData\Local\Temp\7zS7781.tmp\cejdidfgjacaafihcccjlmkcaepilaep\background.html

          Filesize

          143B

          MD5

          36de5fd8fcf7749d184999b0574b120c

          SHA1

          3568eae1e457acf7b365968c6bc86a47b5c04347

          SHA256

          49c6a749759c714ab872d5226afd39de2cc3c962e799c30259ec755b978fa620

          SHA512

          4b81d73ae8dee116c38b48804e99ea4107b34d956fdc821b3e5c0431608ee9b1567129e6ba75c37cde72f19ab2d27d1ba224abbb61fcbad74129da4bafa4c88e

        • C:\Users\Admin\AppData\Local\Temp\7zS7781.tmp\cejdidfgjacaafihcccjlmkcaepilaep\content.js

          Filesize

          144B

          MD5

          fca19198fd8af21016a8b1dec7980002

          SHA1

          fd01a47d14004e17a625efe66cc46a06c786cf40

          SHA256

          332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a

          SHA512

          60f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47

        • C:\Users\Admin\AppData\Local\Temp\7zS7781.tmp\cejdidfgjacaafihcccjlmkcaepilaep\lsdb.js

          Filesize

          531B

          MD5

          36d98318ab2b3b2585a30984db328afb

          SHA1

          f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5

          SHA256

          ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7

          SHA512

          6f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a

        • C:\Users\Admin\AppData\Local\Temp\7zS7781.tmp\cejdidfgjacaafihcccjlmkcaepilaep\manifest.json

          Filesize

          500B

          MD5

          63690fd396fc24593e9b031415d7923e

          SHA1

          f14fbcf0894f3f3c400c119d106270e594b3cfa3

          SHA256

          a888d93a2d14791e67d427f1d75ec54085f9fcb6dde1d151aeddf4639b0645d3

          SHA512

          0ab7e56d7ae5cc3053af1fbe41502294979bcdaae2098964d360e433518e6a00d2222adb90af06bdd78b504cd7dead095b8667d81dd22297887f65a9230c9d90

        • C:\Users\Admin\AppData\Local\Temp\7zS7781.tmp\[email protected]\bootstrap.js

          Filesize

          2KB

          MD5

          df13f711e20e9c80171846d4f2f7ae06

          SHA1

          56d29cda58427efe0e21d3880d39eb1b0ef60bee

          SHA256

          6c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4

          SHA512

          6c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e

        • C:\Users\Admin\AppData\Local\Temp\7zS7781.tmp\[email protected]\chrome.manifest

          Filesize

          35B

          MD5

          5256c34df27232c4ae31ba6fa959011c

          SHA1

          2a09d2a8b849d3f8f40bd21a30f724af6959c823

          SHA256

          1c717587b295174fdab52bfde0fcd7ae376f8f10aea5145ff0ff3124295642d5

          SHA512

          080d29fba127735d2cf720763ffc4b208a759b05a0ba1c1567261d331a84f4a02f2b1c2eb17e1201892aacdf8d103172ad1c1df111c2b2456b5c1a3cac8e2c6c

        • C:\Users\Admin\AppData\Local\Temp\7zS7781.tmp\[email protected]\content\bg.js

          Filesize

          7KB

          MD5

          307c6356d52b207feb55436f7b259ab9

          SHA1

          11f937bab985da52f280e92a7bb00920a0b0e5b7

          SHA256

          fdd20065d72621c548e5e65a470bbd07f70f3e03f9d990d3d009946cb6ecb877

          SHA512

          d8bb546d911b85e9c3fb45e74ff71817df1154b1c4dc8196e610bc55a3e49b4e75843aef371c677d2effe2c3a170e89a6b69485cb2daa1d11e9c4d7c138e0200

        • C:\Users\Admin\AppData\Local\Temp\7zS7781.tmp\[email protected]\install.rdf

          Filesize

          593B

          MD5

          14104b5ad867b5d452c064a1d28f3c31

          SHA1

          ec7b8142e0a60546b96702b6af87257ec8dee2c5

          SHA256

          515704e7c5c6b9091934c32a7afe63e61e89b585d1bda8398064b13024bf7cb7

          SHA512

          a7a5c521d958c85ef81066162ae4102a9931d1a9991b153bf27b1107c54084d9099eef0c620ccb32b0cf027ebb1b6a53de80916f04f16c775b27907661b1af7d

        • \Program Files (x86)\GOSauvee\6QquKnv948m5PD.dll

          Filesize

          601KB

          MD5

          b2d96a149b60854cc5b1507669d2a304

          SHA1

          bdc467f91f97157135a105655a64cdbe0329726e

          SHA256

          0cf7b5e1246bb9e2ffd69eac2374f058415680a2b8c83e973c56704686f7732c

          SHA512

          169123d99ac34c6905abbe3f5bcb8b0f56e7c5ac5f4b51c9fd66d71c629aa71fab5f968d8b864c477fe63c47cede0fb2e59ce531f923d0e6b4729c462cead138

        • \Program Files (x86)\GOSauvee\6QquKnv948m5PD.x64.dll

          Filesize

          679KB

          MD5

          2248a27000a39605618b39ed313bb860

          SHA1

          dc83459cd843029e7e1ae82dee04c7a930a16bf8

          SHA256

          39f7f2287a8604c54e11b83e4ec834b8f2c9a528c231bf98c2b8b38949ab4d18

          SHA512

          b4207d8b954bbeb466c59c883d09de11a3c3e1169f531cfbc853fa9c6f34a1b786999b334f73637a243ba08f0a532a7f672772acb7f27d31820fcf49ca74d801

        • \Program Files (x86)\GOSauvee\6QquKnv948m5PD.x64.dll

          Filesize

          679KB

          MD5

          2248a27000a39605618b39ed313bb860

          SHA1

          dc83459cd843029e7e1ae82dee04c7a930a16bf8

          SHA256

          39f7f2287a8604c54e11b83e4ec834b8f2c9a528c231bf98c2b8b38949ab4d18

          SHA512

          b4207d8b954bbeb466c59c883d09de11a3c3e1169f531cfbc853fa9c6f34a1b786999b334f73637a243ba08f0a532a7f672772acb7f27d31820fcf49ca74d801

        • \Users\Admin\AppData\Local\Temp\7zS7781.tmp\HWVoC984QKVbkJx.exe

          Filesize

          649KB

          MD5

          524bc23df65cfdcc39056b69feba32e5

          SHA1

          2a88ec175c164ff14b69d1d5b21384e60400a191

          SHA256

          0d0d750316b3e35d6c625c8b883fcffa80ffff52c24921f324baf0197b89dcea

          SHA512

          483f1c25253ec362be18b1640bf24cca9439d843f12011c56a9c67f2a7622c3d26b6f1bb4e16e4435edf371a4dcb637d625ef1bceda7d1e0d76cb8accbdb67bd

        • memory/1344-54-0x0000000074F41000-0x0000000074F43000-memory.dmp

          Filesize

          8KB

        • memory/1936-78-0x000007FEFBAE1000-0x000007FEFBAE3000-memory.dmp

          Filesize

          8KB