Analysis
-
max time kernel
46s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 13:31
Static task
static1
Behavioral task
behavioral1
Sample
e6bd97f6d5ce039901f00ae862e61348c8c2798d099dec5eb4f1ebfa3b5ccfd6.exe
Resource
win7-20220812-en
General
-
Target
e6bd97f6d5ce039901f00ae862e61348c8c2798d099dec5eb4f1ebfa3b5ccfd6.exe
-
Size
2.0MB
-
MD5
36760c20fab79991bc9bca1a291d6106
-
SHA1
16e2dfaab63579285773934620a3aa9dcf8c930c
-
SHA256
e6bd97f6d5ce039901f00ae862e61348c8c2798d099dec5eb4f1ebfa3b5ccfd6
-
SHA512
4961edb1786818dfd4f6825c60f6d7280b58c677dd2981a6d3fd9321f56b0e8e71b9915f3b19c9b74a7bdfae81954598d744fa35e246fcb9f81319f1990c1168
-
SSDEEP
49152:h1OswUpag+Qk/+ouXBVm/KLp0f5fR6Tu3PHYwxzILQJsa7/:h1O7UpAWouXBVm/KLp0+Tu3j/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1900 msxRIDySBzkEgMR.exe -
Loads dropped DLL 4 IoCs
pid Process 908 e6bd97f6d5ce039901f00ae862e61348c8c2798d099dec5eb4f1ebfa3b5ccfd6.exe 1900 msxRIDySBzkEgMR.exe 1988 regsvr32.exe 2000 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\cefbhdfneplhkklabmmafmmmkinpmgii\200\manifest.json msxRIDySBzkEgMR.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\cefbhdfneplhkklabmmafmmmkinpmgii\200\manifest.json msxRIDySBzkEgMR.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\cefbhdfneplhkklabmmafmmmkinpmgii\200\manifest.json msxRIDySBzkEgMR.exe -
Installs/modifies Browser Helper Object 2 TTPs 11 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} msxRIDySBzkEgMR.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects msxRIDySBzkEgMR.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DBC80044-A445-435B-BC74-9C25C1C588A9} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} msxRIDySBzkEgMR.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\ msxRIDySBzkEgMR.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{18DF081C-E8AD-4283-A596-FA578C2EBDC3} msxRIDySBzkEgMR.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\BrioawseraiShopo\djKAQxxXFlNJxt.tlb msxRIDySBzkEgMR.exe File created C:\Program Files (x86)\BrioawseraiShopo\djKAQxxXFlNJxt.dat msxRIDySBzkEgMR.exe File opened for modification C:\Program Files (x86)\BrioawseraiShopo\djKAQxxXFlNJxt.dat msxRIDySBzkEgMR.exe File created C:\Program Files (x86)\BrioawseraiShopo\djKAQxxXFlNJxt.x64.dll msxRIDySBzkEgMR.exe File opened for modification C:\Program Files (x86)\BrioawseraiShopo\djKAQxxXFlNJxt.x64.dll msxRIDySBzkEgMR.exe File created C:\Program Files (x86)\BrioawseraiShopo\djKAQxxXFlNJxt.dll msxRIDySBzkEgMR.exe File opened for modification C:\Program Files (x86)\BrioawseraiShopo\djKAQxxXFlNJxt.dll msxRIDySBzkEgMR.exe File created C:\Program Files (x86)\BrioawseraiShopo\djKAQxxXFlNJxt.tlb msxRIDySBzkEgMR.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 908 wrote to memory of 1900 908 e6bd97f6d5ce039901f00ae862e61348c8c2798d099dec5eb4f1ebfa3b5ccfd6.exe 27 PID 908 wrote to memory of 1900 908 e6bd97f6d5ce039901f00ae862e61348c8c2798d099dec5eb4f1ebfa3b5ccfd6.exe 27 PID 908 wrote to memory of 1900 908 e6bd97f6d5ce039901f00ae862e61348c8c2798d099dec5eb4f1ebfa3b5ccfd6.exe 27 PID 908 wrote to memory of 1900 908 e6bd97f6d5ce039901f00ae862e61348c8c2798d099dec5eb4f1ebfa3b5ccfd6.exe 27 PID 1900 wrote to memory of 1988 1900 msxRIDySBzkEgMR.exe 28 PID 1900 wrote to memory of 1988 1900 msxRIDySBzkEgMR.exe 28 PID 1900 wrote to memory of 1988 1900 msxRIDySBzkEgMR.exe 28 PID 1900 wrote to memory of 1988 1900 msxRIDySBzkEgMR.exe 28 PID 1900 wrote to memory of 1988 1900 msxRIDySBzkEgMR.exe 28 PID 1900 wrote to memory of 1988 1900 msxRIDySBzkEgMR.exe 28 PID 1900 wrote to memory of 1988 1900 msxRIDySBzkEgMR.exe 28 PID 1988 wrote to memory of 2000 1988 regsvr32.exe 29 PID 1988 wrote to memory of 2000 1988 regsvr32.exe 29 PID 1988 wrote to memory of 2000 1988 regsvr32.exe 29 PID 1988 wrote to memory of 2000 1988 regsvr32.exe 29 PID 1988 wrote to memory of 2000 1988 regsvr32.exe 29 PID 1988 wrote to memory of 2000 1988 regsvr32.exe 29 PID 1988 wrote to memory of 2000 1988 regsvr32.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\e6bd97f6d5ce039901f00ae862e61348c8c2798d099dec5eb4f1ebfa3b5ccfd6.exe"C:\Users\Admin\AppData\Local\Temp\e6bd97f6d5ce039901f00ae862e61348c8c2798d099dec5eb4f1ebfa3b5ccfd6.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Users\Admin\AppData\Local\Temp\7zS76A7.tmp\msxRIDySBzkEgMR.exe.\msxRIDySBzkEgMR.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\BrioawseraiShopo\djKAQxxXFlNJxt.x64.dll"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\BrioawseraiShopo\djKAQxxXFlNJxt.x64.dll"4⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
PID:2000
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD53f38f106b6913261a1b877c499e70c67
SHA16a11a5b105abc20fcad18f660988f2201f192f0e
SHA25659a5b76b93e7739edc09ec4481ead0a66be6d0a2227985e8d6c0d5dbb5386b4b
SHA5124d528eb5a63e3d918ae85de2255270a4df8462bae0cba464804d61cd43e3ac280a5aeaf26bcb129da8e5d641202ba19a459e123b1e74052e11960a9e6be28e2e
-
Filesize
692KB
MD5102c2708ee5aa0517e6fa7f99c6053a1
SHA1b10a0ebb2cb5f8a053676453276a592cff7b7162
SHA256ff7241a27f9ac5f85457bd96e78a29dfe127a7a1471e4880a42267505784d69d
SHA512ae9186f96b6ff1befa2c64260b74e2d0f47295828ded8b3148e1838611ad6461eab45caa37afb90c9bc3b363a655c226f7abe6a2b3bc21ef0514f5c5ab860f0f
-
C:\Users\Admin\AppData\Local\Temp\7zS76A7.tmp\[email protected]\bootstrap.js
Filesize2KB
MD5df13f711e20e9c80171846d4f2f7ae06
SHA156d29cda58427efe0e21d3880d39eb1b0ef60bee
SHA2566c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4
SHA5126c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e
-
C:\Users\Admin\AppData\Local\Temp\7zS76A7.tmp\[email protected]\chrome.manifest
Filesize35B
MD53fb11131e269895e1ffe98c4174c40ec
SHA12da8aeeab79b97d9d2cbc688421a307223bcefce
SHA2566808cc69c05ef8c73c88f36d70c3fb72a5fe39d66f2b54abe07d85abc5b4f13d
SHA5120a14ade593c8df84fb882ee0702d26bb0b85e2e5f3e3aefdaf2abbb6f6275578f4057a065d0e9102583a2fd3dcf7d7374cc06fcbe5ee1c7cdbe1f7f5252eefd1
-
C:\Users\Admin\AppData\Local\Temp\7zS76A7.tmp\[email protected]\content\bg.js
Filesize7KB
MD5bc3eb39f615bfb89889a44e2f079b5e8
SHA150dec11b4a4534823249aa3af03466a14cb6ce52
SHA256a7fb8898ad42aa5aed8215fdd3cc9d563994096acfbc61a0145f04d5e6692e00
SHA512771dc1f31b8431f58b637068d3a1e92951441600b9d15f8e2aaf70520a787ca302e5d251a3c720ec4a9b53b4dad83630cc915fa0ec2e66a1856b6d59ac8e8209
-
C:\Users\Admin\AppData\Local\Temp\7zS76A7.tmp\[email protected]\install.rdf
Filesize605B
MD5e37e5cd831bce20615f5c43144573ed0
SHA17772636243c72c7e6551df4ae9e8440eeb223c0a
SHA256746c2a98fa10d56e3d7524a907ee4cd5328dee0ec057b6da6ad53ec4473d66eb
SHA51298ba586c90b29816cf1585bc50fdb511bed7dadcb478e3ba7492619d916755f645f88b59ade77d1fa5c90fd29db4fe2376a05ebddac34f12de5620f536bf59f0
-
Filesize
141B
MD552f75194daf2872e804fef89de62cac1
SHA1b39581096990c1a8e12bfc9260d7fb59b24124c8
SHA25607e096cb3f6754bae18b76f66a02b6d8504bd13c246e6736f706d83ef2347b92
SHA512ba1ebdcdacadcf2c63ef9c0410829f349a4e451feeae4d8e3378a6073f990819967601b31e5b4d355b8529f21601ff61e6f26d0b519851fe1ecdf73b6a959256
-
Filesize
144B
MD5fca19198fd8af21016a8b1dec7980002
SHA1fd01a47d14004e17a625efe66cc46a06c786cf40
SHA256332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a
SHA51260f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47
-
Filesize
531B
MD536d98318ab2b3b2585a30984db328afb
SHA1f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5
SHA256ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7
SHA5126f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a
-
Filesize
508B
MD54af5eedbadffc60dfaa8de68990ee4ec
SHA11ae3019089429e234db43071ceebbe84b7a789f0
SHA2566851487fcabe90d7695af0116c81032ec7ece43757c1424c6949d00b1f12f091
SHA51276741b06cf6c0a4ffdeb74e470ed495c2ddf6af7cdaaf7a64d7d86237d1831bbf1f60aa8ac23f801b3b770fe1392fd24399bc7761ed60776964ac84353ffe2cf
-
Filesize
5KB
MD516c937dd8dfae22d7e61726def4ce869
SHA1ddc8dc254f3991148eabedb8f6374302850357a0
SHA25650871fa8e3da7c0748022f2493c4d58f56c9f871b1cffc9d2227a5ae735e64a9
SHA512688256129d9607a68934a2c99a288bafa1e0f0b9ed49625a85c7ba14eb30dc7b18de539fa3aa0b106a7ae43f30eee7aecb30b68317743143b100cc4fb9ef86dd
-
Filesize
611KB
MD563adb99739052e3d6c04c799f7d43edc
SHA1f58f054cd6598ed22b70e4623312c2e8f1eba1d3
SHA2568cda707d508ffb1c1ce6e6066e2b7b782702f8935c7a6a4219f97d2b340efd53
SHA512232a9cd07a12918901fbea1b7e237cb6105b7c53dd00f0e7418cbc3dfbc462210b6f034db4e68eefbe671de62c43303c37ad67b802c8ad7a5ac2195ce527e673
-
Filesize
3KB
MD508b4ac9069400749555355a5f1e6b8ad
SHA1ec078fae45087bb2ab63497cd2b4b844c178ec3c
SHA256f996571eef02335d08b6c073024cef3ea616bb39f9d9742ffa6783f4e22c3997
SHA5125001f7ca20cca5e85f9c6c1d90ffc2f9a25606d877ee4e6d33a727b6f689989b0486dbea62c66d2d1097194a353566de9d8b6b2bff33613a7ab763c98ca1e1d0
-
Filesize
692KB
MD5102c2708ee5aa0517e6fa7f99c6053a1
SHA1b10a0ebb2cb5f8a053676453276a592cff7b7162
SHA256ff7241a27f9ac5f85457bd96e78a29dfe127a7a1471e4880a42267505784d69d
SHA512ae9186f96b6ff1befa2c64260b74e2d0f47295828ded8b3148e1838611ad6461eab45caa37afb90c9bc3b363a655c226f7abe6a2b3bc21ef0514f5c5ab860f0f
-
Filesize
6KB
MD53f38f106b6913261a1b877c499e70c67
SHA16a11a5b105abc20fcad18f660988f2201f192f0e
SHA25659a5b76b93e7739edc09ec4481ead0a66be6d0a2227985e8d6c0d5dbb5386b4b
SHA5124d528eb5a63e3d918ae85de2255270a4df8462bae0cba464804d61cd43e3ac280a5aeaf26bcb129da8e5d641202ba19a459e123b1e74052e11960a9e6be28e2e
-
Filesize
627KB
MD5cd2adf3ef46ba68dacaddef767a60926
SHA12936664364c94dbe44343dd0aa7de243c82582b0
SHA2567d37cc35dc3ae28943f203a0f8d62d0ffd838e9f63f667dc465fa0534fbc4cb1
SHA5123b7785f0b8346d179bce0eb8253a54975e41c99089719d1bc95e1bcf501ab13813ef6392fc2392d4af7225245f9836ba652abfc9eeea4cd3e678e9b1850ed222
-
Filesize
627KB
MD5cd2adf3ef46ba68dacaddef767a60926
SHA12936664364c94dbe44343dd0aa7de243c82582b0
SHA2567d37cc35dc3ae28943f203a0f8d62d0ffd838e9f63f667dc465fa0534fbc4cb1
SHA5123b7785f0b8346d179bce0eb8253a54975e41c99089719d1bc95e1bcf501ab13813ef6392fc2392d4af7225245f9836ba652abfc9eeea4cd3e678e9b1850ed222
-
Filesize
611KB
MD563adb99739052e3d6c04c799f7d43edc
SHA1f58f054cd6598ed22b70e4623312c2e8f1eba1d3
SHA2568cda707d508ffb1c1ce6e6066e2b7b782702f8935c7a6a4219f97d2b340efd53
SHA512232a9cd07a12918901fbea1b7e237cb6105b7c53dd00f0e7418cbc3dfbc462210b6f034db4e68eefbe671de62c43303c37ad67b802c8ad7a5ac2195ce527e673
-
Filesize
692KB
MD5102c2708ee5aa0517e6fa7f99c6053a1
SHA1b10a0ebb2cb5f8a053676453276a592cff7b7162
SHA256ff7241a27f9ac5f85457bd96e78a29dfe127a7a1471e4880a42267505784d69d
SHA512ae9186f96b6ff1befa2c64260b74e2d0f47295828ded8b3148e1838611ad6461eab45caa37afb90c9bc3b363a655c226f7abe6a2b3bc21ef0514f5c5ab860f0f
-
Filesize
692KB
MD5102c2708ee5aa0517e6fa7f99c6053a1
SHA1b10a0ebb2cb5f8a053676453276a592cff7b7162
SHA256ff7241a27f9ac5f85457bd96e78a29dfe127a7a1471e4880a42267505784d69d
SHA512ae9186f96b6ff1befa2c64260b74e2d0f47295828ded8b3148e1838611ad6461eab45caa37afb90c9bc3b363a655c226f7abe6a2b3bc21ef0514f5c5ab860f0f
-
Filesize
627KB
MD5cd2adf3ef46ba68dacaddef767a60926
SHA12936664364c94dbe44343dd0aa7de243c82582b0
SHA2567d37cc35dc3ae28943f203a0f8d62d0ffd838e9f63f667dc465fa0534fbc4cb1
SHA5123b7785f0b8346d179bce0eb8253a54975e41c99089719d1bc95e1bcf501ab13813ef6392fc2392d4af7225245f9836ba652abfc9eeea4cd3e678e9b1850ed222