Analysis

  • max time kernel
    42s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 13:31

General

  • Target

    e6151c90ba270e362b12164d0a6ba631174eae52c19559f1a27afd4fcc53d253.exe

  • Size

    2.1MB

  • MD5

    f79b8566647f3f7c9f6d0f4ace4aba30

  • SHA1

    13f36bd2e1066a071e80f9fd4eaa499559c6cef3

  • SHA256

    e6151c90ba270e362b12164d0a6ba631174eae52c19559f1a27afd4fcc53d253

  • SHA512

    2e8c6d63c9396643951a25556430fd5f28c406162754e82b1888370b7846eaef9f694e3e56e64fcd48ff4f442ff8f61e2c19795ae533b8e1fc62e137a8aeb401

  • SSDEEP

    49152:h1OsIhvaZG1MVEtzijkTvu2x/uw4B8FHFF6D:h1OPvaxMziy3k

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 3 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 11 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 8 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e6151c90ba270e362b12164d0a6ba631174eae52c19559f1a27afd4fcc53d253.exe
    "C:\Users\Admin\AppData\Local\Temp\e6151c90ba270e362b12164d0a6ba631174eae52c19559f1a27afd4fcc53d253.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1412
    • C:\Users\Admin\AppData\Local\Temp\7zSFDFF.tmp\gyyMlc0EZaEY8q7.exe
      .\gyyMlc0EZaEY8q7.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops Chrome extension
      • Installs/modifies Browser Helper Object
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:1732
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32.exe /s "C:\Program Files (x86)\GGoSave\yq7BpPYNfvqmwV.x64.dll"
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1740
        • C:\Windows\system32\regsvr32.exe
          /s "C:\Program Files (x86)\GGoSave\yq7BpPYNfvqmwV.x64.dll"
          4⤵
          • Loads dropped DLL
          • Installs/modifies Browser Helper Object
          PID:2016

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\GGoSave\yq7BpPYNfvqmwV.dat

    Filesize

    6KB

    MD5

    eb5dce0c9b36f1e7271769f39f08d705

    SHA1

    3e963990025762326f6f6cea19211c1c0fbe9600

    SHA256

    390ab138490adf813920b7d7000290e17b19554cc6e62479a744c7a058892c70

    SHA512

    b19d7148ba19c8046118e390607ff736e57b78444608ece71087adce87553ad9d66b033e5117bd96a68f7c29dcd0dcdde779265ba3ab12172b2907480112a197

  • C:\Program Files (x86)\GGoSave\yq7BpPYNfvqmwV.x64.dll

    Filesize

    695KB

    MD5

    2af06e7424e4f53fa8ee2b8daf4cdaa3

    SHA1

    0a09aa095e38211b8fc512d2e9f8f7cf12159a19

    SHA256

    81f98c4034227951bd4ad5e6d6a823bd112602f3550fd7066a01f16b8c8aca69

    SHA512

    6bcaa8998bd7971f41bebc8433be949cf48d98c0eb70c643b7b7a1b50d2b4cf66412efb170684f36f1987c1992ba88350f815ea18a3cf50caf8ce97bbb961b16

  • C:\Users\Admin\AppData\Local\Temp\7zSFDFF.tmp\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    df13f711e20e9c80171846d4f2f7ae06

    SHA1

    56d29cda58427efe0e21d3880d39eb1b0ef60bee

    SHA256

    6c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4

    SHA512

    6c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e

  • C:\Users\Admin\AppData\Local\Temp\7zSFDFF.tmp\[email protected]\chrome.manifest

    Filesize

    35B

    MD5

    5cfb5a085127c9aee8478dbc80b2cd2a

    SHA1

    92a65fedf10f0217680022c9c9ea5e0d5ed7ad59

    SHA256

    c516803226f6cdac54738a3ecfd3850e50d19588877ced20979d7f8e5ad44472

    SHA512

    34960c3eb765961e84060f6d20da76584a518dae6b3f860c080a2036fd7d8a164e67af57dec60457bb425119beffc5469563b3443cdc144805d6551224187f55

  • C:\Users\Admin\AppData\Local\Temp\7zSFDFF.tmp\[email protected]\content\bg.js

    Filesize

    7KB

    MD5

    3607f41208c111b5d0da7bc51662eefb

    SHA1

    fa0c36e0af1c50c447c21000b275fb4caff57777

    SHA256

    4f89198703f5ac600afee5fa601114f99700cbcd3a100a20d044c79c3d57d7ac

    SHA512

    07f4ce2c5fb6a443c9eb281a64455c43e3931a9292817e9b29b921caee5818c99158cadb303d6aa2180c9470f9d8b94859d17e6170e7bf159e7d2a948efe598e

  • C:\Users\Admin\AppData\Local\Temp\7zSFDFF.tmp\[email protected]\install.rdf

    Filesize

    595B

    MD5

    cefa57a72dce6cf9d34fb2d51d7d1b19

    SHA1

    1f34eedfcb3383548bef9954f81481a27bd7f376

    SHA256

    9e4d3ca1dfc15adabd1a62a35d9a3301cc1accc6e9248a7f8564054a57eb6e41

    SHA512

    9240d8d8e5f931793a51f003f169ac264b5ae42f0363bf05d7983132dded309ae9a662d7b52bc84576635e6e4c90b453976957735e9f95f66fbeb9b88c7f7c19

  • C:\Users\Admin\AppData\Local\Temp\7zSFDFF.tmp\gyyMlc0EZaEY8q7.dat

    Filesize

    6KB

    MD5

    eb5dce0c9b36f1e7271769f39f08d705

    SHA1

    3e963990025762326f6f6cea19211c1c0fbe9600

    SHA256

    390ab138490adf813920b7d7000290e17b19554cc6e62479a744c7a058892c70

    SHA512

    b19d7148ba19c8046118e390607ff736e57b78444608ece71087adce87553ad9d66b033e5117bd96a68f7c29dcd0dcdde779265ba3ab12172b2907480112a197

  • C:\Users\Admin\AppData\Local\Temp\7zSFDFF.tmp\gyyMlc0EZaEY8q7.exe

    Filesize

    634KB

    MD5

    bd1503d4eaae5e7f2a8cdbd9a88ec02a

    SHA1

    730280a7839bb46bdeeaa47797d926f8d57e1da1

    SHA256

    724380928512fc5261d5f42e64f7705fcdeae1410f24a8ec6b0a2ba783675cb4

    SHA512

    0dc06ce8e78f6b0ebbe65723791ea4ffde8a9d55534dda1b02e81f1a109fce77f26e4bdfb9fd18b5ca9f4d9ff2454e6b05eca325539148512f762b5d2f225c7b

  • C:\Users\Admin\AppData\Local\Temp\7zSFDFF.tmp\gyyMlc0EZaEY8q7.exe

    Filesize

    634KB

    MD5

    bd1503d4eaae5e7f2a8cdbd9a88ec02a

    SHA1

    730280a7839bb46bdeeaa47797d926f8d57e1da1

    SHA256

    724380928512fc5261d5f42e64f7705fcdeae1410f24a8ec6b0a2ba783675cb4

    SHA512

    0dc06ce8e78f6b0ebbe65723791ea4ffde8a9d55534dda1b02e81f1a109fce77f26e4bdfb9fd18b5ca9f4d9ff2454e6b05eca325539148512f762b5d2f225c7b

  • C:\Users\Admin\AppData\Local\Temp\7zSFDFF.tmp\ibcaamajfnmahlpmidnlfbpbjoeifmjj\YbZxnJs.js

    Filesize

    5KB

    MD5

    e510b1cbdb1f9008bc1b472444331920

    SHA1

    c7c927e9121699456f21568bd2921965ab515a25

    SHA256

    34555856c00f92de42f98804a5ad2af1778bbc39c819496f278e29abdf4776bd

    SHA512

    19cfeb625df566f1a483b483e87fe5e3aa4be4a97f65fb8b0427b904b4d586cb39e2e1c06058ae58ea8198f6b9e40d5ca3bbb7fd64c7a636ddd1cb72d25a77f2

  • C:\Users\Admin\AppData\Local\Temp\7zSFDFF.tmp\ibcaamajfnmahlpmidnlfbpbjoeifmjj\background.html

    Filesize

    144B

    MD5

    0c096377716d17366e4cf763e5ace698

    SHA1

    2b619c244afed760ab25b90607ee3a318b3297ee

    SHA256

    4876279ee39b4360500341d0c79525401712a3ab1a5bc4f9b7951e476d6dfb34

    SHA512

    e1c5799d205cbee87e6eaf2a4a9a5f663cfaf5f8835b5b89e0677e8bf9cc35426113df5edd4d1aaaa9fb4c711cc6a07b49dcd0ba6ff0845d541ba5ec6c198fba

  • C:\Users\Admin\AppData\Local\Temp\7zSFDFF.tmp\ibcaamajfnmahlpmidnlfbpbjoeifmjj\content.js

    Filesize

    144B

    MD5

    fca19198fd8af21016a8b1dec7980002

    SHA1

    fd01a47d14004e17a625efe66cc46a06c786cf40

    SHA256

    332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a

    SHA512

    60f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47

  • C:\Users\Admin\AppData\Local\Temp\7zSFDFF.tmp\ibcaamajfnmahlpmidnlfbpbjoeifmjj\lsdb.js

    Filesize

    531B

    MD5

    36d98318ab2b3b2585a30984db328afb

    SHA1

    f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5

    SHA256

    ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7

    SHA512

    6f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a

  • C:\Users\Admin\AppData\Local\Temp\7zSFDFF.tmp\ibcaamajfnmahlpmidnlfbpbjoeifmjj\manifest.json

    Filesize

    499B

    MD5

    f280c5b0e5962c3cc88886d712df31b0

    SHA1

    23a6e758c55cc173c0c01fe86b6f6f3998be4d79

    SHA256

    42181dce58104d2dfb1dae4dbbee0bcb8f996d34e051189e412077b46ba84c23

    SHA512

    bcb4bcb9b3aad8a5561b8572a7701eb9017cbb9911066d0088baf08715d70efca806c489c7f8083bddf9749c70e501004ddb60e3236735a136077da881a41bf6

  • C:\Users\Admin\AppData\Local\Temp\7zSFDFF.tmp\yq7BpPYNfvqmwV.dll

    Filesize

    618KB

    MD5

    f180a95d8673cd01ce4af0ff678fa099

    SHA1

    8592fe958436e14ef9ace437ac4445ecca22e35e

    SHA256

    d40aa49822621713e0f79f6c9a187468251fc22559cb1bbd6b5f71a94819eeb7

    SHA512

    3dda5f3133df4c00c03d8b3fb539b37e2e6b26d0384d3674cefa9595136f9eaa4b9d21c0e806a9ec3cfadfb782a30e344145abbf87bca813de056f84c6fb13c9

  • C:\Users\Admin\AppData\Local\Temp\7zSFDFF.tmp\yq7BpPYNfvqmwV.tlb

    Filesize

    3KB

    MD5

    8af6f42a5b16ced04702514d47052053

    SHA1

    f06e43c9710e27b38063652217874f6fc8515ea0

    SHA256

    0fc752f18e2f21a6d0b45fb9769deefe70d4690e72225037a37d1dc0553ae8ed

    SHA512

    2d1fedf6693f0347d9265436fbc17515fa9a904db54170181ca7a6d5c64a4928494a20a1eb489d646602ed2769e570bfb5835bffd241a53a8fe64d5767b9234b

  • C:\Users\Admin\AppData\Local\Temp\7zSFDFF.tmp\yq7BpPYNfvqmwV.x64.dll

    Filesize

    695KB

    MD5

    2af06e7424e4f53fa8ee2b8daf4cdaa3

    SHA1

    0a09aa095e38211b8fc512d2e9f8f7cf12159a19

    SHA256

    81f98c4034227951bd4ad5e6d6a823bd112602f3550fd7066a01f16b8c8aca69

    SHA512

    6bcaa8998bd7971f41bebc8433be949cf48d98c0eb70c643b7b7a1b50d2b4cf66412efb170684f36f1987c1992ba88350f815ea18a3cf50caf8ce97bbb961b16

  • \Program Files (x86)\GGoSave\yq7BpPYNfvqmwV.dll

    Filesize

    618KB

    MD5

    f180a95d8673cd01ce4af0ff678fa099

    SHA1

    8592fe958436e14ef9ace437ac4445ecca22e35e

    SHA256

    d40aa49822621713e0f79f6c9a187468251fc22559cb1bbd6b5f71a94819eeb7

    SHA512

    3dda5f3133df4c00c03d8b3fb539b37e2e6b26d0384d3674cefa9595136f9eaa4b9d21c0e806a9ec3cfadfb782a30e344145abbf87bca813de056f84c6fb13c9

  • \Program Files (x86)\GGoSave\yq7BpPYNfvqmwV.x64.dll

    Filesize

    695KB

    MD5

    2af06e7424e4f53fa8ee2b8daf4cdaa3

    SHA1

    0a09aa095e38211b8fc512d2e9f8f7cf12159a19

    SHA256

    81f98c4034227951bd4ad5e6d6a823bd112602f3550fd7066a01f16b8c8aca69

    SHA512

    6bcaa8998bd7971f41bebc8433be949cf48d98c0eb70c643b7b7a1b50d2b4cf66412efb170684f36f1987c1992ba88350f815ea18a3cf50caf8ce97bbb961b16

  • \Program Files (x86)\GGoSave\yq7BpPYNfvqmwV.x64.dll

    Filesize

    695KB

    MD5

    2af06e7424e4f53fa8ee2b8daf4cdaa3

    SHA1

    0a09aa095e38211b8fc512d2e9f8f7cf12159a19

    SHA256

    81f98c4034227951bd4ad5e6d6a823bd112602f3550fd7066a01f16b8c8aca69

    SHA512

    6bcaa8998bd7971f41bebc8433be949cf48d98c0eb70c643b7b7a1b50d2b4cf66412efb170684f36f1987c1992ba88350f815ea18a3cf50caf8ce97bbb961b16

  • \Users\Admin\AppData\Local\Temp\7zSFDFF.tmp\gyyMlc0EZaEY8q7.exe

    Filesize

    634KB

    MD5

    bd1503d4eaae5e7f2a8cdbd9a88ec02a

    SHA1

    730280a7839bb46bdeeaa47797d926f8d57e1da1

    SHA256

    724380928512fc5261d5f42e64f7705fcdeae1410f24a8ec6b0a2ba783675cb4

    SHA512

    0dc06ce8e78f6b0ebbe65723791ea4ffde8a9d55534dda1b02e81f1a109fce77f26e4bdfb9fd18b5ca9f4d9ff2454e6b05eca325539148512f762b5d2f225c7b

  • memory/1412-54-0x0000000075771000-0x0000000075773000-memory.dmp

    Filesize

    8KB

  • memory/1732-56-0x0000000000000000-mapping.dmp

  • memory/1740-73-0x0000000000000000-mapping.dmp

  • memory/2016-78-0x000007FEFB6A1000-0x000007FEFB6A3000-memory.dmp

    Filesize

    8KB

  • memory/2016-77-0x0000000000000000-mapping.dmp