Analysis

  • max time kernel
    164s
  • max time network
    171s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/11/2022, 14:18

General

  • Target

    899391747cdda3a1f2379bd41f32af220b38b5115c290bdd473f8c6f5a485f8c.exe

  • Size

    2.1MB

  • MD5

    f07fe73f56d37dad2c137c8da10d61a1

  • SHA1

    97818b892a50e37e083b63b0f592d8daf8dc24a1

  • SHA256

    899391747cdda3a1f2379bd41f32af220b38b5115c290bdd473f8c6f5a485f8c

  • SHA512

    9f080cee78242f4161f611f735bb83717812f0ffbd608987e9dc27a0fcd22e8ef69f7e0dc3ad5711e0d19a7282391c5dc3f4bd5356f80e72d49199f02b002048

  • SSDEEP

    49152:h1OsVhvaZG1MVEtzijkTvu2x/uw4B8FHFF6l:h1O0vaxMziy3a

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 5 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 9 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 8 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\899391747cdda3a1f2379bd41f32af220b38b5115c290bdd473f8c6f5a485f8c.exe
    "C:\Users\Admin\AppData\Local\Temp\899391747cdda3a1f2379bd41f32af220b38b5115c290bdd473f8c6f5a485f8c.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4204
    • C:\Users\Admin\AppData\Local\Temp\7zSA22.tmp\Hz4jhQAy2mAzD84.exe
      .\Hz4jhQAy2mAzD84.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops Chrome extension
      • Installs/modifies Browser Helper Object
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:3660
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32.exe /s "C:\Program Files (x86)\YOutubeAdBlockE\EYe6cx0os498W8.x64.dll"
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:4780
        • C:\Windows\system32\regsvr32.exe
          /s "C:\Program Files (x86)\YOutubeAdBlockE\EYe6cx0os498W8.x64.dll"
          4⤵
          • Loads dropped DLL
          • Installs/modifies Browser Helper Object
          PID:4772

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\YOutubeAdBlockE\EYe6cx0os498W8.dat

    Filesize

    6KB

    MD5

    fdb98ff91419247c85e9dc2e3d852c80

    SHA1

    26ec31400ef5ee6c1a23f855d4370ab50c650564

    SHA256

    7be58bb778e426e5563266c5ac509607f0105bbf9cae392cd5a4c0a17fb4983b

    SHA512

    4ca672d5648ac01242f041e1349d6949b94e151e4e5a332a89562bb0be732163a68fbdef782981a5767463a71a3509292a00efaf415143eec47c4b56835b372f

  • C:\Program Files (x86)\YOutubeAdBlockE\EYe6cx0os498W8.dll

    Filesize

    618KB

    MD5

    f180a95d8673cd01ce4af0ff678fa099

    SHA1

    8592fe958436e14ef9ace437ac4445ecca22e35e

    SHA256

    d40aa49822621713e0f79f6c9a187468251fc22559cb1bbd6b5f71a94819eeb7

    SHA512

    3dda5f3133df4c00c03d8b3fb539b37e2e6b26d0384d3674cefa9595136f9eaa4b9d21c0e806a9ec3cfadfb782a30e344145abbf87bca813de056f84c6fb13c9

  • C:\Program Files (x86)\YOutubeAdBlockE\EYe6cx0os498W8.x64.dll

    Filesize

    695KB

    MD5

    2af06e7424e4f53fa8ee2b8daf4cdaa3

    SHA1

    0a09aa095e38211b8fc512d2e9f8f7cf12159a19

    SHA256

    81f98c4034227951bd4ad5e6d6a823bd112602f3550fd7066a01f16b8c8aca69

    SHA512

    6bcaa8998bd7971f41bebc8433be949cf48d98c0eb70c643b7b7a1b50d2b4cf66412efb170684f36f1987c1992ba88350f815ea18a3cf50caf8ce97bbb961b16

  • C:\Program Files (x86)\YOutubeAdBlockE\EYe6cx0os498W8.x64.dll

    Filesize

    695KB

    MD5

    2af06e7424e4f53fa8ee2b8daf4cdaa3

    SHA1

    0a09aa095e38211b8fc512d2e9f8f7cf12159a19

    SHA256

    81f98c4034227951bd4ad5e6d6a823bd112602f3550fd7066a01f16b8c8aca69

    SHA512

    6bcaa8998bd7971f41bebc8433be949cf48d98c0eb70c643b7b7a1b50d2b4cf66412efb170684f36f1987c1992ba88350f815ea18a3cf50caf8ce97bbb961b16

  • C:\Program Files (x86)\YOutubeAdBlockE\EYe6cx0os498W8.x64.dll

    Filesize

    695KB

    MD5

    2af06e7424e4f53fa8ee2b8daf4cdaa3

    SHA1

    0a09aa095e38211b8fc512d2e9f8f7cf12159a19

    SHA256

    81f98c4034227951bd4ad5e6d6a823bd112602f3550fd7066a01f16b8c8aca69

    SHA512

    6bcaa8998bd7971f41bebc8433be949cf48d98c0eb70c643b7b7a1b50d2b4cf66412efb170684f36f1987c1992ba88350f815ea18a3cf50caf8ce97bbb961b16

  • C:\Users\Admin\AppData\Local\Temp\7zSA22.tmp\EYe6cx0os498W8.dll

    Filesize

    618KB

    MD5

    f180a95d8673cd01ce4af0ff678fa099

    SHA1

    8592fe958436e14ef9ace437ac4445ecca22e35e

    SHA256

    d40aa49822621713e0f79f6c9a187468251fc22559cb1bbd6b5f71a94819eeb7

    SHA512

    3dda5f3133df4c00c03d8b3fb539b37e2e6b26d0384d3674cefa9595136f9eaa4b9d21c0e806a9ec3cfadfb782a30e344145abbf87bca813de056f84c6fb13c9

  • C:\Users\Admin\AppData\Local\Temp\7zSA22.tmp\EYe6cx0os498W8.tlb

    Filesize

    3KB

    MD5

    8af6f42a5b16ced04702514d47052053

    SHA1

    f06e43c9710e27b38063652217874f6fc8515ea0

    SHA256

    0fc752f18e2f21a6d0b45fb9769deefe70d4690e72225037a37d1dc0553ae8ed

    SHA512

    2d1fedf6693f0347d9265436fbc17515fa9a904db54170181ca7a6d5c64a4928494a20a1eb489d646602ed2769e570bfb5835bffd241a53a8fe64d5767b9234b

  • C:\Users\Admin\AppData\Local\Temp\7zSA22.tmp\EYe6cx0os498W8.x64.dll

    Filesize

    695KB

    MD5

    2af06e7424e4f53fa8ee2b8daf4cdaa3

    SHA1

    0a09aa095e38211b8fc512d2e9f8f7cf12159a19

    SHA256

    81f98c4034227951bd4ad5e6d6a823bd112602f3550fd7066a01f16b8c8aca69

    SHA512

    6bcaa8998bd7971f41bebc8433be949cf48d98c0eb70c643b7b7a1b50d2b4cf66412efb170684f36f1987c1992ba88350f815ea18a3cf50caf8ce97bbb961b16

  • C:\Users\Admin\AppData\Local\Temp\7zSA22.tmp\Hz4jhQAy2mAzD84.dat

    Filesize

    6KB

    MD5

    fdb98ff91419247c85e9dc2e3d852c80

    SHA1

    26ec31400ef5ee6c1a23f855d4370ab50c650564

    SHA256

    7be58bb778e426e5563266c5ac509607f0105bbf9cae392cd5a4c0a17fb4983b

    SHA512

    4ca672d5648ac01242f041e1349d6949b94e151e4e5a332a89562bb0be732163a68fbdef782981a5767463a71a3509292a00efaf415143eec47c4b56835b372f

  • C:\Users\Admin\AppData\Local\Temp\7zSA22.tmp\Hz4jhQAy2mAzD84.exe

    Filesize

    634KB

    MD5

    bd1503d4eaae5e7f2a8cdbd9a88ec02a

    SHA1

    730280a7839bb46bdeeaa47797d926f8d57e1da1

    SHA256

    724380928512fc5261d5f42e64f7705fcdeae1410f24a8ec6b0a2ba783675cb4

    SHA512

    0dc06ce8e78f6b0ebbe65723791ea4ffde8a9d55534dda1b02e81f1a109fce77f26e4bdfb9fd18b5ca9f4d9ff2454e6b05eca325539148512f762b5d2f225c7b

  • C:\Users\Admin\AppData\Local\Temp\7zSA22.tmp\Hz4jhQAy2mAzD84.exe

    Filesize

    634KB

    MD5

    bd1503d4eaae5e7f2a8cdbd9a88ec02a

    SHA1

    730280a7839bb46bdeeaa47797d926f8d57e1da1

    SHA256

    724380928512fc5261d5f42e64f7705fcdeae1410f24a8ec6b0a2ba783675cb4

    SHA512

    0dc06ce8e78f6b0ebbe65723791ea4ffde8a9d55534dda1b02e81f1a109fce77f26e4bdfb9fd18b5ca9f4d9ff2454e6b05eca325539148512f762b5d2f225c7b

  • C:\Users\Admin\AppData\Local\Temp\7zSA22.tmp\ndgffkleihhehholhdfpofafegmhoheb\YCdTit.js

    Filesize

    5KB

    MD5

    6928312d2d4b384325075ca369aced85

    SHA1

    355fad3875aa71d80e9c3abf74e9d61b4a9c1f58

    SHA256

    a1256a288740c9c4a507faea5582be6ceeba49cb85ae6adecb6a93aa1b5954d8

    SHA512

    b4d1de8141cf72abe712811f0b02e98f3442703b49217ca8d15a100e32b81fb0825e86d98626a7753e3915f5b6f575a6f020f5a01834e76a14811d1766a664ef

  • C:\Users\Admin\AppData\Local\Temp\7zSA22.tmp\ndgffkleihhehholhdfpofafegmhoheb\background.html

    Filesize

    143B

    MD5

    ca3f5f4d47382e24bf67f500714e1db0

    SHA1

    c5038857855deb8409afe8bd0f19d4c10953f747

    SHA256

    1a2b9a99acbb177d662dcd8015e8ea612894ce0daed4c2cc5d6741ea4561c5e9

    SHA512

    5219cb13aaaa8f5299b0f9982ea175147399f67406faa23ee013746b00ba3a6325c2a213978d57ee033d87563d5694dadba94e0447ab1dc5711011c0a8e1b910

  • C:\Users\Admin\AppData\Local\Temp\7zSA22.tmp\ndgffkleihhehholhdfpofafegmhoheb\content.js

    Filesize

    144B

    MD5

    fca19198fd8af21016a8b1dec7980002

    SHA1

    fd01a47d14004e17a625efe66cc46a06c786cf40

    SHA256

    332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a

    SHA512

    60f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47

  • C:\Users\Admin\AppData\Local\Temp\7zSA22.tmp\ndgffkleihhehholhdfpofafegmhoheb\lsdb.js

    Filesize

    531B

    MD5

    36d98318ab2b3b2585a30984db328afb

    SHA1

    f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5

    SHA256

    ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7

    SHA512

    6f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a

  • C:\Users\Admin\AppData\Local\Temp\7zSA22.tmp\ndgffkleihhehholhdfpofafegmhoheb\manifest.json

    Filesize

    507B

    MD5

    b7802e247292e3e777fea87d2d4fa581

    SHA1

    1fdb8d58cf34fe633b39df0962f42791f6ca56c5

    SHA256

    1c1d7725bf4c87f1e7622e5779c78ae8d4b69d245556b1d498627885d6be6bdc

    SHA512

    284dfe82ce219b09ef877040d2e1f7083be02e4b2ba40eebb0452057dc6eab792b0d541936c33bf6f4509a6d5a7057ba161538d21240593b6aa0fcfc68b1892f

  • C:\Users\Admin\AppData\Local\Temp\7zSA22.tmp\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    df13f711e20e9c80171846d4f2f7ae06

    SHA1

    56d29cda58427efe0e21d3880d39eb1b0ef60bee

    SHA256

    6c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4

    SHA512

    6c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e

  • C:\Users\Admin\AppData\Local\Temp\7zSA22.tmp\[email protected]\chrome.manifest

    Filesize

    35B

    MD5

    4f823d68c2a38fc2a3467dd722a485d8

    SHA1

    2b6fbe4e1a33bc50a7ce5d17490af8a965c7f7d5

    SHA256

    9f89169e6d37dea1ec9fb1b71c1a9bb9b181c5230f6cdd0b88b852999f2918e7

    SHA512

    4b5366835c49b2ace130277f0980ab81f981e70e001ce363bdf08140104869c772b93050874b2ad60a6be9b2ad0dc1edfe601457c195b20ea082ffeb7ee82834

  • C:\Users\Admin\AppData\Local\Temp\7zSA22.tmp\[email protected]\content\bg.js

    Filesize

    7KB

    MD5

    35e59bd9ff64dda0c6efdbb0ae78bb6f

    SHA1

    64fa089d693e736a60a6cfc5868440058cd9bbdd

    SHA256

    b109c626571f53260e475aff7c31e45912182b88bf13da446faf4c8885bce597

    SHA512

    2af571da9e19f97b317bd61b1137611f8f7331e6a534b4dc329530a4a7a71b85ca6d386f11cb34e5e4fd11c659ec44f619ac6743b29646031d2cfa57cc220bc7

  • C:\Users\Admin\AppData\Local\Temp\7zSA22.tmp\[email protected]\install.rdf

    Filesize

    603B

    MD5

    5b23e523ac3548ed535cc9a58576c628

    SHA1

    109ddf6ea62e2f1cfe63522ac2d6df79bfee5821

    SHA256

    f8abaa8856532248ace3b7321090daaf01b1cad8a2e65e14fb8d9c54d9ee4a5c

    SHA512

    6e22e7f5c84958682939610f450572088870c410b6465208b71061164dc7ccbe384bb7269e841e01f97e88bf1a366ceab11a757b34794a505283fab633d903bd