Analysis

  • max time kernel
    59s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 14:20

General

  • Target

    8419e53d70f7839d827a8a730d95c34d9cacac86b7f323e3758e759139112b85.exe

  • Size

    2.0MB

  • MD5

    eefaee4c5e64643ded68b01f11225dec

  • SHA1

    ccbaabb09064649b94e14027180a491dd295380b

  • SHA256

    8419e53d70f7839d827a8a730d95c34d9cacac86b7f323e3758e759139112b85

  • SHA512

    dd2a2eda7e99cf0f65bec4ff6c01f008298a7793b29204782331e1476572c440accf57a827772f92d56095dd7ba355edf010a63849180971095dc3b1b28c6134

  • SSDEEP

    49152:h1OsAUpag+Qk/+ouXBVm/KLp0f5fR6Tu3PHYwxzILQJsa7h:h1O1UpAWouXBVm/KLp0+Tu3jh

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 3 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 11 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 8 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8419e53d70f7839d827a8a730d95c34d9cacac86b7f323e3758e759139112b85.exe
    "C:\Users\Admin\AppData\Local\Temp\8419e53d70f7839d827a8a730d95c34d9cacac86b7f323e3758e759139112b85.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1656
    • C:\Users\Admin\AppData\Local\Temp\7zS9A2E.tmp\QZ57zgM5v3AXt0l.exe
      .\QZ57zgM5v3AXt0l.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops Chrome extension
      • Installs/modifies Browser Helper Object
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:1672
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32.exe /s "C:\Program Files (x86)\BBrOOwseroeSihop\uBj3iYPYmoWOCo.x64.dll"
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2020
        • C:\Windows\system32\regsvr32.exe
          /s "C:\Program Files (x86)\BBrOOwseroeSihop\uBj3iYPYmoWOCo.x64.dll"
          4⤵
          • Loads dropped DLL
          • Installs/modifies Browser Helper Object
          PID:1480

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\BBrOOwseroeSihop\uBj3iYPYmoWOCo.dat

    Filesize

    6KB

    MD5

    1989afc4bed19f446e91a16ff455d184

    SHA1

    1c880cd41934da53a9c16864760adddf818a0cd7

    SHA256

    92ceeddf543e812a4c3db7d104f054d276a8ddf9015fbab670aea8f7e6443c69

    SHA512

    13842cb47ee8804c0d60af674208c5816816fe43047f99ba8f67e1eb82b3904d3df94faf45a0d2a1cb2e1174272834f70375f6e1aa0c443c0a6b28bac5d233e6

  • C:\Program Files (x86)\BBrOOwseroeSihop\uBj3iYPYmoWOCo.x64.dll

    Filesize

    692KB

    MD5

    102c2708ee5aa0517e6fa7f99c6053a1

    SHA1

    b10a0ebb2cb5f8a053676453276a592cff7b7162

    SHA256

    ff7241a27f9ac5f85457bd96e78a29dfe127a7a1471e4880a42267505784d69d

    SHA512

    ae9186f96b6ff1befa2c64260b74e2d0f47295828ded8b3148e1838611ad6461eab45caa37afb90c9bc3b363a655c226f7abe6a2b3bc21ef0514f5c5ab860f0f

  • C:\Users\Admin\AppData\Local\Temp\7zS9A2E.tmp\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    df13f711e20e9c80171846d4f2f7ae06

    SHA1

    56d29cda58427efe0e21d3880d39eb1b0ef60bee

    SHA256

    6c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4

    SHA512

    6c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e

  • C:\Users\Admin\AppData\Local\Temp\7zS9A2E.tmp\[email protected]\chrome.manifest

    Filesize

    35B

    MD5

    9ee0c69511c64463d5a42d3f55110385

    SHA1

    3cf7e5be9852d7e13c0951bdfc6f80e3ebaab8d6

    SHA256

    a91aef8f06b518d365150b6b343a399841d9045dff2500496cbc96355307e203

    SHA512

    06cb0b6063ab4404ce7b4350da19b2eeb1ec12f557ad6a453ecbd7031357420b85c44b1939ee173e14943f51da960b6f475c4f9fb2a638a008cb74684b5cb0f5

  • C:\Users\Admin\AppData\Local\Temp\7zS9A2E.tmp\[email protected]\content\bg.js

    Filesize

    7KB

    MD5

    a9b43dc8e58a82245769752d07d5e38c

    SHA1

    0d7e9c3ac01338a0fd772dafffe3237da560ad2c

    SHA256

    3d44e5106e57565ab8d26c718b28a677ad2ea9fb1672cf5796795bd84a782c32

    SHA512

    390f1c4b496669e541fc489c5491ba128213965c61da475e82cfb95dc265b194404608aa74d023c2cf8ea4e91c68e4fd8bb07b2f6927f4293ee978be5086181c

  • C:\Users\Admin\AppData\Local\Temp\7zS9A2E.tmp\[email protected]\install.rdf

    Filesize

    603B

    MD5

    a53fe73a04c3c8702752c7f01668fba9

    SHA1

    6a223a22100967f46f5ce5e261f1e618353792f5

    SHA256

    88bc904af00c5d23f9eb6578457036432ebf2a12b8652c5c09399387b82ce8b2

    SHA512

    3aae4806a0d0d94e1d6dabad78080fd322a5b89395ca75b1aa5179779ab0db933b5a7c571831ff40a901d4dffc832901fa09fb8a22447e211be6cd023891c41e

  • C:\Users\Admin\AppData\Local\Temp\7zS9A2E.tmp\QZ57zgM5v3AXt0l.dat

    Filesize

    6KB

    MD5

    1989afc4bed19f446e91a16ff455d184

    SHA1

    1c880cd41934da53a9c16864760adddf818a0cd7

    SHA256

    92ceeddf543e812a4c3db7d104f054d276a8ddf9015fbab670aea8f7e6443c69

    SHA512

    13842cb47ee8804c0d60af674208c5816816fe43047f99ba8f67e1eb82b3904d3df94faf45a0d2a1cb2e1174272834f70375f6e1aa0c443c0a6b28bac5d233e6

  • C:\Users\Admin\AppData\Local\Temp\7zS9A2E.tmp\QZ57zgM5v3AXt0l.exe

    Filesize

    627KB

    MD5

    cd2adf3ef46ba68dacaddef767a60926

    SHA1

    2936664364c94dbe44343dd0aa7de243c82582b0

    SHA256

    7d37cc35dc3ae28943f203a0f8d62d0ffd838e9f63f667dc465fa0534fbc4cb1

    SHA512

    3b7785f0b8346d179bce0eb8253a54975e41c99089719d1bc95e1bcf501ab13813ef6392fc2392d4af7225245f9836ba652abfc9eeea4cd3e678e9b1850ed222

  • C:\Users\Admin\AppData\Local\Temp\7zS9A2E.tmp\QZ57zgM5v3AXt0l.exe

    Filesize

    627KB

    MD5

    cd2adf3ef46ba68dacaddef767a60926

    SHA1

    2936664364c94dbe44343dd0aa7de243c82582b0

    SHA256

    7d37cc35dc3ae28943f203a0f8d62d0ffd838e9f63f667dc465fa0534fbc4cb1

    SHA512

    3b7785f0b8346d179bce0eb8253a54975e41c99089719d1bc95e1bcf501ab13813ef6392fc2392d4af7225245f9836ba652abfc9eeea4cd3e678e9b1850ed222

  • C:\Users\Admin\AppData\Local\Temp\7zS9A2E.tmp\bmpfcpkijioiceeiefigilleegcljcam\SijjE1U08.js

    Filesize

    5KB

    MD5

    3e2ae58e1718a7ef39ffc8dbec93bf00

    SHA1

    8dfe714e5b3e723f1063982607e0664792706f89

    SHA256

    12ebbd24228b7f9696724fba5b505723cb30c26af0032ae17a875586eb93c5db

    SHA512

    4b9f948a55e60acf5c5626fabb95d3964dac53babe170a81e39b3b60b77262c206558626fc1301dbf8be9fa23d39d2eb2263aab12489a4627edf2f8093694b15

  • C:\Users\Admin\AppData\Local\Temp\7zS9A2E.tmp\bmpfcpkijioiceeiefigilleegcljcam\background.html

    Filesize

    146B

    MD5

    af7f10aec91f87d2ecea7f25eebe0821

    SHA1

    9ef6bcdf1831ea83d4b19b96a45f2ae5c6e3896c

    SHA256

    6744b50061d253443bfdb522708eff256c48fd6d5b32afa20b8883ad9a2f00c5

    SHA512

    b0b3d62a4c66b2a15df460a51f9feb109e9d42f36c99e191dac464b24ad38addc77be325b768d575c75c18aadcae1b35320e0c8b253610b25dfb3cd6e1954bd2

  • C:\Users\Admin\AppData\Local\Temp\7zS9A2E.tmp\bmpfcpkijioiceeiefigilleegcljcam\content.js

    Filesize

    144B

    MD5

    fca19198fd8af21016a8b1dec7980002

    SHA1

    fd01a47d14004e17a625efe66cc46a06c786cf40

    SHA256

    332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a

    SHA512

    60f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47

  • C:\Users\Admin\AppData\Local\Temp\7zS9A2E.tmp\bmpfcpkijioiceeiefigilleegcljcam\lsdb.js

    Filesize

    531B

    MD5

    36d98318ab2b3b2585a30984db328afb

    SHA1

    f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5

    SHA256

    ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7

    SHA512

    6f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a

  • C:\Users\Admin\AppData\Local\Temp\7zS9A2E.tmp\bmpfcpkijioiceeiefigilleegcljcam\manifest.json

    Filesize

    508B

    MD5

    ee53b66dff198c9814e2398ab92efe84

    SHA1

    065db724ab849dc1269019eb5f986f8323bb088b

    SHA256

    6ce4794d11df79cb0c6c4c8fb14213c601bf12d4bada49bd3e6cc708c0de45d6

    SHA512

    d718326ebd20793f28a6e48770454bcd0bdbd456135f961a61b61e73b7b7953dfbf23da0f710ad95fc47faa763b1fea1ea535d073246aefde796d6a60e27f3d9

  • C:\Users\Admin\AppData\Local\Temp\7zS9A2E.tmp\uBj3iYPYmoWOCo.dll

    Filesize

    611KB

    MD5

    63adb99739052e3d6c04c799f7d43edc

    SHA1

    f58f054cd6598ed22b70e4623312c2e8f1eba1d3

    SHA256

    8cda707d508ffb1c1ce6e6066e2b7b782702f8935c7a6a4219f97d2b340efd53

    SHA512

    232a9cd07a12918901fbea1b7e237cb6105b7c53dd00f0e7418cbc3dfbc462210b6f034db4e68eefbe671de62c43303c37ad67b802c8ad7a5ac2195ce527e673

  • C:\Users\Admin\AppData\Local\Temp\7zS9A2E.tmp\uBj3iYPYmoWOCo.tlb

    Filesize

    3KB

    MD5

    08b4ac9069400749555355a5f1e6b8ad

    SHA1

    ec078fae45087bb2ab63497cd2b4b844c178ec3c

    SHA256

    f996571eef02335d08b6c073024cef3ea616bb39f9d9742ffa6783f4e22c3997

    SHA512

    5001f7ca20cca5e85f9c6c1d90ffc2f9a25606d877ee4e6d33a727b6f689989b0486dbea62c66d2d1097194a353566de9d8b6b2bff33613a7ab763c98ca1e1d0

  • C:\Users\Admin\AppData\Local\Temp\7zS9A2E.tmp\uBj3iYPYmoWOCo.x64.dll

    Filesize

    692KB

    MD5

    102c2708ee5aa0517e6fa7f99c6053a1

    SHA1

    b10a0ebb2cb5f8a053676453276a592cff7b7162

    SHA256

    ff7241a27f9ac5f85457bd96e78a29dfe127a7a1471e4880a42267505784d69d

    SHA512

    ae9186f96b6ff1befa2c64260b74e2d0f47295828ded8b3148e1838611ad6461eab45caa37afb90c9bc3b363a655c226f7abe6a2b3bc21ef0514f5c5ab860f0f

  • \Program Files (x86)\BBrOOwseroeSihop\uBj3iYPYmoWOCo.dll

    Filesize

    611KB

    MD5

    63adb99739052e3d6c04c799f7d43edc

    SHA1

    f58f054cd6598ed22b70e4623312c2e8f1eba1d3

    SHA256

    8cda707d508ffb1c1ce6e6066e2b7b782702f8935c7a6a4219f97d2b340efd53

    SHA512

    232a9cd07a12918901fbea1b7e237cb6105b7c53dd00f0e7418cbc3dfbc462210b6f034db4e68eefbe671de62c43303c37ad67b802c8ad7a5ac2195ce527e673

  • \Program Files (x86)\BBrOOwseroeSihop\uBj3iYPYmoWOCo.x64.dll

    Filesize

    692KB

    MD5

    102c2708ee5aa0517e6fa7f99c6053a1

    SHA1

    b10a0ebb2cb5f8a053676453276a592cff7b7162

    SHA256

    ff7241a27f9ac5f85457bd96e78a29dfe127a7a1471e4880a42267505784d69d

    SHA512

    ae9186f96b6ff1befa2c64260b74e2d0f47295828ded8b3148e1838611ad6461eab45caa37afb90c9bc3b363a655c226f7abe6a2b3bc21ef0514f5c5ab860f0f

  • \Program Files (x86)\BBrOOwseroeSihop\uBj3iYPYmoWOCo.x64.dll

    Filesize

    692KB

    MD5

    102c2708ee5aa0517e6fa7f99c6053a1

    SHA1

    b10a0ebb2cb5f8a053676453276a592cff7b7162

    SHA256

    ff7241a27f9ac5f85457bd96e78a29dfe127a7a1471e4880a42267505784d69d

    SHA512

    ae9186f96b6ff1befa2c64260b74e2d0f47295828ded8b3148e1838611ad6461eab45caa37afb90c9bc3b363a655c226f7abe6a2b3bc21ef0514f5c5ab860f0f

  • \Users\Admin\AppData\Local\Temp\7zS9A2E.tmp\QZ57zgM5v3AXt0l.exe

    Filesize

    627KB

    MD5

    cd2adf3ef46ba68dacaddef767a60926

    SHA1

    2936664364c94dbe44343dd0aa7de243c82582b0

    SHA256

    7d37cc35dc3ae28943f203a0f8d62d0ffd838e9f63f667dc465fa0534fbc4cb1

    SHA512

    3b7785f0b8346d179bce0eb8253a54975e41c99089719d1bc95e1bcf501ab13813ef6392fc2392d4af7225245f9836ba652abfc9eeea4cd3e678e9b1850ed222

  • memory/1480-79-0x000007FEFC421000-0x000007FEFC423000-memory.dmp

    Filesize

    8KB

  • memory/1656-54-0x00000000767D1000-0x00000000767D3000-memory.dmp

    Filesize

    8KB