Analysis
-
max time kernel
59s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 14:20
Static task
static1
Behavioral task
behavioral1
Sample
8419e53d70f7839d827a8a730d95c34d9cacac86b7f323e3758e759139112b85.exe
Resource
win7-20221111-en
General
-
Target
8419e53d70f7839d827a8a730d95c34d9cacac86b7f323e3758e759139112b85.exe
-
Size
2.0MB
-
MD5
eefaee4c5e64643ded68b01f11225dec
-
SHA1
ccbaabb09064649b94e14027180a491dd295380b
-
SHA256
8419e53d70f7839d827a8a730d95c34d9cacac86b7f323e3758e759139112b85
-
SHA512
dd2a2eda7e99cf0f65bec4ff6c01f008298a7793b29204782331e1476572c440accf57a827772f92d56095dd7ba355edf010a63849180971095dc3b1b28c6134
-
SSDEEP
49152:h1OsAUpag+Qk/+ouXBVm/KLp0f5fR6Tu3PHYwxzILQJsa7h:h1O1UpAWouXBVm/KLp0+Tu3jh
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1672 QZ57zgM5v3AXt0l.exe -
Loads dropped DLL 4 IoCs
pid Process 1656 8419e53d70f7839d827a8a730d95c34d9cacac86b7f323e3758e759139112b85.exe 1672 QZ57zgM5v3AXt0l.exe 2020 regsvr32.exe 1480 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\bmpfcpkijioiceeiefigilleegcljcam\200\manifest.json QZ57zgM5v3AXt0l.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\bmpfcpkijioiceeiefigilleegcljcam\200\manifest.json QZ57zgM5v3AXt0l.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\bmpfcpkijioiceeiefigilleegcljcam\200\manifest.json QZ57zgM5v3AXt0l.exe -
Installs/modifies Browser Helper Object 2 TTPs 11 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} QZ57zgM5v3AXt0l.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects QZ57zgM5v3AXt0l.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\ QZ57zgM5v3AXt0l.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{18DF081C-E8AD-4283-A596-FA578C2EBDC3} QZ57zgM5v3AXt0l.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} QZ57zgM5v3AXt0l.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DBC80044-A445-435B-BC74-9C25C1C588A9} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ regsvr32.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files (x86)\BBrOOwseroeSihop\uBj3iYPYmoWOCo.tlb QZ57zgM5v3AXt0l.exe File opened for modification C:\Program Files (x86)\BBrOOwseroeSihop\uBj3iYPYmoWOCo.tlb QZ57zgM5v3AXt0l.exe File created C:\Program Files (x86)\BBrOOwseroeSihop\uBj3iYPYmoWOCo.dat QZ57zgM5v3AXt0l.exe File opened for modification C:\Program Files (x86)\BBrOOwseroeSihop\uBj3iYPYmoWOCo.dat QZ57zgM5v3AXt0l.exe File created C:\Program Files (x86)\BBrOOwseroeSihop\uBj3iYPYmoWOCo.x64.dll QZ57zgM5v3AXt0l.exe File opened for modification C:\Program Files (x86)\BBrOOwseroeSihop\uBj3iYPYmoWOCo.x64.dll QZ57zgM5v3AXt0l.exe File created C:\Program Files (x86)\BBrOOwseroeSihop\uBj3iYPYmoWOCo.dll QZ57zgM5v3AXt0l.exe File opened for modification C:\Program Files (x86)\BBrOOwseroeSihop\uBj3iYPYmoWOCo.dll QZ57zgM5v3AXt0l.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1656 wrote to memory of 1672 1656 8419e53d70f7839d827a8a730d95c34d9cacac86b7f323e3758e759139112b85.exe 28 PID 1656 wrote to memory of 1672 1656 8419e53d70f7839d827a8a730d95c34d9cacac86b7f323e3758e759139112b85.exe 28 PID 1656 wrote to memory of 1672 1656 8419e53d70f7839d827a8a730d95c34d9cacac86b7f323e3758e759139112b85.exe 28 PID 1656 wrote to memory of 1672 1656 8419e53d70f7839d827a8a730d95c34d9cacac86b7f323e3758e759139112b85.exe 28 PID 1672 wrote to memory of 2020 1672 QZ57zgM5v3AXt0l.exe 29 PID 1672 wrote to memory of 2020 1672 QZ57zgM5v3AXt0l.exe 29 PID 1672 wrote to memory of 2020 1672 QZ57zgM5v3AXt0l.exe 29 PID 1672 wrote to memory of 2020 1672 QZ57zgM5v3AXt0l.exe 29 PID 1672 wrote to memory of 2020 1672 QZ57zgM5v3AXt0l.exe 29 PID 1672 wrote to memory of 2020 1672 QZ57zgM5v3AXt0l.exe 29 PID 1672 wrote to memory of 2020 1672 QZ57zgM5v3AXt0l.exe 29 PID 2020 wrote to memory of 1480 2020 regsvr32.exe 30 PID 2020 wrote to memory of 1480 2020 regsvr32.exe 30 PID 2020 wrote to memory of 1480 2020 regsvr32.exe 30 PID 2020 wrote to memory of 1480 2020 regsvr32.exe 30 PID 2020 wrote to memory of 1480 2020 regsvr32.exe 30 PID 2020 wrote to memory of 1480 2020 regsvr32.exe 30 PID 2020 wrote to memory of 1480 2020 regsvr32.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\8419e53d70f7839d827a8a730d95c34d9cacac86b7f323e3758e759139112b85.exe"C:\Users\Admin\AppData\Local\Temp\8419e53d70f7839d827a8a730d95c34d9cacac86b7f323e3758e759139112b85.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\7zS9A2E.tmp\QZ57zgM5v3AXt0l.exe.\QZ57zgM5v3AXt0l.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\BBrOOwseroeSihop\uBj3iYPYmoWOCo.x64.dll"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\BBrOOwseroeSihop\uBj3iYPYmoWOCo.x64.dll"4⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
PID:1480
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD51989afc4bed19f446e91a16ff455d184
SHA11c880cd41934da53a9c16864760adddf818a0cd7
SHA25692ceeddf543e812a4c3db7d104f054d276a8ddf9015fbab670aea8f7e6443c69
SHA51213842cb47ee8804c0d60af674208c5816816fe43047f99ba8f67e1eb82b3904d3df94faf45a0d2a1cb2e1174272834f70375f6e1aa0c443c0a6b28bac5d233e6
-
Filesize
692KB
MD5102c2708ee5aa0517e6fa7f99c6053a1
SHA1b10a0ebb2cb5f8a053676453276a592cff7b7162
SHA256ff7241a27f9ac5f85457bd96e78a29dfe127a7a1471e4880a42267505784d69d
SHA512ae9186f96b6ff1befa2c64260b74e2d0f47295828ded8b3148e1838611ad6461eab45caa37afb90c9bc3b363a655c226f7abe6a2b3bc21ef0514f5c5ab860f0f
-
C:\Users\Admin\AppData\Local\Temp\7zS9A2E.tmp\[email protected]\bootstrap.js
Filesize2KB
MD5df13f711e20e9c80171846d4f2f7ae06
SHA156d29cda58427efe0e21d3880d39eb1b0ef60bee
SHA2566c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4
SHA5126c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e
-
C:\Users\Admin\AppData\Local\Temp\7zS9A2E.tmp\[email protected]\chrome.manifest
Filesize35B
MD59ee0c69511c64463d5a42d3f55110385
SHA13cf7e5be9852d7e13c0951bdfc6f80e3ebaab8d6
SHA256a91aef8f06b518d365150b6b343a399841d9045dff2500496cbc96355307e203
SHA51206cb0b6063ab4404ce7b4350da19b2eeb1ec12f557ad6a453ecbd7031357420b85c44b1939ee173e14943f51da960b6f475c4f9fb2a638a008cb74684b5cb0f5
-
C:\Users\Admin\AppData\Local\Temp\7zS9A2E.tmp\[email protected]\content\bg.js
Filesize7KB
MD5a9b43dc8e58a82245769752d07d5e38c
SHA10d7e9c3ac01338a0fd772dafffe3237da560ad2c
SHA2563d44e5106e57565ab8d26c718b28a677ad2ea9fb1672cf5796795bd84a782c32
SHA512390f1c4b496669e541fc489c5491ba128213965c61da475e82cfb95dc265b194404608aa74d023c2cf8ea4e91c68e4fd8bb07b2f6927f4293ee978be5086181c
-
C:\Users\Admin\AppData\Local\Temp\7zS9A2E.tmp\[email protected]\install.rdf
Filesize603B
MD5a53fe73a04c3c8702752c7f01668fba9
SHA16a223a22100967f46f5ce5e261f1e618353792f5
SHA25688bc904af00c5d23f9eb6578457036432ebf2a12b8652c5c09399387b82ce8b2
SHA5123aae4806a0d0d94e1d6dabad78080fd322a5b89395ca75b1aa5179779ab0db933b5a7c571831ff40a901d4dffc832901fa09fb8a22447e211be6cd023891c41e
-
Filesize
6KB
MD51989afc4bed19f446e91a16ff455d184
SHA11c880cd41934da53a9c16864760adddf818a0cd7
SHA25692ceeddf543e812a4c3db7d104f054d276a8ddf9015fbab670aea8f7e6443c69
SHA51213842cb47ee8804c0d60af674208c5816816fe43047f99ba8f67e1eb82b3904d3df94faf45a0d2a1cb2e1174272834f70375f6e1aa0c443c0a6b28bac5d233e6
-
Filesize
627KB
MD5cd2adf3ef46ba68dacaddef767a60926
SHA12936664364c94dbe44343dd0aa7de243c82582b0
SHA2567d37cc35dc3ae28943f203a0f8d62d0ffd838e9f63f667dc465fa0534fbc4cb1
SHA5123b7785f0b8346d179bce0eb8253a54975e41c99089719d1bc95e1bcf501ab13813ef6392fc2392d4af7225245f9836ba652abfc9eeea4cd3e678e9b1850ed222
-
Filesize
627KB
MD5cd2adf3ef46ba68dacaddef767a60926
SHA12936664364c94dbe44343dd0aa7de243c82582b0
SHA2567d37cc35dc3ae28943f203a0f8d62d0ffd838e9f63f667dc465fa0534fbc4cb1
SHA5123b7785f0b8346d179bce0eb8253a54975e41c99089719d1bc95e1bcf501ab13813ef6392fc2392d4af7225245f9836ba652abfc9eeea4cd3e678e9b1850ed222
-
Filesize
5KB
MD53e2ae58e1718a7ef39ffc8dbec93bf00
SHA18dfe714e5b3e723f1063982607e0664792706f89
SHA25612ebbd24228b7f9696724fba5b505723cb30c26af0032ae17a875586eb93c5db
SHA5124b9f948a55e60acf5c5626fabb95d3964dac53babe170a81e39b3b60b77262c206558626fc1301dbf8be9fa23d39d2eb2263aab12489a4627edf2f8093694b15
-
Filesize
146B
MD5af7f10aec91f87d2ecea7f25eebe0821
SHA19ef6bcdf1831ea83d4b19b96a45f2ae5c6e3896c
SHA2566744b50061d253443bfdb522708eff256c48fd6d5b32afa20b8883ad9a2f00c5
SHA512b0b3d62a4c66b2a15df460a51f9feb109e9d42f36c99e191dac464b24ad38addc77be325b768d575c75c18aadcae1b35320e0c8b253610b25dfb3cd6e1954bd2
-
Filesize
144B
MD5fca19198fd8af21016a8b1dec7980002
SHA1fd01a47d14004e17a625efe66cc46a06c786cf40
SHA256332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a
SHA51260f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47
-
Filesize
531B
MD536d98318ab2b3b2585a30984db328afb
SHA1f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5
SHA256ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7
SHA5126f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a
-
Filesize
508B
MD5ee53b66dff198c9814e2398ab92efe84
SHA1065db724ab849dc1269019eb5f986f8323bb088b
SHA2566ce4794d11df79cb0c6c4c8fb14213c601bf12d4bada49bd3e6cc708c0de45d6
SHA512d718326ebd20793f28a6e48770454bcd0bdbd456135f961a61b61e73b7b7953dfbf23da0f710ad95fc47faa763b1fea1ea535d073246aefde796d6a60e27f3d9
-
Filesize
611KB
MD563adb99739052e3d6c04c799f7d43edc
SHA1f58f054cd6598ed22b70e4623312c2e8f1eba1d3
SHA2568cda707d508ffb1c1ce6e6066e2b7b782702f8935c7a6a4219f97d2b340efd53
SHA512232a9cd07a12918901fbea1b7e237cb6105b7c53dd00f0e7418cbc3dfbc462210b6f034db4e68eefbe671de62c43303c37ad67b802c8ad7a5ac2195ce527e673
-
Filesize
3KB
MD508b4ac9069400749555355a5f1e6b8ad
SHA1ec078fae45087bb2ab63497cd2b4b844c178ec3c
SHA256f996571eef02335d08b6c073024cef3ea616bb39f9d9742ffa6783f4e22c3997
SHA5125001f7ca20cca5e85f9c6c1d90ffc2f9a25606d877ee4e6d33a727b6f689989b0486dbea62c66d2d1097194a353566de9d8b6b2bff33613a7ab763c98ca1e1d0
-
Filesize
692KB
MD5102c2708ee5aa0517e6fa7f99c6053a1
SHA1b10a0ebb2cb5f8a053676453276a592cff7b7162
SHA256ff7241a27f9ac5f85457bd96e78a29dfe127a7a1471e4880a42267505784d69d
SHA512ae9186f96b6ff1befa2c64260b74e2d0f47295828ded8b3148e1838611ad6461eab45caa37afb90c9bc3b363a655c226f7abe6a2b3bc21ef0514f5c5ab860f0f
-
Filesize
611KB
MD563adb99739052e3d6c04c799f7d43edc
SHA1f58f054cd6598ed22b70e4623312c2e8f1eba1d3
SHA2568cda707d508ffb1c1ce6e6066e2b7b782702f8935c7a6a4219f97d2b340efd53
SHA512232a9cd07a12918901fbea1b7e237cb6105b7c53dd00f0e7418cbc3dfbc462210b6f034db4e68eefbe671de62c43303c37ad67b802c8ad7a5ac2195ce527e673
-
Filesize
692KB
MD5102c2708ee5aa0517e6fa7f99c6053a1
SHA1b10a0ebb2cb5f8a053676453276a592cff7b7162
SHA256ff7241a27f9ac5f85457bd96e78a29dfe127a7a1471e4880a42267505784d69d
SHA512ae9186f96b6ff1befa2c64260b74e2d0f47295828ded8b3148e1838611ad6461eab45caa37afb90c9bc3b363a655c226f7abe6a2b3bc21ef0514f5c5ab860f0f
-
Filesize
692KB
MD5102c2708ee5aa0517e6fa7f99c6053a1
SHA1b10a0ebb2cb5f8a053676453276a592cff7b7162
SHA256ff7241a27f9ac5f85457bd96e78a29dfe127a7a1471e4880a42267505784d69d
SHA512ae9186f96b6ff1befa2c64260b74e2d0f47295828ded8b3148e1838611ad6461eab45caa37afb90c9bc3b363a655c226f7abe6a2b3bc21ef0514f5c5ab860f0f
-
Filesize
627KB
MD5cd2adf3ef46ba68dacaddef767a60926
SHA12936664364c94dbe44343dd0aa7de243c82582b0
SHA2567d37cc35dc3ae28943f203a0f8d62d0ffd838e9f63f667dc465fa0534fbc4cb1
SHA5123b7785f0b8346d179bce0eb8253a54975e41c99089719d1bc95e1bcf501ab13813ef6392fc2392d4af7225245f9836ba652abfc9eeea4cd3e678e9b1850ed222