Analysis

  • max time kernel
    34s
  • max time network
    41s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 20:05

General

  • Target

    c307c6aec7c2f739a226e79f5713d5ca33d3b6ce089f72634b437e10382fbd5a.exe

  • Size

    2.1MB

  • MD5

    3ae1fed9e64e6226a0133fdfbb496984

  • SHA1

    9743e5797a7bf949a06c2e6803eb1145f24f9cf0

  • SHA256

    c307c6aec7c2f739a226e79f5713d5ca33d3b6ce089f72634b437e10382fbd5a

  • SHA512

    4e0247d97c118aaad151d3aa07252416990e7a84af1d2431248b3d40bd7b168a4750ef2e810de19f8732db1429fed27f8d1cabac4be6b0d0dbbaaf7f6afcbf64

  • SSDEEP

    49152:h1OsjBNPM6n5oHCZdw3CyvHht6wqM7M1cHp:h1OUBjn5oHCZMDvHhrqMMi

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 3 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 11 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c307c6aec7c2f739a226e79f5713d5ca33d3b6ce089f72634b437e10382fbd5a.exe
    "C:\Users\Admin\AppData\Local\Temp\c307c6aec7c2f739a226e79f5713d5ca33d3b6ce089f72634b437e10382fbd5a.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1192
    • C:\Users\Admin\AppData\Local\Temp\7zS5081.tmp\I6anRSnFzLcjtNN.exe
      .\I6anRSnFzLcjtNN.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops Chrome extension
      • Installs/modifies Browser Helper Object
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:684
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32.exe /s "C:\Program Files (x86)\GoSave\bbm3elce82xVMd.x64.dll"
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:852
        • C:\Windows\system32\regsvr32.exe
          /s "C:\Program Files (x86)\GoSave\bbm3elce82xVMd.x64.dll"
          4⤵
          • Loads dropped DLL
          • Installs/modifies Browser Helper Object
          PID:1620

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\GoSave\bbm3elce82xVMd.dat

    Filesize

    6KB

    MD5

    440d611b5071b0822d362a33f144caa9

    SHA1

    02d11789022c963af4a72a8ff1fdd3f1a54e5c4a

    SHA256

    6d7b16876286d412a9e93b06f86d989e9c85c13ea850c4bfca8412d70a3b44dd

    SHA512

    546cff6750117b4c7a7ea9ff7a560cbcfcb9ae9083ef82b1fd7fc7c182d3bdf9809a3fa866bd01b2e23b71dccac716917b1dd669a2a185a1969f8b49917933f1

  • C:\Program Files (x86)\GoSave\bbm3elce82xVMd.x64.dll

    Filesize

    710KB

    MD5

    2d9b84b8a433eff58888a3240a3a4ff5

    SHA1

    a59f591168b33de4f42b680fb66c7c7f78b11056

    SHA256

    4df3323f9cfeb84add405bf9bf36445a22b368c1efb70e109200d94d880bfbb3

    SHA512

    1cdc6571ae7a8708aaef77f566222aa7cad9da7a77e3e904a56fcfa9238bb6c9993bd455c7f336e4b14e63e61ec8cf4f710567b4b9f420c3133da6dddd10d23e

  • C:\Users\Admin\AppData\Local\Temp\7zS5081.tmp\I6anRSnFzLcjtNN.dat

    Filesize

    6KB

    MD5

    440d611b5071b0822d362a33f144caa9

    SHA1

    02d11789022c963af4a72a8ff1fdd3f1a54e5c4a

    SHA256

    6d7b16876286d412a9e93b06f86d989e9c85c13ea850c4bfca8412d70a3b44dd

    SHA512

    546cff6750117b4c7a7ea9ff7a560cbcfcb9ae9083ef82b1fd7fc7c182d3bdf9809a3fa866bd01b2e23b71dccac716917b1dd669a2a185a1969f8b49917933f1

  • C:\Users\Admin\AppData\Local\Temp\7zS5081.tmp\I6anRSnFzLcjtNN.exe

    Filesize

    657KB

    MD5

    b831a4edee2ceadc357e0165ea586f14

    SHA1

    4bd2c00d1331f52acafd077cb358905bcc40a40b

    SHA256

    917f3a961b2105519fa358adac37496671751a49a215922ddba8dd3f047c8627

    SHA512

    805bb79c277be66d0ac821de3f5fe5fbdc2bedfcc5201868d354b63520cccd252b965f2e9c608cb678fc5f391050d42c466c9f79670bd591ea865912517cd6dd

  • C:\Users\Admin\AppData\Local\Temp\7zS5081.tmp\I6anRSnFzLcjtNN.exe

    Filesize

    657KB

    MD5

    b831a4edee2ceadc357e0165ea586f14

    SHA1

    4bd2c00d1331f52acafd077cb358905bcc40a40b

    SHA256

    917f3a961b2105519fa358adac37496671751a49a215922ddba8dd3f047c8627

    SHA512

    805bb79c277be66d0ac821de3f5fe5fbdc2bedfcc5201868d354b63520cccd252b965f2e9c608cb678fc5f391050d42c466c9f79670bd591ea865912517cd6dd

  • C:\Users\Admin\AppData\Local\Temp\7zS5081.tmp\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    df13f711e20e9c80171846d4f2f7ae06

    SHA1

    56d29cda58427efe0e21d3880d39eb1b0ef60bee

    SHA256

    6c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4

    SHA512

    6c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e

  • C:\Users\Admin\AppData\Local\Temp\7zS5081.tmp\[email protected]\chrome.manifest

    Filesize

    35B

    MD5

    25ff93e0221a13a9daf740bc7bc5f3a7

    SHA1

    f0e0028749113f4307a725cf46ce2ba629e69072

    SHA256

    85d8d5073dff0d5b8858b63f75a026a0ce757ba4a11551238fb7b6f5eec2414a

    SHA512

    681c5ac52ce1dab729386ff5ba72856c5b11115fe60675774d9fdb7002618ed0ff2393d2714a90df49c1bb4636cd8bcbc7827a5792ff75f5c992ad10c371bf50

  • C:\Users\Admin\AppData\Local\Temp\7zS5081.tmp\[email protected]\content\bg.js

    Filesize

    7KB

    MD5

    a7081aa95c7ca581f1d1f344062026f0

    SHA1

    a0cb051036140f16083dc9f2b46dc30111327320

    SHA256

    4669d1c93d3ba8d3ee51cb184b5c68315d9111e23238edfa6c2f9b06a71fedfc

    SHA512

    1883812d46ea13ccdc4ef3f8290cd1fc69cb20842f3053ea42f37925fd32bf3330db4e5192df5c780c7bd24f84423788c594f50f9074954bf24e378d74de6a9d

  • C:\Users\Admin\AppData\Local\Temp\7zS5081.tmp\[email protected]\install.rdf

    Filesize

    596B

    MD5

    653927cb65214303c1047e559687f0b3

    SHA1

    6963283a24a60a2725d8a0dc0616559ecd19d7a1

    SHA256

    337d2be35aab6feff9ccc99127e05fea8760b2e818db434b202616815883a5c7

    SHA512

    f66d5955ef153fa2a39580086d82316809e57ad8ad6ddf1c3108f01d978097c31eb53b5a02a1a5df6c97a92f1578cb83769efe296f0c491377f7acb596de2d48

  • C:\Users\Admin\AppData\Local\Temp\7zS5081.tmp\bbm3elce82xVMd.dll

    Filesize

    629KB

    MD5

    8f0476d4c7ef0c04523efe17f95ffff8

    SHA1

    a7605f6101031e5eec2ae964b6ed9d8775434e9e

    SHA256

    7277b7268f48043af02c5a6793e8c17cf815080bebef610fac956b3cb581d909

    SHA512

    21a8056c7a7f1d14240f28543bcda3a19fceeebf5dff24da51f71f97a2d4a2c6bdb1e308051eff62b52efe25af5b5de0f88130f9dad2dc440697b7997de36429

  • C:\Users\Admin\AppData\Local\Temp\7zS5081.tmp\bbm3elce82xVMd.tlb

    Filesize

    3KB

    MD5

    ad50e349afc1c3ffb845262f7fc97603

    SHA1

    b0cc07253796476f702227739c5050247ca2b279

    SHA256

    8f8d4fc042feb74d414a3a5a761dc5394a4b96f1e5bd818bd01208d0b3e1bcb0

    SHA512

    6a11d1bab64ba21c5ce51faf209beb9d6a49e488a27a21e20e51f1d0216c8034be0442ceb351a942d3be4d2883c79495afffa776752dce0fd727a0a32e2740a2

  • C:\Users\Admin\AppData\Local\Temp\7zS5081.tmp\bbm3elce82xVMd.x64.dll

    Filesize

    710KB

    MD5

    2d9b84b8a433eff58888a3240a3a4ff5

    SHA1

    a59f591168b33de4f42b680fb66c7c7f78b11056

    SHA256

    4df3323f9cfeb84add405bf9bf36445a22b368c1efb70e109200d94d880bfbb3

    SHA512

    1cdc6571ae7a8708aaef77f566222aa7cad9da7a77e3e904a56fcfa9238bb6c9993bd455c7f336e4b14e63e61ec8cf4f710567b4b9f420c3133da6dddd10d23e

  • C:\Users\Admin\AppData\Local\Temp\7zS5081.tmp\egeommmfhekohodljhajohpjbnlenkik\b0aR.js

    Filesize

    5KB

    MD5

    60c87bf3466330c9756d45422b924448

    SHA1

    d4812e8466c29339cb6246d58d609dc727e6757f

    SHA256

    df843b7b45e2d01c9739faa6c2c4ad8c49c572d2aec4abe1f27ad2c2d61a4aeb

    SHA512

    6fe18cb49d4314008560f6a8439bf56cf5536499943f125b4d8d79bf12e78a7aae4ec91e026ee8b8d69ae9402b322b0e5a939f553f756f68fa226fb682a149a7

  • C:\Users\Admin\AppData\Local\Temp\7zS5081.tmp\egeommmfhekohodljhajohpjbnlenkik\background.html

    Filesize

    141B

    MD5

    29e400c116bcf015a9a3195731ff311d

    SHA1

    f07da71c97e0d2ded6a1c7d9a35e67fd170b76c1

    SHA256

    39f6cd9de9c6356db6d6f31fe05a2fec0441cd2c1e0c950c16b8bc091f36ac47

    SHA512

    bf71c080805a05753ba4043577e77ec1e5ea85f1951a1ecf2ffcbfef8c6dbcdc6d987b98400704d74a7a36ce17b4a158336e7703b19f503a01a8d77a35df69fb

  • C:\Users\Admin\AppData\Local\Temp\7zS5081.tmp\egeommmfhekohodljhajohpjbnlenkik\content.js

    Filesize

    144B

    MD5

    fca19198fd8af21016a8b1dec7980002

    SHA1

    fd01a47d14004e17a625efe66cc46a06c786cf40

    SHA256

    332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a

    SHA512

    60f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47

  • C:\Users\Admin\AppData\Local\Temp\7zS5081.tmp\egeommmfhekohodljhajohpjbnlenkik\lsdb.js

    Filesize

    531B

    MD5

    36d98318ab2b3b2585a30984db328afb

    SHA1

    f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5

    SHA256

    ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7

    SHA512

    6f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a

  • C:\Users\Admin\AppData\Local\Temp\7zS5081.tmp\egeommmfhekohodljhajohpjbnlenkik\manifest.json

    Filesize

    498B

    MD5

    640199ea4621e34510de919f6a54436f

    SHA1

    dc65dbfad02bd2688030bd56ca1cab85917a9937

    SHA256

    e4aa7c089e32d14ddf584e9de6d007ec16581cd30c248ff7284bc0eb7757d4af

    SHA512

    d64bc524d6df7c4c21a5ddfb0e6636317482ef4dc28006bd0a38d5e26c2db75626f216143026bf8acf3baa11d86c278e902c78afad4f806ca36f9e54bc75ff0a

  • \Program Files (x86)\GoSave\bbm3elce82xVMd.dll

    Filesize

    629KB

    MD5

    8f0476d4c7ef0c04523efe17f95ffff8

    SHA1

    a7605f6101031e5eec2ae964b6ed9d8775434e9e

    SHA256

    7277b7268f48043af02c5a6793e8c17cf815080bebef610fac956b3cb581d909

    SHA512

    21a8056c7a7f1d14240f28543bcda3a19fceeebf5dff24da51f71f97a2d4a2c6bdb1e308051eff62b52efe25af5b5de0f88130f9dad2dc440697b7997de36429

  • \Program Files (x86)\GoSave\bbm3elce82xVMd.x64.dll

    Filesize

    710KB

    MD5

    2d9b84b8a433eff58888a3240a3a4ff5

    SHA1

    a59f591168b33de4f42b680fb66c7c7f78b11056

    SHA256

    4df3323f9cfeb84add405bf9bf36445a22b368c1efb70e109200d94d880bfbb3

    SHA512

    1cdc6571ae7a8708aaef77f566222aa7cad9da7a77e3e904a56fcfa9238bb6c9993bd455c7f336e4b14e63e61ec8cf4f710567b4b9f420c3133da6dddd10d23e

  • \Program Files (x86)\GoSave\bbm3elce82xVMd.x64.dll

    Filesize

    710KB

    MD5

    2d9b84b8a433eff58888a3240a3a4ff5

    SHA1

    a59f591168b33de4f42b680fb66c7c7f78b11056

    SHA256

    4df3323f9cfeb84add405bf9bf36445a22b368c1efb70e109200d94d880bfbb3

    SHA512

    1cdc6571ae7a8708aaef77f566222aa7cad9da7a77e3e904a56fcfa9238bb6c9993bd455c7f336e4b14e63e61ec8cf4f710567b4b9f420c3133da6dddd10d23e

  • \Users\Admin\AppData\Local\Temp\7zS5081.tmp\I6anRSnFzLcjtNN.exe

    Filesize

    657KB

    MD5

    b831a4edee2ceadc357e0165ea586f14

    SHA1

    4bd2c00d1331f52acafd077cb358905bcc40a40b

    SHA256

    917f3a961b2105519fa358adac37496671751a49a215922ddba8dd3f047c8627

    SHA512

    805bb79c277be66d0ac821de3f5fe5fbdc2bedfcc5201868d354b63520cccd252b965f2e9c608cb678fc5f391050d42c466c9f79670bd591ea865912517cd6dd

  • memory/1192-54-0x0000000076701000-0x0000000076703000-memory.dmp

    Filesize

    8KB

  • memory/1620-78-0x000007FEFC391000-0x000007FEFC393000-memory.dmp

    Filesize

    8KB