Analysis
-
max time kernel
34s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 20:05
Static task
static1
Behavioral task
behavioral1
Sample
c307c6aec7c2f739a226e79f5713d5ca33d3b6ce089f72634b437e10382fbd5a.exe
Resource
win7-20220812-en
General
-
Target
c307c6aec7c2f739a226e79f5713d5ca33d3b6ce089f72634b437e10382fbd5a.exe
-
Size
2.1MB
-
MD5
3ae1fed9e64e6226a0133fdfbb496984
-
SHA1
9743e5797a7bf949a06c2e6803eb1145f24f9cf0
-
SHA256
c307c6aec7c2f739a226e79f5713d5ca33d3b6ce089f72634b437e10382fbd5a
-
SHA512
4e0247d97c118aaad151d3aa07252416990e7a84af1d2431248b3d40bd7b168a4750ef2e810de19f8732db1429fed27f8d1cabac4be6b0d0dbbaaf7f6afcbf64
-
SSDEEP
49152:h1OsjBNPM6n5oHCZdw3CyvHht6wqM7M1cHp:h1OUBjn5oHCZMDvHhrqMMi
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 684 I6anRSnFzLcjtNN.exe -
Loads dropped DLL 4 IoCs
pid Process 1192 c307c6aec7c2f739a226e79f5713d5ca33d3b6ce089f72634b437e10382fbd5a.exe 684 I6anRSnFzLcjtNN.exe 852 regsvr32.exe 1620 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\egeommmfhekohodljhajohpjbnlenkik\2.0\manifest.json I6anRSnFzLcjtNN.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\egeommmfhekohodljhajohpjbnlenkik\2.0\manifest.json I6anRSnFzLcjtNN.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\egeommmfhekohodljhajohpjbnlenkik\2.0\manifest.json I6anRSnFzLcjtNN.exe -
Installs/modifies Browser Helper Object 2 TTPs 11 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects I6anRSnFzLcjtNN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\ I6anRSnFzLcjtNN.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} I6anRSnFzLcjtNN.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} I6anRSnFzLcjtNN.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DBC80044-A445-435B-BC74-9C25C1C588A9} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{18DF081C-E8AD-4283-A596-FA578C2EBDC3} I6anRSnFzLcjtNN.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43} regsvr32.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files (x86)\GoSave\bbm3elce82xVMd.dat I6anRSnFzLcjtNN.exe File opened for modification C:\Program Files (x86)\GoSave\bbm3elce82xVMd.dat I6anRSnFzLcjtNN.exe File created C:\Program Files (x86)\GoSave\bbm3elce82xVMd.x64.dll I6anRSnFzLcjtNN.exe File opened for modification C:\Program Files (x86)\GoSave\bbm3elce82xVMd.x64.dll I6anRSnFzLcjtNN.exe File created C:\Program Files (x86)\GoSave\bbm3elce82xVMd.dll I6anRSnFzLcjtNN.exe File opened for modification C:\Program Files (x86)\GoSave\bbm3elce82xVMd.dll I6anRSnFzLcjtNN.exe File created C:\Program Files (x86)\GoSave\bbm3elce82xVMd.tlb I6anRSnFzLcjtNN.exe File opened for modification C:\Program Files (x86)\GoSave\bbm3elce82xVMd.tlb I6anRSnFzLcjtNN.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 684 I6anRSnFzLcjtNN.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1192 wrote to memory of 684 1192 c307c6aec7c2f739a226e79f5713d5ca33d3b6ce089f72634b437e10382fbd5a.exe 27 PID 1192 wrote to memory of 684 1192 c307c6aec7c2f739a226e79f5713d5ca33d3b6ce089f72634b437e10382fbd5a.exe 27 PID 1192 wrote to memory of 684 1192 c307c6aec7c2f739a226e79f5713d5ca33d3b6ce089f72634b437e10382fbd5a.exe 27 PID 1192 wrote to memory of 684 1192 c307c6aec7c2f739a226e79f5713d5ca33d3b6ce089f72634b437e10382fbd5a.exe 27 PID 684 wrote to memory of 852 684 I6anRSnFzLcjtNN.exe 28 PID 684 wrote to memory of 852 684 I6anRSnFzLcjtNN.exe 28 PID 684 wrote to memory of 852 684 I6anRSnFzLcjtNN.exe 28 PID 684 wrote to memory of 852 684 I6anRSnFzLcjtNN.exe 28 PID 684 wrote to memory of 852 684 I6anRSnFzLcjtNN.exe 28 PID 684 wrote to memory of 852 684 I6anRSnFzLcjtNN.exe 28 PID 684 wrote to memory of 852 684 I6anRSnFzLcjtNN.exe 28 PID 852 wrote to memory of 1620 852 regsvr32.exe 29 PID 852 wrote to memory of 1620 852 regsvr32.exe 29 PID 852 wrote to memory of 1620 852 regsvr32.exe 29 PID 852 wrote to memory of 1620 852 regsvr32.exe 29 PID 852 wrote to memory of 1620 852 regsvr32.exe 29 PID 852 wrote to memory of 1620 852 regsvr32.exe 29 PID 852 wrote to memory of 1620 852 regsvr32.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\c307c6aec7c2f739a226e79f5713d5ca33d3b6ce089f72634b437e10382fbd5a.exe"C:\Users\Admin\AppData\Local\Temp\c307c6aec7c2f739a226e79f5713d5ca33d3b6ce089f72634b437e10382fbd5a.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\7zS5081.tmp\I6anRSnFzLcjtNN.exe.\I6anRSnFzLcjtNN.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\GoSave\bbm3elce82xVMd.x64.dll"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\GoSave\bbm3elce82xVMd.x64.dll"4⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
PID:1620
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5440d611b5071b0822d362a33f144caa9
SHA102d11789022c963af4a72a8ff1fdd3f1a54e5c4a
SHA2566d7b16876286d412a9e93b06f86d989e9c85c13ea850c4bfca8412d70a3b44dd
SHA512546cff6750117b4c7a7ea9ff7a560cbcfcb9ae9083ef82b1fd7fc7c182d3bdf9809a3fa866bd01b2e23b71dccac716917b1dd669a2a185a1969f8b49917933f1
-
Filesize
710KB
MD52d9b84b8a433eff58888a3240a3a4ff5
SHA1a59f591168b33de4f42b680fb66c7c7f78b11056
SHA2564df3323f9cfeb84add405bf9bf36445a22b368c1efb70e109200d94d880bfbb3
SHA5121cdc6571ae7a8708aaef77f566222aa7cad9da7a77e3e904a56fcfa9238bb6c9993bd455c7f336e4b14e63e61ec8cf4f710567b4b9f420c3133da6dddd10d23e
-
Filesize
6KB
MD5440d611b5071b0822d362a33f144caa9
SHA102d11789022c963af4a72a8ff1fdd3f1a54e5c4a
SHA2566d7b16876286d412a9e93b06f86d989e9c85c13ea850c4bfca8412d70a3b44dd
SHA512546cff6750117b4c7a7ea9ff7a560cbcfcb9ae9083ef82b1fd7fc7c182d3bdf9809a3fa866bd01b2e23b71dccac716917b1dd669a2a185a1969f8b49917933f1
-
Filesize
657KB
MD5b831a4edee2ceadc357e0165ea586f14
SHA14bd2c00d1331f52acafd077cb358905bcc40a40b
SHA256917f3a961b2105519fa358adac37496671751a49a215922ddba8dd3f047c8627
SHA512805bb79c277be66d0ac821de3f5fe5fbdc2bedfcc5201868d354b63520cccd252b965f2e9c608cb678fc5f391050d42c466c9f79670bd591ea865912517cd6dd
-
Filesize
657KB
MD5b831a4edee2ceadc357e0165ea586f14
SHA14bd2c00d1331f52acafd077cb358905bcc40a40b
SHA256917f3a961b2105519fa358adac37496671751a49a215922ddba8dd3f047c8627
SHA512805bb79c277be66d0ac821de3f5fe5fbdc2bedfcc5201868d354b63520cccd252b965f2e9c608cb678fc5f391050d42c466c9f79670bd591ea865912517cd6dd
-
C:\Users\Admin\AppData\Local\Temp\7zS5081.tmp\[email protected]\bootstrap.js
Filesize2KB
MD5df13f711e20e9c80171846d4f2f7ae06
SHA156d29cda58427efe0e21d3880d39eb1b0ef60bee
SHA2566c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4
SHA5126c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e
-
C:\Users\Admin\AppData\Local\Temp\7zS5081.tmp\[email protected]\chrome.manifest
Filesize35B
MD525ff93e0221a13a9daf740bc7bc5f3a7
SHA1f0e0028749113f4307a725cf46ce2ba629e69072
SHA25685d8d5073dff0d5b8858b63f75a026a0ce757ba4a11551238fb7b6f5eec2414a
SHA512681c5ac52ce1dab729386ff5ba72856c5b11115fe60675774d9fdb7002618ed0ff2393d2714a90df49c1bb4636cd8bcbc7827a5792ff75f5c992ad10c371bf50
-
C:\Users\Admin\AppData\Local\Temp\7zS5081.tmp\[email protected]\content\bg.js
Filesize7KB
MD5a7081aa95c7ca581f1d1f344062026f0
SHA1a0cb051036140f16083dc9f2b46dc30111327320
SHA2564669d1c93d3ba8d3ee51cb184b5c68315d9111e23238edfa6c2f9b06a71fedfc
SHA5121883812d46ea13ccdc4ef3f8290cd1fc69cb20842f3053ea42f37925fd32bf3330db4e5192df5c780c7bd24f84423788c594f50f9074954bf24e378d74de6a9d
-
C:\Users\Admin\AppData\Local\Temp\7zS5081.tmp\[email protected]\install.rdf
Filesize596B
MD5653927cb65214303c1047e559687f0b3
SHA16963283a24a60a2725d8a0dc0616559ecd19d7a1
SHA256337d2be35aab6feff9ccc99127e05fea8760b2e818db434b202616815883a5c7
SHA512f66d5955ef153fa2a39580086d82316809e57ad8ad6ddf1c3108f01d978097c31eb53b5a02a1a5df6c97a92f1578cb83769efe296f0c491377f7acb596de2d48
-
Filesize
629KB
MD58f0476d4c7ef0c04523efe17f95ffff8
SHA1a7605f6101031e5eec2ae964b6ed9d8775434e9e
SHA2567277b7268f48043af02c5a6793e8c17cf815080bebef610fac956b3cb581d909
SHA51221a8056c7a7f1d14240f28543bcda3a19fceeebf5dff24da51f71f97a2d4a2c6bdb1e308051eff62b52efe25af5b5de0f88130f9dad2dc440697b7997de36429
-
Filesize
3KB
MD5ad50e349afc1c3ffb845262f7fc97603
SHA1b0cc07253796476f702227739c5050247ca2b279
SHA2568f8d4fc042feb74d414a3a5a761dc5394a4b96f1e5bd818bd01208d0b3e1bcb0
SHA5126a11d1bab64ba21c5ce51faf209beb9d6a49e488a27a21e20e51f1d0216c8034be0442ceb351a942d3be4d2883c79495afffa776752dce0fd727a0a32e2740a2
-
Filesize
710KB
MD52d9b84b8a433eff58888a3240a3a4ff5
SHA1a59f591168b33de4f42b680fb66c7c7f78b11056
SHA2564df3323f9cfeb84add405bf9bf36445a22b368c1efb70e109200d94d880bfbb3
SHA5121cdc6571ae7a8708aaef77f566222aa7cad9da7a77e3e904a56fcfa9238bb6c9993bd455c7f336e4b14e63e61ec8cf4f710567b4b9f420c3133da6dddd10d23e
-
Filesize
5KB
MD560c87bf3466330c9756d45422b924448
SHA1d4812e8466c29339cb6246d58d609dc727e6757f
SHA256df843b7b45e2d01c9739faa6c2c4ad8c49c572d2aec4abe1f27ad2c2d61a4aeb
SHA5126fe18cb49d4314008560f6a8439bf56cf5536499943f125b4d8d79bf12e78a7aae4ec91e026ee8b8d69ae9402b322b0e5a939f553f756f68fa226fb682a149a7
-
Filesize
141B
MD529e400c116bcf015a9a3195731ff311d
SHA1f07da71c97e0d2ded6a1c7d9a35e67fd170b76c1
SHA25639f6cd9de9c6356db6d6f31fe05a2fec0441cd2c1e0c950c16b8bc091f36ac47
SHA512bf71c080805a05753ba4043577e77ec1e5ea85f1951a1ecf2ffcbfef8c6dbcdc6d987b98400704d74a7a36ce17b4a158336e7703b19f503a01a8d77a35df69fb
-
Filesize
144B
MD5fca19198fd8af21016a8b1dec7980002
SHA1fd01a47d14004e17a625efe66cc46a06c786cf40
SHA256332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a
SHA51260f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47
-
Filesize
531B
MD536d98318ab2b3b2585a30984db328afb
SHA1f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5
SHA256ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7
SHA5126f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a
-
Filesize
498B
MD5640199ea4621e34510de919f6a54436f
SHA1dc65dbfad02bd2688030bd56ca1cab85917a9937
SHA256e4aa7c089e32d14ddf584e9de6d007ec16581cd30c248ff7284bc0eb7757d4af
SHA512d64bc524d6df7c4c21a5ddfb0e6636317482ef4dc28006bd0a38d5e26c2db75626f216143026bf8acf3baa11d86c278e902c78afad4f806ca36f9e54bc75ff0a
-
Filesize
629KB
MD58f0476d4c7ef0c04523efe17f95ffff8
SHA1a7605f6101031e5eec2ae964b6ed9d8775434e9e
SHA2567277b7268f48043af02c5a6793e8c17cf815080bebef610fac956b3cb581d909
SHA51221a8056c7a7f1d14240f28543bcda3a19fceeebf5dff24da51f71f97a2d4a2c6bdb1e308051eff62b52efe25af5b5de0f88130f9dad2dc440697b7997de36429
-
Filesize
710KB
MD52d9b84b8a433eff58888a3240a3a4ff5
SHA1a59f591168b33de4f42b680fb66c7c7f78b11056
SHA2564df3323f9cfeb84add405bf9bf36445a22b368c1efb70e109200d94d880bfbb3
SHA5121cdc6571ae7a8708aaef77f566222aa7cad9da7a77e3e904a56fcfa9238bb6c9993bd455c7f336e4b14e63e61ec8cf4f710567b4b9f420c3133da6dddd10d23e
-
Filesize
710KB
MD52d9b84b8a433eff58888a3240a3a4ff5
SHA1a59f591168b33de4f42b680fb66c7c7f78b11056
SHA2564df3323f9cfeb84add405bf9bf36445a22b368c1efb70e109200d94d880bfbb3
SHA5121cdc6571ae7a8708aaef77f566222aa7cad9da7a77e3e904a56fcfa9238bb6c9993bd455c7f336e4b14e63e61ec8cf4f710567b4b9f420c3133da6dddd10d23e
-
Filesize
657KB
MD5b831a4edee2ceadc357e0165ea586f14
SHA14bd2c00d1331f52acafd077cb358905bcc40a40b
SHA256917f3a961b2105519fa358adac37496671751a49a215922ddba8dd3f047c8627
SHA512805bb79c277be66d0ac821de3f5fe5fbdc2bedfcc5201868d354b63520cccd252b965f2e9c608cb678fc5f391050d42c466c9f79670bd591ea865912517cd6dd