Analysis

  • max time kernel
    60s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2022 20:38

General

  • Target

    eac1fd50499392c1e00c928b94cce66222ad45fc05e108370ff8ccc5fb4ccbe9.exe

  • Size

    2.1MB

  • MD5

    4cb5e34fbb6f0961df53614a40afecac

  • SHA1

    23fdbf476b766b443efe8b60205823cb978c8303

  • SHA256

    eac1fd50499392c1e00c928b94cce66222ad45fc05e108370ff8ccc5fb4ccbe9

  • SHA512

    bb1a486473da026584fa41927f8444d5220f3496b8596ddeefdc819f1c2f4536e3b19f54cfeecb7cebc9963c07b491aded4ec61d4355de7bdabcbef00dab6e82

  • SSDEEP

    49152:h1Os1hvaZG1MVEtzijkTvu2x/uw4B8FHFF6d:h1OivaxMziy3y

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 5 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 9 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 8 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eac1fd50499392c1e00c928b94cce66222ad45fc05e108370ff8ccc5fb4ccbe9.exe
    "C:\Users\Admin\AppData\Local\Temp\eac1fd50499392c1e00c928b94cce66222ad45fc05e108370ff8ccc5fb4ccbe9.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3736
    • C:\Users\Admin\AppData\Local\Temp\7zSFAD0.tmp\r8s8qTj76m1izhd.exe
      .\r8s8qTj76m1izhd.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops Chrome extension
      • Installs/modifies Browser Helper Object
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:1984
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32.exe /s "C:\Program Files (x86)\YouutUbeAdBllocke\D4IuSLLUbw2LfF.x64.dll"
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:3304
        • C:\Windows\system32\regsvr32.exe
          /s "C:\Program Files (x86)\YouutUbeAdBllocke\D4IuSLLUbw2LfF.x64.dll"
          4⤵
          • Loads dropped DLL
          • Installs/modifies Browser Helper Object
          PID:4668

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\YouutUbeAdBllocke\D4IuSLLUbw2LfF.dat

    Filesize

    6KB

    MD5

    57de5d9e60958dcdc64ba4e8f8918280

    SHA1

    b6f7e65b9571065e6c2389bdda82dd12551567a5

    SHA256

    d21bf3fc93ecbaac2ee630f73a6ced0e3f734142056155dbf0cea7c9b67f518c

    SHA512

    a85b03ab16062fb057206a313975c6fd6560911e1f23e08d4ddbed46641ab9e3c59618e1e5547795afe80b3b8c11fbee72839dbe51207fdb9e7ec04342931313

  • C:\Program Files (x86)\YouutUbeAdBllocke\D4IuSLLUbw2LfF.dll

    Filesize

    618KB

    MD5

    f180a95d8673cd01ce4af0ff678fa099

    SHA1

    8592fe958436e14ef9ace437ac4445ecca22e35e

    SHA256

    d40aa49822621713e0f79f6c9a187468251fc22559cb1bbd6b5f71a94819eeb7

    SHA512

    3dda5f3133df4c00c03d8b3fb539b37e2e6b26d0384d3674cefa9595136f9eaa4b9d21c0e806a9ec3cfadfb782a30e344145abbf87bca813de056f84c6fb13c9

  • C:\Program Files (x86)\YouutUbeAdBllocke\D4IuSLLUbw2LfF.x64.dll

    Filesize

    695KB

    MD5

    2af06e7424e4f53fa8ee2b8daf4cdaa3

    SHA1

    0a09aa095e38211b8fc512d2e9f8f7cf12159a19

    SHA256

    81f98c4034227951bd4ad5e6d6a823bd112602f3550fd7066a01f16b8c8aca69

    SHA512

    6bcaa8998bd7971f41bebc8433be949cf48d98c0eb70c643b7b7a1b50d2b4cf66412efb170684f36f1987c1992ba88350f815ea18a3cf50caf8ce97bbb961b16

  • C:\Program Files (x86)\YouutUbeAdBllocke\D4IuSLLUbw2LfF.x64.dll

    Filesize

    695KB

    MD5

    2af06e7424e4f53fa8ee2b8daf4cdaa3

    SHA1

    0a09aa095e38211b8fc512d2e9f8f7cf12159a19

    SHA256

    81f98c4034227951bd4ad5e6d6a823bd112602f3550fd7066a01f16b8c8aca69

    SHA512

    6bcaa8998bd7971f41bebc8433be949cf48d98c0eb70c643b7b7a1b50d2b4cf66412efb170684f36f1987c1992ba88350f815ea18a3cf50caf8ce97bbb961b16

  • C:\Program Files (x86)\YouutUbeAdBllocke\D4IuSLLUbw2LfF.x64.dll

    Filesize

    695KB

    MD5

    2af06e7424e4f53fa8ee2b8daf4cdaa3

    SHA1

    0a09aa095e38211b8fc512d2e9f8f7cf12159a19

    SHA256

    81f98c4034227951bd4ad5e6d6a823bd112602f3550fd7066a01f16b8c8aca69

    SHA512

    6bcaa8998bd7971f41bebc8433be949cf48d98c0eb70c643b7b7a1b50d2b4cf66412efb170684f36f1987c1992ba88350f815ea18a3cf50caf8ce97bbb961b16

  • C:\Users\Admin\AppData\Local\Temp\7zSFAD0.tmp\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    df13f711e20e9c80171846d4f2f7ae06

    SHA1

    56d29cda58427efe0e21d3880d39eb1b0ef60bee

    SHA256

    6c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4

    SHA512

    6c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e

  • C:\Users\Admin\AppData\Local\Temp\7zSFAD0.tmp\[email protected]\chrome.manifest

    Filesize

    35B

    MD5

    58b42c240a3b1c921ed03cbe0ce7dafc

    SHA1

    5cc0c0d7a966d052f62ae86a4175730ca818abae

    SHA256

    90d1b7f06a95d97b04b9b0754abfc43c93ea225eb58f5ab61171a68669ce1f64

    SHA512

    60c80f2506b4d5aab7a4042b55ee227d650c31aa393b39d80377e9b9ef06f4011996892be1fc2251aac91d4a7c8e8e6f9207247e202df51f845d8fae5a4ff835

  • C:\Users\Admin\AppData\Local\Temp\7zSFAD0.tmp\[email protected]\content\bg.js

    Filesize

    7KB

    MD5

    b8f7079a2002e91244a9edd6cc86afd1

    SHA1

    fc64c8076d28c50812017104b249d35fb80cae11

    SHA256

    535ef95cec3c5643f06abf6bce3fb810e484197def9e6744fd3dbb5ccac6da53

    SHA512

    8b1887390c358e5837dd7ac612d1d0df58f5323d49c57352d59941aee9bd248b49b282ed5e11eb7e2324c45f8948cce0be474ea332293a77f35e2b2ed64d16b1

  • C:\Users\Admin\AppData\Local\Temp\7zSFAD0.tmp\[email protected]\install.rdf

    Filesize

    602B

    MD5

    afb151ecf49ed7bf55535a6dd28656e3

    SHA1

    5ac8298799ae843a47b3332adfd6e602dac4aaf2

    SHA256

    abc0f9d0fe57d65ae01da7737dd5421271886f5396af2cc56fdd48b68e180084

    SHA512

    a9e25e3495070b6e9f44be42dcb045a2647fe74be20a87d6d5826a7f644ce9e8061a5151258462758520e26aba66e495787f78cd9bad0445af2d81f9d9035312

  • C:\Users\Admin\AppData\Local\Temp\7zSFAD0.tmp\D4IuSLLUbw2LfF.dll

    Filesize

    618KB

    MD5

    f180a95d8673cd01ce4af0ff678fa099

    SHA1

    8592fe958436e14ef9ace437ac4445ecca22e35e

    SHA256

    d40aa49822621713e0f79f6c9a187468251fc22559cb1bbd6b5f71a94819eeb7

    SHA512

    3dda5f3133df4c00c03d8b3fb539b37e2e6b26d0384d3674cefa9595136f9eaa4b9d21c0e806a9ec3cfadfb782a30e344145abbf87bca813de056f84c6fb13c9

  • C:\Users\Admin\AppData\Local\Temp\7zSFAD0.tmp\D4IuSLLUbw2LfF.tlb

    Filesize

    3KB

    MD5

    8af6f42a5b16ced04702514d47052053

    SHA1

    f06e43c9710e27b38063652217874f6fc8515ea0

    SHA256

    0fc752f18e2f21a6d0b45fb9769deefe70d4690e72225037a37d1dc0553ae8ed

    SHA512

    2d1fedf6693f0347d9265436fbc17515fa9a904db54170181ca7a6d5c64a4928494a20a1eb489d646602ed2769e570bfb5835bffd241a53a8fe64d5767b9234b

  • C:\Users\Admin\AppData\Local\Temp\7zSFAD0.tmp\D4IuSLLUbw2LfF.x64.dll

    Filesize

    695KB

    MD5

    2af06e7424e4f53fa8ee2b8daf4cdaa3

    SHA1

    0a09aa095e38211b8fc512d2e9f8f7cf12159a19

    SHA256

    81f98c4034227951bd4ad5e6d6a823bd112602f3550fd7066a01f16b8c8aca69

    SHA512

    6bcaa8998bd7971f41bebc8433be949cf48d98c0eb70c643b7b7a1b50d2b4cf66412efb170684f36f1987c1992ba88350f815ea18a3cf50caf8ce97bbb961b16

  • C:\Users\Admin\AppData\Local\Temp\7zSFAD0.tmp\cpdnoopiiiijhhnkcpeblbjmpaikiebk\R45.js

    Filesize

    5KB

    MD5

    f41cb836c8526767e1def4f4ec34ab7c

    SHA1

    a17d4dcecbe1e89da3df27f4e7821c058940cfdf

    SHA256

    f2a1125518f849df4da23566f26861e777a27896876599a0500beb4a6dc7a818

    SHA512

    6d24cb344eacd5198c64f112d9b394fcefeedb58d4d6be16d20c83b50664e9eb27ea23453cf390e399ecb2444e80d37de3e650726332f15f3b7e06a0f4f18e41

  • C:\Users\Admin\AppData\Local\Temp\7zSFAD0.tmp\cpdnoopiiiijhhnkcpeblbjmpaikiebk\background.html

    Filesize

    140B

    MD5

    6323b95760ea39a956c96155275439f6

    SHA1

    bfdc127a6d2388683f37daadbd297810dc589149

    SHA256

    6702b42a1b127393ec632ab51600e58c19de21d2fd7f047bdb39117d602aba27

    SHA512

    c2451969d9b5f9c4c0b08fec2e6bd3cf13c78c631b24d2e5956a0c1f4dd094d84533797008ea665df2065bebe448b1162cead13526261b3b765c7fbe115985bb

  • C:\Users\Admin\AppData\Local\Temp\7zSFAD0.tmp\cpdnoopiiiijhhnkcpeblbjmpaikiebk\content.js

    Filesize

    144B

    MD5

    fca19198fd8af21016a8b1dec7980002

    SHA1

    fd01a47d14004e17a625efe66cc46a06c786cf40

    SHA256

    332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a

    SHA512

    60f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47

  • C:\Users\Admin\AppData\Local\Temp\7zSFAD0.tmp\cpdnoopiiiijhhnkcpeblbjmpaikiebk\lsdb.js

    Filesize

    531B

    MD5

    36d98318ab2b3b2585a30984db328afb

    SHA1

    f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5

    SHA256

    ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7

    SHA512

    6f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a

  • C:\Users\Admin\AppData\Local\Temp\7zSFAD0.tmp\cpdnoopiiiijhhnkcpeblbjmpaikiebk\manifest.json

    Filesize

    509B

    MD5

    8e0e1a899e9d76ca1dddc09149d3a60a

    SHA1

    315c3de1cf02ed8f02744e60c6e500ef7feba1c8

    SHA256

    b31423fcd45c9a35fa143fa288a841e86647a2f88c706c4926375e7ff9e1a1a8

    SHA512

    88e86c9484c88040f890f5c318b5002ec3554c10252e0ff54ae8da5f296ba99ea44588c24861378e6d8a9efca458e57abd98a1bf6b8f1b20dc503599043497dd

  • C:\Users\Admin\AppData\Local\Temp\7zSFAD0.tmp\r8s8qTj76m1izhd.dat

    Filesize

    6KB

    MD5

    57de5d9e60958dcdc64ba4e8f8918280

    SHA1

    b6f7e65b9571065e6c2389bdda82dd12551567a5

    SHA256

    d21bf3fc93ecbaac2ee630f73a6ced0e3f734142056155dbf0cea7c9b67f518c

    SHA512

    a85b03ab16062fb057206a313975c6fd6560911e1f23e08d4ddbed46641ab9e3c59618e1e5547795afe80b3b8c11fbee72839dbe51207fdb9e7ec04342931313

  • C:\Users\Admin\AppData\Local\Temp\7zSFAD0.tmp\r8s8qTj76m1izhd.exe

    Filesize

    634KB

    MD5

    bd1503d4eaae5e7f2a8cdbd9a88ec02a

    SHA1

    730280a7839bb46bdeeaa47797d926f8d57e1da1

    SHA256

    724380928512fc5261d5f42e64f7705fcdeae1410f24a8ec6b0a2ba783675cb4

    SHA512

    0dc06ce8e78f6b0ebbe65723791ea4ffde8a9d55534dda1b02e81f1a109fce77f26e4bdfb9fd18b5ca9f4d9ff2454e6b05eca325539148512f762b5d2f225c7b

  • C:\Users\Admin\AppData\Local\Temp\7zSFAD0.tmp\r8s8qTj76m1izhd.exe

    Filesize

    634KB

    MD5

    bd1503d4eaae5e7f2a8cdbd9a88ec02a

    SHA1

    730280a7839bb46bdeeaa47797d926f8d57e1da1

    SHA256

    724380928512fc5261d5f42e64f7705fcdeae1410f24a8ec6b0a2ba783675cb4

    SHA512

    0dc06ce8e78f6b0ebbe65723791ea4ffde8a9d55534dda1b02e81f1a109fce77f26e4bdfb9fd18b5ca9f4d9ff2454e6b05eca325539148512f762b5d2f225c7b