Analysis

  • max time kernel
    282s
  • max time network
    279s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/05/2023, 18:45

General

  • Target

    google_toolbar_ie-7.5.8321.2252-installer_Yt-i8k1.exe

  • Size

    1.7MB

  • MD5

    b01445231a203d761f6806350c6b4da7

  • SHA1

    590d3af0e35d10659473c878e80894330ed23c45

  • SHA256

    10f81c435c9a627bd1d8bc04fded50a723cd3afb59ddfd1441288c637fb0e7cc

  • SHA512

    208c70364fbb5b958396149629f5d85bb02cf1bb47d5c047afb9569eac2bf3cac75e8a50b01636a069a213dde5b1843e6b8b846a73e4a9432a17c4fa35fd1779

  • SSDEEP

    24576:A7FUDowAyrTVE3U5FmEj6CIFeuTxV/A/Tcr/OzuwibgRb+V8Wb:ABuZrEUR6C6euTxV/ALcr0uxzS

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in Program Files directory 64 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\google_toolbar_ie-7.5.8321.2252-installer_Yt-i8k1.exe
    "C:\Users\Admin\AppData\Local\Temp\google_toolbar_ie-7.5.8321.2252-installer_Yt-i8k1.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1216
    • C:\Users\Admin\AppData\Local\Temp\is-JBUJR.tmp\google_toolbar_ie-7.5.8321.2252-installer_Yt-i8k1.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-JBUJR.tmp\google_toolbar_ie-7.5.8321.2252-installer_Yt-i8k1.tmp" /SL5="$D0028,879088,832512,C:\Users\Admin\AppData\Local\Temp\google_toolbar_ie-7.5.8321.2252-installer_Yt-i8k1.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4948
      • C:\Users\Admin\Downloads\google_toolbar_ie-7.5.8321.2252-installer.exe
        "C:\Users\Admin\Downloads\google_toolbar_ie-7.5.8321.2252-installer.exe"
        3⤵
        • Drops file in Program Files directory
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4520
        • C:\Program Files (x86)\GUM15F9.tmp\GoogleUpdate.exe
          "C:\Program Files (x86)\GUM15F9.tmp\GoogleUpdate.exe" /installsource taggedmi /install "appguid={F69EABDD-A4BB-4555-BE7E-1EA5F59BBA24}&iid={11112222-3333-4444-5555-666677778888}&lang=int&browser=2&usagestats=0&appname=Google%20Toolbar&needsadmin=true&installdataindex=home_asknot_search_asknot&appguid={2CCBABCB-6427-4A55-B091-49864623C43F}&appname=Google%20Toolbar&needsadmin=true&installdataindex=home_asknot_search_asknot"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4828
  • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateOnDemand.exe
    "C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateOnDemand.exe" -Embedding
    1⤵
      PID:4284
    • C:\Windows\SysWOW64\werfault.exe
      werfault.exe /h /shared Global\eb27003445264cacb316425465050575 /t 4108 /p 4828
      1⤵
        PID:5088
      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateOnDemand.exe
        "C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateOnDemand.exe" -Embedding
        1⤵
          PID:1768
        • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateOnDemand.exe
          "C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateOnDemand.exe" -Embedding
          1⤵
            PID:4264
          • C:\Windows\SysWOW64\werfault.exe
            werfault.exe /h /shared Global\9925eb44ea034e6e9fe58581b8b82c2c /t 4108 /p 4828
            1⤵
              PID:2680

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\GUM15F9.tmp\GoogleUpdate.exe

              Filesize

              113KB

              MD5

              506708142bc63daba64f2d3ad1dcd5bf

              SHA1

              d30e8c7543adbc801d675068530b57d75cabb13f

              SHA256

              9c36a08d9e7932ff4da7b5f24e6b42c92f28685b8abe964c870e8d7670fd531a

              SHA512

              a6e16f0de64b1500fbb2c7974a5efd40e8768b6c133f8ef367725a5c82b3b38c300dd65fa159b4a5f15413b0843a1e37416550ec89749ec1cf5cfae73dcc01ab

            • C:\Program Files (x86)\GUM15F9.tmp\GoogleUpdate.exe

              Filesize

              113KB

              MD5

              506708142bc63daba64f2d3ad1dcd5bf

              SHA1

              d30e8c7543adbc801d675068530b57d75cabb13f

              SHA256

              9c36a08d9e7932ff4da7b5f24e6b42c92f28685b8abe964c870e8d7670fd531a

              SHA512

              a6e16f0de64b1500fbb2c7974a5efd40e8768b6c133f8ef367725a5c82b3b38c300dd65fa159b4a5f15413b0843a1e37416550ec89749ec1cf5cfae73dcc01ab

            • C:\Program Files (x86)\GUM15F9.tmp\goopdate.dll

              Filesize

              848KB

              MD5

              6d6b5d52bb81f82f5d0103e6175d1f4f

              SHA1

              1d9c498dc15a8133fb92fba177d34d2c99e0c86a

              SHA256

              14de1e4c28fc5f8cffa7d925561dc1f237d55dd663836e20aa4d7485b01c261d

              SHA512

              e96dd2fc027803d05f317f4633da248bb0f1aecf88eefff302966a0507c9edceded393c4e9248f065b04abd89d307c7ca7c00618b7b093610e3378c361707f7a

            • C:\Program Files (x86)\GUM15F9.tmp\goopdate.dll

              Filesize

              848KB

              MD5

              6d6b5d52bb81f82f5d0103e6175d1f4f

              SHA1

              1d9c498dc15a8133fb92fba177d34d2c99e0c86a

              SHA256

              14de1e4c28fc5f8cffa7d925561dc1f237d55dd663836e20aa4d7485b01c261d

              SHA512

              e96dd2fc027803d05f317f4633da248bb0f1aecf88eefff302966a0507c9edceded393c4e9248f065b04abd89d307c7ca7c00618b7b093610e3378c361707f7a

            • C:\Program Files (x86)\GUM15F9.tmp\goopdateres_en.dll

              Filesize

              840KB

              MD5

              2fee18a796a25970bc339b7e5aa9c683

              SHA1

              6fd804cd3249e437933cc3206c76495acf3b97cd

              SHA256

              106c6f57b08d411bf58b1494fae3d811c68d646f34ca30e2077ad8097710a159

              SHA512

              83a97eb1d8a045a08dfc101fa3f8529636f95449a15f6c261f09fcb82615f09eda9b02dae9dd9ce7bab30ec30b8df5708615e03c18a88324478211dbea015c18

            • C:\Users\Admin\AppData\Local\Temp\is-JBUJR.tmp\google_toolbar_ie-7.5.8321.2252-installer_Yt-i8k1.tmp

              Filesize

              3.1MB

              MD5

              c4630882db671a55924f100c5c1f0056

              SHA1

              24c08e7061301d9a3ef6b2fbbbbad484e5f4bc37

              SHA256

              49cbceb57abe33bad7c5f8c56a8bc5ddd06507d185859554f1de31f3761741e3

              SHA512

              6d044efc68d07317b298fa10ed6d68a6b36df6a31c57f32fc0e358ad2c039307dcec9a1755e3b2dac48efa6a9f31845aa0ae52d2b67e7daeb6ea503ec45257d6

            • C:\Users\Admin\AppData\Local\Temp\is-R57HF.tmp\botva2.dll

              Filesize

              37KB

              MD5

              67965a5957a61867d661f05ae1f4773e

              SHA1

              f14c0a4f154dc685bb7c65b2d804a02a0fb2360d

              SHA256

              450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105

              SHA512

              c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b

            • C:\Users\Admin\AppData\Local\Temp\is-R57HF.tmp\botva2.dll

              Filesize

              37KB

              MD5

              67965a5957a61867d661f05ae1f4773e

              SHA1

              f14c0a4f154dc685bb7c65b2d804a02a0fb2360d

              SHA256

              450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105

              SHA512

              c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b

            • C:\Users\Admin\AppData\Local\Temp\is-R57HF.tmp\mainlogo.png

              Filesize

              1KB

              MD5

              396e1bebc6012f5d8b919b772bdc8674

              SHA1

              ff5219c25bc6118791d1c5ddaf3fb1942150875b

              SHA256

              206d0b3e3f1a664f5ff7f179fafa20479049e259df03e3c8b4e780a0519ad272

              SHA512

              cd2bc711c21a65ff78b735734e0bdf286167b34c80fcc92d10600f0c3474a9e4adcd37e78113363f91e942c0781bbb0db7a48ac393c06af5562b28427c01815c

            • C:\Users\Admin\AppData\Local\Temp\is-R57HF.tmp\v_in_black_circle.png

              Filesize

              1KB

              MD5

              a0f78df30ebc15bda8858e4c490a5eb1

              SHA1

              07140fdad7c7415fbb23461e243d7b576eb08749

              SHA256

              0c679e463254ec4652917110ca1387fb3663d464e4bd792d97c2d853e156d900

              SHA512

              f5539152f7faf5fa3505a2ebd1ccbe3145ee46564b814549a96b63f385a73b7e69176ca853d07adef386ea0cc7c0cea4989c74bd4334997b389d85a2f8db1508

            • C:\Users\Admin\Downloads\google_toolbar_ie-7.5.8321.2252-installer.exe

              Filesize

              800KB

              MD5

              78dc25e90540703e0bbc56656c95a6bf

              SHA1

              cb3ea8827d47b5040b42409aab24d90403e4cc63

              SHA256

              4976622d8aaefc6673215f5bf64812dd792755eba7cefc301c53bafc401aa081

              SHA512

              43d40fa53f6e38bd85589fbb5bc3214b8d5bef5aa1d174feb42c8cde74916084c2aee3def75b386f2bf9e9375cd8d0976038f2170501c1d085ae3db4783c231b

            • C:\Users\Admin\Downloads\google_toolbar_ie-7.5.8321.2252-installer.exe

              Filesize

              800KB

              MD5

              78dc25e90540703e0bbc56656c95a6bf

              SHA1

              cb3ea8827d47b5040b42409aab24d90403e4cc63

              SHA256

              4976622d8aaefc6673215f5bf64812dd792755eba7cefc301c53bafc401aa081

              SHA512

              43d40fa53f6e38bd85589fbb5bc3214b8d5bef5aa1d174feb42c8cde74916084c2aee3def75b386f2bf9e9375cd8d0976038f2170501c1d085ae3db4783c231b

            • C:\Users\Admin\Downloads\google_toolbar_ie-7.5.8321.2252-installer.exe

              Filesize

              800KB

              MD5

              78dc25e90540703e0bbc56656c95a6bf

              SHA1

              cb3ea8827d47b5040b42409aab24d90403e4cc63

              SHA256

              4976622d8aaefc6673215f5bf64812dd792755eba7cefc301c53bafc401aa081

              SHA512

              43d40fa53f6e38bd85589fbb5bc3214b8d5bef5aa1d174feb42c8cde74916084c2aee3def75b386f2bf9e9375cd8d0976038f2170501c1d085ae3db4783c231b

            • memory/1216-154-0x0000000000400000-0x00000000004D8000-memory.dmp

              Filesize

              864KB

            • memory/1216-202-0x0000000000400000-0x00000000004D8000-memory.dmp

              Filesize

              864KB

            • memory/1216-133-0x0000000000400000-0x00000000004D8000-memory.dmp

              Filesize

              864KB

            • memory/4828-275-0x0000000002A90000-0x0000000002A91000-memory.dmp

              Filesize

              4KB

            • memory/4828-276-0x0000000002A90000-0x0000000002A91000-memory.dmp

              Filesize

              4KB

            • memory/4948-157-0x00000000009E0000-0x00000000009E1000-memory.dmp

              Filesize

              4KB

            • memory/4948-200-0x0000000000400000-0x000000000071B000-memory.dmp

              Filesize

              3.1MB

            • memory/4948-155-0x0000000000400000-0x000000000071B000-memory.dmp

              Filesize

              3.1MB

            • memory/4948-156-0x0000000005510000-0x000000000551F000-memory.dmp

              Filesize

              60KB

            • memory/4948-148-0x0000000005510000-0x000000000551F000-memory.dmp

              Filesize

              60KB

            • memory/4948-138-0x00000000009E0000-0x00000000009E1000-memory.dmp

              Filesize

              4KB