Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 17:13
Static task
static1
Behavioral task
behavioral1
Sample
7f8351c90a9210d7426d79e7698589a4.exe
Resource
win7-20231215-en
General
-
Target
7f8351c90a9210d7426d79e7698589a4.exe
-
Size
250KB
-
MD5
7f8351c90a9210d7426d79e7698589a4
-
SHA1
fb9ff0c05b19ebcaf6cf2104e995624d591e0475
-
SHA256
4f5e41254147d87d56bada78cc319c8a8eaeb1ae8ef7b2d31dfc645c05a07009
-
SHA512
eaafe46293960db90faad9fad101b53c6eea89e85bf3f2c1aa0739ac411b0d52a7e37e682663aaa406ad5bb794d0de5ff3bed95a072bf5f2496172ec7c9bdc89
-
SSDEEP
6144:h1OgDPdkBAFZWjadD4s5EPlc7BdArSfIVP6qgpJM+tdaPjk:h1OgLdaOmc7vfIVP6fIjjk
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4520 50f965e8c0403.exe -
Loads dropped DLL 3 IoCs
pid Process 4520 50f965e8c0403.exe 4520 50f965e8c0403.exe 4520 50f965e8c0403.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/4520-78-0x0000000074830000-0x000000007483A000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\abkjfblcgbkkephofbokpginkgpdjejo\1\manifest.json 50f965e8c0403.exe -
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{ECA72D66-25DC-17B3-4967-73F68EB21CFA} 50f965e8c0403.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{ECA72D66-25DC-17B3-4967-73F68EB21CFA}\ = "Browse2save" 50f965e8c0403.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{ECA72D66-25DC-17B3-4967-73F68EB21CFA}\NoExplorer = "1" 50f965e8c0403.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral2/files/0x0006000000023240-32.dat nsis_installer_1 behavioral2/files/0x0006000000023240-32.dat nsis_installer_2 -
Modifies registry class 45 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32\ = "C:\\ProgramData\\Browse2save\\50f965e8c043c.tlb" 50f965e8c0403.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 50f965e8c0403.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 50f965e8c0403.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ECA72D66-25DC-17B3-4967-73F68EB21CFA}\InProcServer32\ThreadingModel = "Apartment" 50f965e8c0403.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib 50f965e8c0403.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\Version = "1.0" 50f965e8c0403.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ = "IIEPluginMain" 50f965e8c0403.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 50f965e8c0403.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755} 50f965e8c0403.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0 50f965e8c0403.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32 50f965e8c0403.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32 50f965e8c0403.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 50f965e8c0403.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib 50f965e8c0403.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS 50f965e8c0403.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS\ = "0" 50f965e8c0403.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F} 50f965e8c0403.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib 50f965e8c0403.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ECA72D66-25DC-17B3-4967-73F68EB21CFA}\ = "Browse2save" 50f965e8c0403.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 50f965e8c0403.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "ILocalStorage" 50f965e8c0403.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib 50f965e8c0403.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 50f965e8c0403.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0 50f965e8c0403.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ = "IIEPluginMain" 50f965e8c0403.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\Version = "1.0" 50f965e8c0403.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\Version = "1.0" 50f965e8c0403.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} 50f965e8c0403.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 50f965e8c0403.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\ = "IEPluginLib" 50f965e8c0403.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR\ = "C:\\ProgramData\\Browse2save" 50f965e8c0403.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 50f965e8c0403.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32 50f965e8c0403.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{ECA72D66-25DC-17B3-4967-73F68EB21CFA}\InProcServer32 50f965e8c0403.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{ECA72D66-25DC-17B3-4967-73F68EB21CFA}\ProgID 50f965e8c0403.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ECA72D66-25DC-17B3-4967-73F68EB21CFA}\ProgID\ = "Browse2save.1" 50f965e8c0403.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F} 50f965e8c0403.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 50f965e8c0403.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "ILocalStorage" 50f965e8c0403.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\Version = "1.0" 50f965e8c0403.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ECA72D66-25DC-17B3-4967-73F68EB21CFA}\InProcServer32\ = "C:\\ProgramData\\Browse2save\\50f965e8c043c.dll" 50f965e8c0403.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR 50f965e8c0403.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} 50f965e8c0403.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 50f965e8c0403.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{ECA72D66-25DC-17B3-4967-73F68EB21CFA} 50f965e8c0403.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4124 wrote to memory of 4520 4124 7f8351c90a9210d7426d79e7698589a4.exe 19 PID 4124 wrote to memory of 4520 4124 7f8351c90a9210d7426d79e7698589a4.exe 19 PID 4124 wrote to memory of 4520 4124 7f8351c90a9210d7426d79e7698589a4.exe 19 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID 50f965e8c0403.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{ECA72D66-25DC-17B3-4967-73F68EB21CFA} = "1" 50f965e8c0403.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f8351c90a9210d7426d79e7698589a4.exe"C:\Users\Admin\AppData\Local\Temp\7f8351c90a9210d7426d79e7698589a4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\7zS55A2.tmp\50f965e8c0403.exe.\50f965e8c0403.exe /s2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- Modifies registry class
- System policy modification
PID:4520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\7zS55A2.tmp\[email protected]\bootstrap.js
Filesize2KB
MD599c9b9c75ecfce366ca9149dffea2c22
SHA144aab102a9ca45409ee98119a360db5928a14381
SHA2564584cc3e38935d408aee845e5fa39b420be9b7c8174c9dca022e589a4ca425d7
SHA512c61c71d4335a2fed2af328db9cb6b2c16f628297f48a09bf2ed6e7d1d9c3680684c0529feb2a793dba0ab772e0c952dc53e8bca07a8e70585df4fcf058313473
-
C:\Users\Admin\AppData\Local\Temp\7zS55A2.tmp\[email protected]\chrome.manifest
Filesize116B
MD58fa9d066b321644714aab77c3f3c22e6
SHA1331c6cdd7f6ff934a0e46e978b387fc6089509db
SHA2564d6ebf312e2f38617140245916cc3df8049e31649839d2f24f4bf18f198891ba
SHA5120da769aceaf9d8b2c453e46e06796263ad8372af81e5290bc917f98a72c2cbdda2068d1126bd3d11cfc96ccdc41546246fb9f8b796cb014b84ff81faddc761e1
-
C:\Users\Admin\AppData\Local\Temp\7zS55A2.tmp\[email protected]\content\bg.js
Filesize8KB
MD55f5ad132114cdff702c931decd0a521e
SHA18bb40aa5df9c64726fe7b3b4d574bf8d5d843ac1
SHA25659c73edd4e4081046c16c434abb53845b60aa39fe07a7c5d6371296dcd4cfe75
SHA512cce9f797e917fbdf9ee629bc1e137abda0e1b2bf35ff7bb61724f1917a24480841b116af7ff2ecf300e2b8f7d0456025b77987e7d12d9c8ddb1d8f4206f95cdb
-
C:\Users\Admin\AppData\Local\Temp\7zS55A2.tmp\[email protected]\content\zy.xul
Filesize225B
MD5175b824e80d93d0a1aa5c7182904aca5
SHA1a341478429ed861d16a8f01be264f39709762cc2
SHA256a8b31c5b4f74701ebc60ac215c71b735b33098c4da2fe8e7005ab7c306714020
SHA512241d1a9e853c21912d1c6b00fef134d54c1269089fb2f8af800bb72a1dcb4bd12db70f3da9f1146ec103325d618bb8f344326861dcbacabb7988de5dba8f7b69
-
C:\Users\Admin\AppData\Local\Temp\7zS55A2.tmp\[email protected]\install.rdf
Filesize718B
MD528574c791770130a63c5d64089640a32
SHA14d291d2a7b7eac1b0a899eefa70c5b1e88f24d82
SHA256c6275e5d8e0c036ac5d297bbfcefb18be3dbbb2e024ba904c363a7680d4bcab2
SHA51276f98aa692766e04c0766a55e81d22ca9c3b8c4103d8b3c1c7a27f32fce7969dda1d357d9305a573155b0acfc2993b4049d04ff0ec7dd62b0571b085d2bca10f
-
Filesize
71KB
MD5b78633fae8aaf5f7e99e9c736f44f9c5
SHA126fc60e29c459891ac0909470ac6c61a1eca1544
SHA256d205693516dbaf34cfbd216e825190de4de1412e861bc9cb30ce863907b30d22
SHA5123885b609269b26918ccfcd9069181168c12f4271b6bdfcc51afe176b2dd242d4c0953ac1a4ddaf25abcfaf28a0b694a6269d96ae39bb7b2db2f0140d2d60cd43
-
Filesize
6KB
MD5b3e6519d61c307eef163ef8090425de7
SHA15098840374b155305fa14377a6ee2760f7f9e3f9
SHA25648bba7eeac214157d4a381e205169a33e28e478fc4d92795093bb0936e5253ea
SHA51246408a5d21f95aa294f9481ae915775b1c41d2ad43a7fe0e365cd7b9d90085fe88ac88e4e33cac79f141531c9a7fd3ccbd82b2b47e3e9cae2b47899bd6c7259d
-
Filesize
4KB
MD57579ade7ae1747a31960a228ce02e666
SHA18ec8571a296737e819dcf86353a43fcf8ec63351
SHA256564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5
SHA512a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b