Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 05:51
Static task
static1
Behavioral task
behavioral1
Sample
2ab34333a2053b8d989fae3f6f188db4.exe
Resource
win7-20231129-en
General
-
Target
2ab34333a2053b8d989fae3f6f188db4.exe
-
Size
245KB
-
MD5
2ab34333a2053b8d989fae3f6f188db4
-
SHA1
20e924fc980da665d17a1ea2bf2975414290fa3e
-
SHA256
285ffa1bed4467770ecbfdbe37c55ef889aa49ce78763f5f8265fb764cfcf34d
-
SHA512
8abe15ea001d34cd75324fb22b69e719f96bf92d842c9397563267a5d7c5b033769d7d96f0d22910ee5be4d92b607d14d237615842e971b5c96ec585ec4a98cd
-
SSDEEP
6144:h1OgDPdkBAFZWjadD4s5v3fgWnxSYAJtzaoS:h1OgLdaOA+nRoS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4232 50b43d265d636.exe -
Loads dropped DLL 2 IoCs
pid Process 4232 50b43d265d636.exe 4232 50b43d265d636.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 4 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{F8A19D86-A7B3-A116-D23D-6CC5EC6EE973} 50b43d265d636.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{F8A19D86-A7B3-A116-D23D-6CC5EC6EE973}\ = "Download and Sa" 50b43d265d636.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{F8A19D86-A7B3-A116-D23D-6CC5EC6EE973}\NoExplorer = "1" 50b43d265d636.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{F8A19D86-A7B3-A116-D23D-6CC5EC6EE973} 50b43d265d636.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral2/files/0x000600000002321a-23.dat nsis_installer_1 behavioral2/files/0x000600000002321a-23.dat nsis_installer_2 -
Modifies registry class 63 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F8A19D86-A7B3-A116-D23D-6CC5EC6EE973}\VersionIndependentProgID 50b43d265d636.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR 50b43d265d636.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0 50b43d265d636.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 50b43d265d636.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F} 50b43d265d636.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 50b43d265d636.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F8A19D86-A7B3-A116-D23D-6CC5EC6EE973}\ = "Download and Sa Class" 50b43d265d636.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ = "IIEPluginBHO" 50b43d265d636.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} 50b43d265d636.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\50b43d265d66f.ocx.50b43d265d66f.ocx\CLSID 50b43d265d636.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F8A19D86-A7B3-A116-D23D-6CC5EC6EE973}\InprocServer32 50b43d265d636.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 50b43d265d636.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\50b43d265d66f.ocx.50b43d265d66f.ocx 50b43d265d636.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\50b43d265d66f.ocx.50b43d265d66f.ocx\CLSID\ = "{F8A19D86-A7B3-A116-D23D-6CC5EC6EE973}" 50b43d265d636.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F8A19D86-A7B3-A116-D23D-6CC5EC6EE973}\ProgID 50b43d265d636.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F8A19D86-A7B3-A116-D23D-6CC5EC6EE973}\VersionIndependentProgID 50b43d265d636.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F8A19D86-A7B3-A116-D23D-6CC5EC6EE973}\InprocServer32\ThreadingModel = "Apartment" 50b43d265d636.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F} 50b43d265d636.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 50b43d265d636.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 50b43d265d636.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\50b43d265d66f.ocx.50b43d265d66f.ocx.7.1 50b43d265d636.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\50b43d265d66f.ocx.50b43d265d66f.ocx.7.1\ = "Download and Sa" 50b43d265d636.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F8A19D86-A7B3-A116-D23D-6CC5EC6EE973}\ProgID\ = "50b43d265d66f.ocx.7.1" 50b43d265d636.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32 50b43d265d636.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} 50b43d265d636.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 50b43d265d636.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 50b43d265d636.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "IIEPluginStorage" 50b43d265d636.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib 50b43d265d636.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\50b43d265d66f.ocx.50b43d265d66f.ocx\CurVer\ = "50b43d265d66f.ocx.7.1" 50b43d265d636.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib 50b43d265d636.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\Version = "1.0" 50b43d265d636.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\Version = "1.0" 50b43d265d636.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F8A19D86-A7B3-A116-D23D-6CC5EC6EE973}\VersionIndependentProgID\ = "50b43d265d66f.ocx" 50b43d265d636.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F8A19D86-A7B3-A116-D23D-6CC5EC6EE973}\InprocServer32 50b43d265d636.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\50b43d265d66f.ocx.50b43d265d66f.ocx.7.1\CLSID 50b43d265d636.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\50b43d265d66f.ocx.50b43d265d66f.ocx\CurVer 50b43d265d636.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F8A19D86-A7B3-A116-D23D-6CC5EC6EE973}\Programmable 50b43d265d636.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32 50b43d265d636.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 50b43d265d636.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\50b43d265d66f.ocx.50b43d265d66f.ocx.7.1\CLSID\ = "{F8A19D86-A7B3-A116-D23D-6CC5EC6EE973}" 50b43d265d636.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32\ = "C:\\ProgramData\\Download and Sa\\50b43d265d66f.ocx" 50b43d265d636.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ = "IIEPluginBHO" 50b43d265d636.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 50b43d265d636.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F8A19D86-A7B3-A116-D23D-6CC5EC6EE973} 50b43d265d636.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755} 50b43d265d636.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32 50b43d265d636.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib 50b43d265d636.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 50b43d265d636.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\Version = "1.0" 50b43d265d636.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F8A19D86-A7B3-A116-D23D-6CC5EC6EE973} 50b43d265d636.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0 50b43d265d636.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS 50b43d265d636.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR\ = "C:\\ProgramData\\Download and Sa" 50b43d265d636.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "IIEPluginStorage" 50b43d265d636.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F8A19D86-A7B3-A116-D23D-6CC5EC6EE973}\ProgID 50b43d265d636.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS\ = "0" 50b43d265d636.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\Version = "1.0" 50b43d265d636.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib 50b43d265d636.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\50b43d265d66f.ocx.50b43d265d66f.ocx\ = "Download and Sa" 50b43d265d636.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F8A19D86-A7B3-A116-D23D-6CC5EC6EE973}\Programmable 50b43d265d636.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F8A19D86-A7B3-A116-D23D-6CC5EC6EE973}\InprocServer32\ = "C:\\ProgramData\\Download and Sa\\50b43d265d66f.ocx" 50b43d265d636.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\ = "IEPluginLib" 50b43d265d636.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1668 wrote to memory of 4232 1668 2ab34333a2053b8d989fae3f6f188db4.exe 17 PID 1668 wrote to memory of 4232 1668 2ab34333a2053b8d989fae3f6f188db4.exe 17 PID 1668 wrote to memory of 4232 1668 2ab34333a2053b8d989fae3f6f188db4.exe 17 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID 50b43d265d636.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{F8A19D86-A7B3-A116-D23D-6CC5EC6EE973} = "1" 50b43d265d636.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ab34333a2053b8d989fae3f6f188db4.exe"C:\Users\Admin\AppData\Local\Temp\2ab34333a2053b8d989fae3f6f188db4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\7zS4AA5.tmp\50b43d265d636.exe.\50b43d265d636.exe /s2⤵
- Executes dropped EXE
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
- System policy modification
PID:4232
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\7zS4AA5.tmp\[email protected]\bootstrap.js
Filesize2KB
MD5d3a6fdbe30e042af9e4e0207bfe60417
SHA1373cb7165ba656217c8eedfd1d0bbe8c1963690a
SHA256fd2dfba8e5ec77507317152acf9be85b93251d3ec318fa7afc2d069910495af0
SHA512fc2623acbcf1564006bade631c5e6e327622f0a8654c702505243ab3f4c8ea92ff12bbaf23c7d03c736a19a96c17e0ce8013ef7ea76de942e5653842e7132ece
-
Filesize
65KB
MD56fce522ef2543f1cd8812f45c8718ba6
SHA1270c89c05963c0f24f976f6b75aa4d12ade4c837
SHA256d75c34545066eb787ed671c6d4ce4f4c6267637518ca683dfefb79f95f14226b
SHA512a0a486b95aeb9c059f23e639e16abdbfe94b041f33309b44e95743bf5a82f92d3c444c025b6c36a0dc296add3c2bc4f6affcf130014f16968be0afa8e0007880