Malware Analysis Report

2025-08-10 22:22

Sample ID 240202-zbqq4ahbdl
Target 8a772437e5ab898826c2e4e87d280be6
SHA256 bd8473f2fe4fb7cba21ba9128e77707d89e291134d3ed7c26bc49e086db6f729
Tags
adware stealer
score
6/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
6/10

SHA256

bd8473f2fe4fb7cba21ba9128e77707d89e291134d3ed7c26bc49e086db6f729

Threat Level: Shows suspicious behavior

The file 8a772437e5ab898826c2e4e87d280be6 was found to be: Shows suspicious behavior.

Malicious Activity Summary

adware stealer

Installs/modifies Browser Helper Object

Drops file in System32 directory

Unsigned PE

Modifies registry class

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-02-02 20:32

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-02-02 20:32

Reported

2024-02-02 20:35

Platform

win7-20231215-en

Max time kernel

122s

Max time network

125s

Command Line

"C:\Users\Admin\AppData\Local\Temp\8a772437e5ab898826c2e4e87d280be6.exe"

Signatures

Installs/modifies Browser Helper Object

stealer adware
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{BE275C77-5FF5-497F-8616-1D539F0F48EA} C:\Users\Admin\AppData\Local\Temp\8a772437e5ab898826c2e4e87d280be6.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\regini.dll C:\Users\Admin\AppData\Local\Temp\8a772437e5ab898826c2e4e87d280be6.exe N/A
File opened for modification C:\Windows\SysWOW64\regini.dll C:\Users\Admin\AppData\Local\Temp\8a772437e5ab898826c2e4e87d280be6.exe N/A
File created C:\Windows\SysWOW64\icardagt.dll C:\Users\Admin\AppData\Local\Temp\8a772437e5ab898826c2e4e87d280be6.exe N/A
File opened for modification C:\Windows\SysWOW64\icardagt.dll C:\Users\Admin\AppData\Local\Temp\8a772437e5ab898826c2e4e87d280be6.exe N/A
File created C:\Windows\SysWOW64\shdocvs.dll C:\Users\Admin\AppData\Local\Temp\8a772437e5ab898826c2e4e87d280be6.exe N/A
File created C:\Windows\SysWOW64\kbdbu.cpl C:\Users\Admin\AppData\Local\Temp\8a772437e5ab898826c2e4e87d280be6.exe N/A
File opened for modification C:\Windows\SysWOW64\kbdbu.cpl C:\Users\Admin\AppData\Local\Temp\8a772437e5ab898826c2e4e87d280be6.exe N/A

Modifies registry class

Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BE275C77-5FF5-497F-8616-1D539F0F48EA}\InprocServer32\ThreadingModel = "Apartment" C:\Users\Admin\AppData\Local\Temp\8a772437e5ab898826c2e4e87d280be6.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BE275C77-5FF5-497F-8616-1D539F0F48EA}\TypeLib C:\Users\Admin\AppData\Local\Temp\8a772437e5ab898826c2e4e87d280be6.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BE275C77-5FF5-497F-8616-1D539F0F48EA}\ = "icardagt" C:\Users\Admin\AppData\Local\Temp\8a772437e5ab898826c2e4e87d280be6.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BE275C77-5FF5-497F-8616-1D539F0F48EA}\InprocServer32 C:\Users\Admin\AppData\Local\Temp\8a772437e5ab898826c2e4e87d280be6.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BE275C77-5FF5-497F-8616-1D539F0F48EA} C:\Users\Admin\AppData\Local\Temp\8a772437e5ab898826c2e4e87d280be6.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BE275C77-5FF5-497F-8616-1D539F0F48EA}\InprocServer32\ = "C:\\Windows\\SysWow64\\icardagt.dll" C:\Users\Admin\AppData\Local\Temp\8a772437e5ab898826c2e4e87d280be6.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node C:\Users\Admin\AppData\Local\Temp\8a772437e5ab898826c2e4e87d280be6.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID C:\Users\Admin\AppData\Local\Temp\8a772437e5ab898826c2e4e87d280be6.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BE275C77-5FF5-497F-8616-1D539F0F48EA}\TypeLib\ = "{BE275C77-5FF5-497F-8616-1D539F0F48EA}" C:\Users\Admin\AppData\Local\Temp\8a772437e5ab898826c2e4e87d280be6.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\8a772437e5ab898826c2e4e87d280be6.exe

"C:\Users\Admin\AppData\Local\Temp\8a772437e5ab898826c2e4e87d280be6.exe"

Network

N/A

Files

C:\Windows\SysWOW64\kbdbu.cpl

MD5 498ddcc29ebbf052bc744db2b3a629ba
SHA1 5b37b80aa739ac113bde68c198669fc720c1ab84
SHA256 25d0b45e7f0841ddfbc7f0b4ee28e65f53cdcfe515ffd3a4d0a82ae2af6b74df
SHA512 10018e8d1a123f0f1b2705d34b91482e4cced969fc885598d248539ea3beda9aec993125f6f7c0e7c794ee31564e69511bcf9cb53e4c3b7213fb6adea07c61aa

C:\Windows\SysWOW64\kbdbu.cpl

MD5 2f1a108a005828bde9ecf90432d8d0e9
SHA1 c774ae00ba0fcd63f1a1331851adaf42ff3f7f18
SHA256 a4f31605fd0459a4d6f62a42ef53ef39889072367b674ac3675f86f48028d9df
SHA512 dfe88b1c65737e7ab7c95d0e1b12644905ac493eb47975dff3ea13611ed31530124242b61665a486a2f82dac184f5526f238f732c92faecc2de3fe3d0790ee12

C:\Windows\SysWOW64\kbdbu.cpl

MD5 21514a15fa2ec5c6a20d0f2067434add
SHA1 627efb2aff867c0f63607645327ae0be3082f9ca
SHA256 b55e52e464038d64ed08493547aa9c93bda26c006c1045b7b1a91487f19c186d
SHA512 92c6f62ca2507b2aabdfacd43ce218b558ee25c11b239820f9dd9e8cc81e20a38d6aea76d3869e9dadd957f9dd88ab7519b805b49a2469e3d68cdf5ec604367a

C:\Windows\SysWOW64\kbdbu.cpl

MD5 4c19e8fe701b33e1e64b79b231cfe92f
SHA1 e7a3c65adf2736e228758c476ba385536693767a
SHA256 0df6d70f8bf4f3c5bd59ab448461d5b7dcf108a093e0de6ab67aa527b28d50dc
SHA512 b228d3080b936c5a4e6b10cedcb3cf0eef662698f4d1dcd91643bdc02e1c91f4d546dc8951c6c7c53fb7fc879223b907fbec98a0e61a49878f811396adb7b15e

memory/1076-805-0x0000000000400000-0x000000000042C000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\ea5d4f1f.dat

MD5 0f343b0931126a20f133d67c2b018a3b
SHA1 60cacbf3d72e1e7834203da608037b1bf83b40e8
SHA256 5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef
SHA512 8efb4f73c5655351c444eb109230c556d39e2c7624e9c11abc9e3fb4b9b9254218cc5085b454a9698d085cfa92198491f07a723be4574adc70617b73eb0b6461

C:\Users\Admin\AppData\Local\Temp\55cff068.dat

MD5 be4b1b8d45d0729c4b39ae40fc73a86b
SHA1 3186a8f52d1a190ec2e01e222889a4798109efb6
SHA256 00665e657472657d12d34163785cce23245e68893bca00d889d197bdf13d940f
SHA512 33cf17dfec0c0b65897def04015ac7c7ca5c5452d11477ebd960c064cc1782dbf3e15f4e17edcb1b18adeb46ed5a38f1a2caa9146740807f80c8e7630dfab050

Analysis: behavioral2

Detonation Overview

Submitted

2024-02-02 20:32

Reported

2024-02-02 20:35

Platform

win10v2004-20231215-en

Max time kernel

142s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\8a772437e5ab898826c2e4e87d280be6.exe"

Signatures

N/A

Processes

C:\Users\Admin\AppData\Local\Temp\8a772437e5ab898826c2e4e87d280be6.exe

"C:\Users\Admin\AppData\Local\Temp\8a772437e5ab898826c2e4e87d280be6.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 181.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 150.1.37.23.in-addr.arpa udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 28.160.77.104.in-addr.arpa udp
US 8.8.8.8:53 204.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 30.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 183.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 208.143.182.52.in-addr.arpa udp

Files

N/A