Overview
overview
7Static
static
3VirusShare...68.exe
windows7-x64
7VirusShare...68.exe
windows10-2004-x64
7$PLUGINSDI...is.dll
windows7-x64
3$PLUGINSDI...is.dll
windows10-2004-x64
3ffMediaWat...ion.js
windows7-x64
1ffMediaWat...ion.js
windows10-2004-x64
1ff/chrome/...427.js
windows7-x64
1ff/chrome/...427.js
windows10-2004-x64
1ff/chrome/...ion.js
windows7-x64
1ff/chrome/...ion.js
windows10-2004-x64
1ie/MediaWa...27.dll
windows7-x64
6ie/MediaWa...27.dll
windows10-2004-x64
6uninstall.exe
windows7-x64
7uninstall.exe
windows10-2004-x64
7$PLUGINSDI...is.dll
windows7-x64
3$PLUGINSDI...is.dll
windows10-2004-x64
3Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/02/2024, 16:18
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_7b8c8ad756e2e5e0a4ebc1a2b7833e68.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
VirusShare_7b8c8ad756e2e5e0a4ebc1a2b7833e68.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/aminsis.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/aminsis.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
ffMediaWatchV1home2427chaction.js
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
ffMediaWatchV1home2427chaction.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
ff/chrome/content/ffMediaWatchV1home2427.js
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
ff/chrome/content/ffMediaWatchV1home2427.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
ff/chrome/content/ffMediaWatchV1home2427ffaction.js
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
ff/chrome/content/ffMediaWatchV1home2427ffaction.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
ie/MediaWatchV1home2427.dll
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
ie/MediaWatchV1home2427.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral13
Sample
uninstall.exe
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
uninstall.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/aminsis.dll
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/aminsis.dll
Resource
win10v2004-20231215-en
General
-
Target
VirusShare_7b8c8ad756e2e5e0a4ebc1a2b7833e68.exe
-
Size
634KB
-
MD5
7b8c8ad756e2e5e0a4ebc1a2b7833e68
-
SHA1
c963091441fdbac6c66b92114b716cd75fba590c
-
SHA256
1e48ba42fad238c5eb31848e810360aef3d51bd217797833b9fe6d4e34958431
-
SHA512
04ef1e105b0d57e04ead621d5501dba22624eb035eaa7b2e3eae45616aa8e9adc3d016b281b47d870d5ecc6b9a098792531a295e3087ca445ff2258ca5b98ebb
-
SSDEEP
12288:aOcT22WHJG4GjeZHkwuPikQ7lKH5p5H9x1DeZHkwuriZQblKh5pDxXTd8zbk:aOcTuHJG4GjeZEXi37l6Br1DeZEDiObo
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 1700 VirusShare_7b8c8ad756e2e5e0a4ebc1a2b7833e68.exe 2660 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{f0188277-b293-4174-9ba7-566c739b10fd} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{f0188277-b293-4174-9ba7-566c739b10fd}\ = "MediaWatchV1home2427" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{f0188277-b293-4174-9ba7-566c739b10fd}\NoExplorer = "1" regsvr32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\GroupPolicy VirusShare_7b8c8ad756e2e5e0a4ebc1a2b7833e68.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini VirusShare_7b8c8ad756e2e5e0a4ebc1a2b7833e68.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol VirusShare_7b8c8ad756e2e5e0a4ebc1a2b7833e68.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI VirusShare_7b8c8ad756e2e5e0a4ebc1a2b7833e68.exe -
Drops file in Program Files directory 22 IoCs
description ioc Process File created C:\Program Files (x86)\MediaWatchV1\MediaWatchV1home2427\ff\install.rdf VirusShare_7b8c8ad756e2e5e0a4ebc1a2b7833e68.exe File opened for modification C:\Program Files (x86)\MediaWatchV1\MediaWatchV1home2427\ff\chrome VirusShare_7b8c8ad756e2e5e0a4ebc1a2b7833e68.exe File opened for modification C:\Program Files (x86)\MediaWatchV1\MediaWatchV1home2427\ff\chrome\content\ffMediaWatchV1home2427.js VirusShare_7b8c8ad756e2e5e0a4ebc1a2b7833e68.exe File opened for modification C:\Program Files (x86)\MediaWatchV1\MediaWatchV1home2427\ff\chrome\content\icons\default\MediaWatchV1home2427_32.png VirusShare_7b8c8ad756e2e5e0a4ebc1a2b7833e68.exe File created C:\Program Files (x86)\MediaWatchV1\MediaWatchV1home2427\uninstall.exe VirusShare_7b8c8ad756e2e5e0a4ebc1a2b7833e68.exe File created C:\Program Files (x86)\MediaWatchV1\MediaWatchV1home2427\ch\MediaWatchV1home2427.crx VirusShare_7b8c8ad756e2e5e0a4ebc1a2b7833e68.exe File created C:\Program Files (x86)\MediaWatchV1\MediaWatchV1home2427\ff\chrome.manifest VirusShare_7b8c8ad756e2e5e0a4ebc1a2b7833e68.exe File opened for modification C:\Program Files (x86)\MediaWatchV1\MediaWatchV1home2427\ff\chrome.manifest VirusShare_7b8c8ad756e2e5e0a4ebc1a2b7833e68.exe File opened for modification C:\Program Files (x86)\MediaWatchV1\MediaWatchV1home2427\ff\chrome\content VirusShare_7b8c8ad756e2e5e0a4ebc1a2b7833e68.exe File created C:\Program Files (x86)\MediaWatchV1\MediaWatchV1home2427\ff\chrome\content\ffMediaWatchV1home2427ffaction.js VirusShare_7b8c8ad756e2e5e0a4ebc1a2b7833e68.exe File opened for modification C:\Program Files (x86)\MediaWatchV1\MediaWatchV1home2427\ff\chrome\content\ffMediaWatchV1home2427ffaction.js VirusShare_7b8c8ad756e2e5e0a4ebc1a2b7833e68.exe File created C:\Program Files (x86)\MediaWatchV1\MediaWatchV1home2427\ff\chrome\content\overlay.xul VirusShare_7b8c8ad756e2e5e0a4ebc1a2b7833e68.exe File opened for modification C:\Program Files (x86)\MediaWatchV1\MediaWatchV1home2427\ff\chrome\content\icons VirusShare_7b8c8ad756e2e5e0a4ebc1a2b7833e68.exe File opened for modification C:\Program Files (x86)\MediaWatchV1\MediaWatchV1home2427\ch\MediaWatchV1home2427.crx VirusShare_7b8c8ad756e2e5e0a4ebc1a2b7833e68.exe File created C:\Program Files (x86)\MediaWatchV1\MediaWatchV1home2427\ff\chrome\content\ffMediaWatchV1home2427.js VirusShare_7b8c8ad756e2e5e0a4ebc1a2b7833e68.exe File opened for modification C:\Program Files (x86)\MediaWatchV1\MediaWatchV1home2427\ff\chrome\content\overlay.xul VirusShare_7b8c8ad756e2e5e0a4ebc1a2b7833e68.exe File created C:\Program Files (x86)\MediaWatchV1\MediaWatchV1home2427\ff\chrome\content\icons\Thumbs.db VirusShare_7b8c8ad756e2e5e0a4ebc1a2b7833e68.exe File opened for modification C:\Program Files (x86)\MediaWatchV1\MediaWatchV1home2427\ff\chrome\content\icons\Thumbs.db VirusShare_7b8c8ad756e2e5e0a4ebc1a2b7833e68.exe File opened for modification C:\Program Files (x86)\MediaWatchV1\MediaWatchV1home2427\ff\chrome\content\icons\default VirusShare_7b8c8ad756e2e5e0a4ebc1a2b7833e68.exe File created C:\Program Files (x86)\MediaWatchV1\MediaWatchV1home2427\ff\chrome\content\icons\default\MediaWatchV1home2427_32.png VirusShare_7b8c8ad756e2e5e0a4ebc1a2b7833e68.exe File created C:\Program Files (x86)\MediaWatchV1\MediaWatchV1home2427\ie\MediaWatchV1home2427.dll VirusShare_7b8c8ad756e2e5e0a4ebc1a2b7833e68.exe File opened for modification C:\Program Files (x86)\MediaWatchV1\MediaWatchV1home2427\ff\install.rdf VirusShare_7b8c8ad756e2e5e0a4ebc1a2b7833e68.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Approved Extensions VirusShare_7b8c8ad756e2e5e0a4ebc1a2b7833e68.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Approved Extensions\{f0188277-b293-4174-9ba7-566c739b10fd} = 51667a6c4c1d3b1b679d08eface5190582ae102c70d157e8 VirusShare_7b8c8ad756e2e5e0a4ebc1a2b7833e68.exe -
Modifies registry class 36 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3FFC2577-190B-4C45-BDB5-3136B267BE95}\1.1\HELPDIR\ = "C:\\Program Files (x86)\\MediaWatchV1\\MediaWatchV1home2427\\ie" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{f0188277-b293-4174-9ba7-566c739b10fd} VirusShare_7b8c8ad756e2e5e0a4ebc1a2b7833e68.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{f0188277-b293-4174-9ba7-566c739b10fd}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3FFC2577-190B-4C45-BDB5-3136B267BE95}\1.1\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3FFC2577-190B-4C45-BDB5-3136B267BE95}\1.1\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{814C370D-2545-40A4-9527-05E7B3BAB74B}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{f0188277-b293-4174-9ba7-566c739b10fd}\ = "Media Watch" VirusShare_7b8c8ad756e2e5e0a4ebc1a2b7833e68.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{f0188277-b293-4174-9ba7-566c739b10fd}\TypeLib\ = "{3ffc2577-190b-4c45-bdb5-3136b267be95}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3FFC2577-190B-4C45-BDB5-3136B267BE95}\1.1\HELPDIR regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{814C370D-2545-40A4-9527-05E7B3BAB74B} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3FFC2577-190B-4C45-BDB5-3136B267BE95}\1.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{814C370D-2545-40A4-9527-05E7B3BAB74B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{814C370D-2545-40A4-9527-05E7B3BAB74B}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{814C370D-2545-40A4-9527-05E7B3BAB74B}\ = "IMediaWatchV1home2427BHO" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{814C370D-2545-40A4-9527-05E7B3BAB74B}\TypeLib\Version = "1.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3FFC2577-190B-4C45-BDB5-3136B267BE95}\1.1\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{814C370D-2545-40A4-9527-05E7B3BAB74B}\TypeLib\ = "{3FFC2577-190B-4C45-BDB5-3136B267BE95}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{814C370D-2545-40A4-9527-05E7B3BAB74B}\TypeLib\ = "{3FFC2577-190B-4C45-BDB5-3136B267BE95}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{814C370D-2545-40A4-9527-05E7B3BAB74B}\TypeLib\Version = "1.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{814C370D-2545-40A4-9527-05E7B3BAB74B} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{814C370D-2545-40A4-9527-05E7B3BAB74B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3FFC2577-190B-4C45-BDB5-3136B267BE95} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3FFC2577-190B-4C45-BDB5-3136B267BE95}\1.1\0\win32\ = "C:\\Program Files (x86)\\MediaWatchV1\\MediaWatchV1home2427\\ie\\MediaWatchV1home2427.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{814C370D-2545-40A4-9527-05E7B3BAB74B}\ = "IMediaWatchV1home2427BHO" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3FFC2577-190B-4C45-BDB5-3136B267BE95}\1.1\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{f0188277-b293-4174-9ba7-566c739b10fd}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{f0188277-b293-4174-9ba7-566c739b10fd}\Version regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3FFC2577-190B-4C45-BDB5-3136B267BE95}\1.1\ = "MediaWatchV1home2427Lib" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{f0188277-b293-4174-9ba7-566c739b10fd}\InprocServer32\ = "C:\\Program Files (x86)\\MediaWatchV1\\MediaWatchV1home2427\\ie\\MediaWatchV1home2427.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{f0188277-b293-4174-9ba7-566c739b10fd}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{f0188277-b293-4174-9ba7-566c739b10fd}\Version\ = "1.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{814C370D-2545-40A4-9527-05E7B3BAB74B}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{814C370D-2545-40A4-9527-05E7B3BAB74B}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{f0188277-b293-4174-9ba7-566c739b10fd} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{f0188277-b293-4174-9ba7-566c739b10fd}\ = "MediaWatchV1home2427" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{f0188277-b293-4174-9ba7-566c739b10fd}\InprocServer32 regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1700 VirusShare_7b8c8ad756e2e5e0a4ebc1a2b7833e68.exe 1700 VirusShare_7b8c8ad756e2e5e0a4ebc1a2b7833e68.exe 1700 VirusShare_7b8c8ad756e2e5e0a4ebc1a2b7833e68.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1700 wrote to memory of 2660 1700 VirusShare_7b8c8ad756e2e5e0a4ebc1a2b7833e68.exe 28 PID 1700 wrote to memory of 2660 1700 VirusShare_7b8c8ad756e2e5e0a4ebc1a2b7833e68.exe 28 PID 1700 wrote to memory of 2660 1700 VirusShare_7b8c8ad756e2e5e0a4ebc1a2b7833e68.exe 28 PID 1700 wrote to memory of 2660 1700 VirusShare_7b8c8ad756e2e5e0a4ebc1a2b7833e68.exe 28 PID 1700 wrote to memory of 2660 1700 VirusShare_7b8c8ad756e2e5e0a4ebc1a2b7833e68.exe 28 PID 1700 wrote to memory of 2660 1700 VirusShare_7b8c8ad756e2e5e0a4ebc1a2b7833e68.exe 28 PID 1700 wrote to memory of 2660 1700 VirusShare_7b8c8ad756e2e5e0a4ebc1a2b7833e68.exe 28 PID 1700 wrote to memory of 2904 1700 VirusShare_7b8c8ad756e2e5e0a4ebc1a2b7833e68.exe 29 PID 1700 wrote to memory of 2904 1700 VirusShare_7b8c8ad756e2e5e0a4ebc1a2b7833e68.exe 29 PID 1700 wrote to memory of 2904 1700 VirusShare_7b8c8ad756e2e5e0a4ebc1a2b7833e68.exe 29 PID 1700 wrote to memory of 2904 1700 VirusShare_7b8c8ad756e2e5e0a4ebc1a2b7833e68.exe 29 PID 1700 wrote to memory of 2904 1700 VirusShare_7b8c8ad756e2e5e0a4ebc1a2b7833e68.exe 29 PID 1700 wrote to memory of 2904 1700 VirusShare_7b8c8ad756e2e5e0a4ebc1a2b7833e68.exe 29 PID 1700 wrote to memory of 2904 1700 VirusShare_7b8c8ad756e2e5e0a4ebc1a2b7833e68.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\VirusShare_7b8c8ad756e2e5e0a4ebc1a2b7833e68.exe"C:\Users\Admin\AppData\Local\Temp\VirusShare_7b8c8ad756e2e5e0a4ebc1a2b7833e68.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 "C:\Program Files (x86)\MediaWatchV1\MediaWatchV1home2427\ie\MediaWatchV1home2427.dll" /s2⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:2660
-
-
C:\Windows\SysWOW64\gpupdate.exe"C:\Windows\System32\gpupdate.exe" /force2⤵PID:2904
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
85KB
MD528c07962e61d1c1e2a3b169be219c961
SHA17dd1f02d6e181164a14aaadf605a1699897962db
SHA256b290ee17d015b8eb149dcb5265011538f7873d3b73985d4aa53f68ef1ae7e8fd
SHA512fdedb93a0372a8d7628f54bfeaf50a9527ad077f8c8dd35a24b7f7ba8162c4d60a9d747a743ccfb55c1bd3ced5123064a4756a2b73152de5e11b6886c808cd27
-
Filesize
559KB
MD551ba1095f0ae45a2d444bea506cb9ad4
SHA1038a5d53d055a6d440bd2c8864c2f51db206c5e5
SHA256b620091bf9973e807e12155d2247a6d233b5d13ec38c426675470ab4b26f0539
SHA512f5fe2dd0f19bcaab47540ceedbec71f7f7c5b833c8772c097594c458e5f1101fe9feb849812b65c175055f71dfb13f11c4ad94fef42cd66f247413e453de3361