Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
13-03-2024 04:33
Static task
static1
Behavioral task
behavioral1
Sample
c4fc33abd8bfcbdc094010f5682b99ec.exe
Resource
win7-20240215-en
General
-
Target
c4fc33abd8bfcbdc094010f5682b99ec.exe
-
Size
249KB
-
MD5
c4fc33abd8bfcbdc094010f5682b99ec
-
SHA1
7b4b5ed08de7cbd2d7c499fd1e980f2ce0199181
-
SHA256
27cce5adc271a57236913ea2c2af6bbe15747a3f458f4f45fb33c81d26225220
-
SHA512
611a7c3568bd452cd14cbc82742712c9f1af467e4e030a8772c46101070f8bb8e77eba1b48ef7aa235d0aedb9f7e7ec36f832e1252ea7669dec7b5fb8f630c81
-
SSDEEP
6144:h1OgDPdkBAFZWjadD4s5DEya/AOKh0uw1ndSgo5:h1OgLdaOIIOKiJJo
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0006000000016c3a-52.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 2628 50e4f88a723a7.exe -
Loads dropped DLL 5 IoCs
pid Process 1920 c4fc33abd8bfcbdc094010f5682b99ec.exe 2628 50e4f88a723a7.exe 2628 50e4f88a723a7.exe 2628 50e4f88a723a7.exe 2628 50e4f88a723a7.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x0006000000016c3a-52.dat upx behavioral1/memory/2628-54-0x0000000074DB0000-0x0000000074DBA000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{8BA42327-A595-01D0-102A-621A41361CCD} 50e4f88a723a7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{8BA42327-A595-01D0-102A-621A41361CCD}\ = "SaveAs" 50e4f88a723a7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{8BA42327-A595-01D0-102A-621A41361CCD}\NoExplorer = "1" 50e4f88a723a7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 4 IoCs
resource yara_rule behavioral1/files/0x0009000000015cf5-20.dat nsis_installer_1 behavioral1/files/0x0009000000015cf5-20.dat nsis_installer_2 behavioral1/files/0x0006000000016ce4-74.dat nsis_installer_1 behavioral1/files/0x0006000000016ce4-74.dat nsis_installer_2 -
Modifies registry class 45 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0 50e4f88a723a7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32 50e4f88a723a7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8BA42327-A595-01D0-102A-621A41361CCD}\ = "SaveAs" 50e4f88a723a7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8BA42327-A595-01D0-102A-621A41361CCD}\ProgID\ = "SaveAs.1" 50e4f88a723a7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS 50e4f88a723a7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F} 50e4f88a723a7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "ILocalStorage" 50e4f88a723a7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} 50e4f88a723a7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755} 50e4f88a723a7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32\ = "C:\\ProgramData\\SaveAs\\50e4f88a723e0.tlb" 50e4f88a723a7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32 50e4f88a723a7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\Version = "1.0" 50e4f88a723a7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "ILocalStorage" 50e4f88a723a7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\Version = "1.0" 50e4f88a723a7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS\ = "0" 50e4f88a723a7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F} 50e4f88a723a7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} 50e4f88a723a7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib 50e4f88a723a7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\ = "IEPluginLib" 50e4f88a723a7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR\ = "C:\\ProgramData\\SaveAs" 50e4f88a723a7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 50e4f88a723a7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 50e4f88a723a7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 50e4f88a723a7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 50e4f88a723a7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib 50e4f88a723a7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32 50e4f88a723a7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR 50e4f88a723a7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib 50e4f88a723a7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib 50e4f88a723a7.exe Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{8BA42327-A595-01D0-102A-621A41361CCD} 50e4f88a723a7.exe Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{8BA42327-A595-01D0-102A-621A41361CCD}\InProcServer32 50e4f88a723a7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8BA42327-A595-01D0-102A-621A41361CCD}\InProcServer32\ = "C:\\ProgramData\\SaveAs\\50e4f88a723e0.dll" 50e4f88a723a7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 50e4f88a723a7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0 50e4f88a723a7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ = "IIEPluginMain" 50e4f88a723a7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 50e4f88a723a7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ = "IIEPluginMain" 50e4f88a723a7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 50e4f88a723a7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 50e4f88a723a7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 50e4f88a723a7.exe Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{8BA42327-A595-01D0-102A-621A41361CCD}\ProgID 50e4f88a723a7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\Version = "1.0" 50e4f88a723a7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\Version = "1.0" 50e4f88a723a7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 50e4f88a723a7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8BA42327-A595-01D0-102A-621A41361CCD}\InProcServer32\ThreadingModel = "Apartment" 50e4f88a723a7.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1920 wrote to memory of 2628 1920 c4fc33abd8bfcbdc094010f5682b99ec.exe 28 PID 1920 wrote to memory of 2628 1920 c4fc33abd8bfcbdc094010f5682b99ec.exe 28 PID 1920 wrote to memory of 2628 1920 c4fc33abd8bfcbdc094010f5682b99ec.exe 28 PID 1920 wrote to memory of 2628 1920 c4fc33abd8bfcbdc094010f5682b99ec.exe 28 PID 1920 wrote to memory of 2628 1920 c4fc33abd8bfcbdc094010f5682b99ec.exe 28 PID 1920 wrote to memory of 2628 1920 c4fc33abd8bfcbdc094010f5682b99ec.exe 28 PID 1920 wrote to memory of 2628 1920 c4fc33abd8bfcbdc094010f5682b99ec.exe 28 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID 50e4f88a723a7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{8BA42327-A595-01D0-102A-621A41361CCD} = "1" 50e4f88a723a7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4fc33abd8bfcbdc094010f5682b99ec.exe"C:\Users\Admin\AppData\Local\Temp\c4fc33abd8bfcbdc094010f5682b99ec.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\7zS1249.tmp\50e4f88a723a7.exe.\50e4f88a723a7.exe /s2⤵
- Executes dropped EXE
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
- System policy modification
PID:2628
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD5e9c9582996a23b2a49a058dcaa3b5525
SHA1f527cc64e759f06c011e5eeffbd217d5249c04df
SHA25643c3e8d7aa00a299f084db17e384aa96de508565f82264ee88bd9c7647fa9fc9
SHA512665613fc7f20e2c4ea40b7a8f39b4c2ea2a24c5119ee86ef072bbe29f606cd78a43081aa0a89b678a46d34e470e1ed10e31d590d3cb5447e1231707fea8e490f
-
C:\Users\Admin\AppData\Local\Temp\7zS1249.tmp\[email protected]\bootstrap.js
Filesize2KB
MD5c4234fb051e7c22948a366f946281e9a
SHA1788ab1f8bbb98934a420efde8ee47dba23510c8d
SHA256b0d0d9bfe8daf855eb655660fb291ef83fd68cac0084779975bf2abadd3dd54b
SHA512ec9999dcb5f1346ab7431453a28bbd9f901e626c872b43259367996fc32f7cf6c94b9f44635b9ffc927d6c23aa2a9f2648cb7fa0b0e1be6972b14ae2a7cde881
-
C:\Users\Admin\AppData\Local\Temp\7zS1249.tmp\[email protected]\chrome.manifest
Filesize116B
MD5345089fe6cbdee79782333cd60c81336
SHA1728de608d29ec2cb78236573d2b2b52da71b1905
SHA2566bc8efb12c3d64d402aa84bc6a08c63370ea42c76162f76c4c59463835678112
SHA512ebbf134e35a7f9eded08b0bd2715672adb0282e577e11137a3ebe4940c1f9218a80fcf6659ea6e1dd6602b01fdea54fd82f0a691519d4ce77a4708cae4febb73
-
C:\Users\Admin\AppData\Local\Temp\7zS1249.tmp\[email protected]\content\bg.js
Filesize8KB
MD5778f5be2e6e4ee8739509e4d01ae7a2d
SHA1828143631ce149712377f6688fc15b277665fcef
SHA256583451d93b1bd0200a6e7449f24e177d6330d93a34eae65022295dd8c4876a68
SHA5122c688786de204871853a5577aacd3e79d2888fbd441a548a70fb83c6acdbb668383d7174da6d4b2a322cfffb770bd7de8dd28b102c08ad984179157c1951b4f3
-
C:\Users\Admin\AppData\Local\Temp\7zS1249.tmp\[email protected]\content\zy.xul
Filesize225B
MD5b03876d3e2b4e71c4787c17a128574f1
SHA1c88bc93d3222714acbb8c96b6188834c165746b5
SHA2568c2029f195fdcacc8ca32e33a45d1a3fe5074f7607b5390a14653a928d831226
SHA512b9c39aee9e17d9bcc9cd7f0203f3ce67bc716f00e34a2c4c59f5039d1caebce519ea735864ffefe05785023ed35dce9693ed69e40b617323a8c7e31478bf9ede
-
C:\Users\Admin\AppData\Local\Temp\7zS1249.tmp\[email protected]\install.rdf
Filesize702B
MD5b1950611947e00729077fa66fd5476a4
SHA1190c21dd4a5910d6907e04dd2ffabad04393d407
SHA256d04d52e7bd0a993af93c26fe1b3b0a05ef96fb21577d1697fc967e20967b445f
SHA512222df6100a214f6d2a84891dcdacdf7ea05007a8babc69f0c217fbf98dbcf6321986d28f3ddc2bd42b05c92b94b589e8e23972dbb30dd08a4b74c1d5b45bde26
-
Filesize
115KB
MD56696822add17061dc0bb8ee5b42cc2d4
SHA1d4622558ba366f2f94560da301a81c6c16f95a3c
SHA25673c44d8943947e3cf9ecabdeea4d9a37652614f5490a1f972816be4123795125
SHA5120f1946ce002441d010f67156f67b9d18e01ba35edfeb66ce8096467d3126b547e5040032253275b173f2dba9bce983775f360d83ec026986b55cb85e4b63f099
-
Filesize
2KB
MD5096a65b8a695249d5d554776f1eeace3
SHA12f2506b886a59b4408b23653d8734004ec2dda6d
SHA256a602c790bcf424c154a082a88a495b256dd5456f627943568c358c74f606c568
SHA5126e832caff1951b4fdb489997af5736fdbafa1de5573f629fc6798666bffd0ca0715311ce6590202cc970cce4492d94994a588547bb579bf70bc264683bc45cdc
-
Filesize
8KB
MD520caacbffc43ebe2c7ae71cb5fe9faa8
SHA1aa47a95d1a38d70259b7a5424800e656c3948c2e
SHA2569a2295fa6291e601957eea614f5914dda64c1187aeca84a441b17738526fb7b7
SHA5123be076a3b249d6496136fa5d03fbd8a855840efe0e188726fb9a653bf050f9a815ca20bf92863cdc849b4542d6e5bd6d17e991733573b45dcd75c9d741fa0c87
-
Filesize
6KB
MD5f4517f9a00c604e7cdd85a2446a66c61
SHA16002dfb93f35f14f47aa0431ae26a433171f3775
SHA2566d7ab4f6c2587145fe676642301c219f5b45b0b7275418f5be34eb4ae9d67db8
SHA51275040a78ed817af9024e3ad759293da801755141d3b0169f0dec79a149bc6e2e7ee5a4928782956b7de9bc2fda867bf4dd3434efe0c68697608bd10438529c37
-
Filesize
70KB
MD5ebcc3eb1a7021aaead55fb677465a717
SHA13c8347f0fd520ee423a4aafea1112a0b06f4b6c8
SHA2565e74f0e710c067ad82301c7c14ed6afb138f974f351042cfe0ecd275cea2612c
SHA5120f18c22e6eff8ec90ccc616e62f32701d046185311e01e5f506778fae0c31f35123c3ce756ff2c0eef6f23e06e280f870b80080d11dc6da3aa25901f5a92d995
-
Filesize
4KB
MD57579ade7ae1747a31960a228ce02e666
SHA18ec8571a296737e819dcf86353a43fcf8ec63351
SHA256564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5
SHA512a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b
-
Filesize
7KB
MD5b9cd1b0fd3af89892348e5cc3108dce7
SHA1f7bc59bf631303facfc970c0da67a73568e1dca6
SHA25649b173504eb9cd07e42a3c4deb84c2cd3f3b49c7fb0858aee43ddfc64660e384
SHA512fdcbdd21b831a92ca686aab5b240f073a89a08588e42439564747cad9160d79cfa8e3c103b6b4f2917684c1a591880203b4303418b85bc040f9f00b6658b0c90