Analysis

  • max time kernel
    142s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-08-2024 09:53

General

  • Target

    mysearch.exe

  • Size

    312KB

  • MD5

    49f799c24707ba2933989f2447f732f7

  • SHA1

    d3fbc5ce62a374b4519419ceddade4c6277f8c0d

  • SHA256

    b2a164564f7882cced37eb1b712254ed13b07aa91b2b351946176f15192e1cce

  • SHA512

    710de1d58b7fa68e1cddd902faa7272b933558523d20abab89958f6c13fb4a0ea66439a3058d9de8fd31304c5316c4a6b8dfc196900abbb13ef36ddac08b6288

  • SSDEEP

    6144:3+bkpRwTJ5e6T9DdqbPaPowUxJMX6vnNcB1ZiRoKRU:7Ue6TiaUNnW1wRl2

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\mysearch.exe
    "C:\Users\Admin\AppData\Local\Temp\mysearch.exe"
    1⤵
    • Loads dropped DLL
    • Installs/modifies Browser Helper Object
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Modifies registry class
    PID:2836

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\MySearch\bar\1.bin\NPMYSRCH.DLL

    Filesize

    24KB

    MD5

    5501b5811411ef10e81af41b84d41e97

    SHA1

    3c8c1c4ae102fdc9b4d6c219c0f281a0abf74420

    SHA256

    fc7b430506ad50d9f91199eafa387a8907c7f23d0c96dfe0ca59ee8778ff6628

    SHA512

    a2a5a357038d4dfad1b3bc9a937bb0f550321f75c92d5eb82f8119b5bcb6d8cfe513bf0037a5440dcc3a2954616b7058e8a59c3ec676afa200fab738f96208ca

  • C:\Program Files (x86)\MySearch\bar\1.bin\S4BAR.DLL

    Filesize

    212KB

    MD5

    8418c946cacde620027169f202ed535c

    SHA1

    5f0351041460c1871277a5958dfb138c8a7ff568

    SHA256

    bf25b62a491ee5ef22ba7a6e1c450cd4011c7e405a0d6fcfdb2502a211e02dcc

    SHA512

    086baffc053b23e4ebb0244491b6c7185857646b0e07a78e8b11274545508ff384d922589179d62b1a690de9645e357a4f012ee8ee95b6b8446027acc5a4880c

  • C:\Program Files (x86)\MySearch\bar\1.bin\S4PLUGIN.DLL

    Filesize

    44KB

    MD5

    78258bfc459a0128d9a7b51c9aab5183

    SHA1

    c53821e971d90f81a5883f8900ea02df2aff71a6

    SHA256

    8352c79e5813eb1f21035e0ab212e0454ad0b4def8c78ee23ce8318c81676490

    SHA512

    f05b4339c72e299a5a3be99e093965c7117f39b37590865fb48b38f78bf160b1c0dbe1105c654fce5791307892ce8f272826ad6a6741fe8b327edddd81bab43d