Overview
overview
8Static
static
3aa54f68350...18.exe
windows7-x64
7aa54f68350...18.exe
windows10-2004-x64
7$PLUGINSDI...er.exe
windows7-x64
7$PLUGINSDI...er.exe
windows10-2004-x64
8$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3$SYSDIR/Sk...05.dll
windows7-x64
3$SYSDIR/Sk...05.dll
windows10-2004-x64
3LimeWire A...ol.exe
windows7-x64
3LimeWire A...ol.exe
windows10-2004-x64
3UpdateApp.exe
windows7-x64
3UpdateApp.exe
windows10-2004-x64
3gdiplus.dll
windows7-x64
3gdiplus.dll
windows10-2004-x64
3mfc80.dll
windows7-x64
3mfc80.dll
windows10-2004-x64
3packet.dll
windows7-x64
3packet.dll
windows10-2004-x64
3Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2024 08:43
Static task
static1
Behavioral task
behavioral1
Sample
aa54f68350b8a0bac01e02bbe3805ae3_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
aa54f68350b8a0bac01e02bbe3805ae3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Gossiper.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Gossiper.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$SYSDIR/SkinCrafter3_vs2005.dll
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
$SYSDIR/SkinCrafter3_vs2005.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
LimeWire Acceleration Tool.exe
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
LimeWire Acceleration Tool.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
UpdateApp.exe
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
UpdateApp.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
gdiplus.dll
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
gdiplus.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
mfc80.dll
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
mfc80.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
packet.dll
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
packet.dll
Resource
win10v2004-20240802-en
General
-
Target
$PLUGINSDIR/Gossiper.exe
-
Size
5.1MB
-
MD5
1c89e1b7b17c0ada4b6dfe347493a835
-
SHA1
1215b533ec5b67d23cd59551da50658b5d5e6288
-
SHA256
250d3b191f5a723fc9b045fbb9b89c747cade393d85705966f8cec58e6373a00
-
SHA512
1b9bcd900ed17e3441c9691c85483c5d82809c009da01ba74e8f6f8dd3da3d06fd0949f7d4fc6dcbbc3aeedb10d495e5699faa14b802ae4f5fad2167f35bf77a
-
SSDEEP
98304:LnREBoBGZxci3pItnmLufTzki76yvdvwwWcUCTivQI7qQ9l7f1FzbQt:LkoBGTNSQOzv5vccHT27TlvG
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 24 464 rundll32.exe 26 464 rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation GLB99DE.tmp -
Executes dropped EXE 6 IoCs
pid Process 4076 GLB99DE.tmp 3080 STUBWR~1.EXE 2376 conduitinstaller.exe 400 ct1547340_ie.exe 1084 ct1547340_ff.exe 4224 ct1547340_ch.exe -
Loads dropped DLL 30 IoCs
pid Process 4076 GLB99DE.tmp 4076 GLB99DE.tmp 4076 GLB99DE.tmp 3080 STUBWR~1.EXE 2376 conduitinstaller.exe 2376 conduitinstaller.exe 2376 conduitinstaller.exe 2376 conduitinstaller.exe 2376 conduitinstaller.exe 400 ct1547340_ie.exe 400 ct1547340_ie.exe 400 ct1547340_ie.exe 400 ct1547340_ie.exe 400 ct1547340_ie.exe 400 ct1547340_ie.exe 400 ct1547340_ie.exe 400 ct1547340_ie.exe 400 ct1547340_ie.exe 400 ct1547340_ie.exe 400 ct1547340_ie.exe 400 ct1547340_ie.exe 400 ct1547340_ie.exe 3500 rundll32.exe 464 rundll32.exe 2376 conduitinstaller.exe 2376 conduitinstaller.exe 1084 ct1547340_ff.exe 1084 ct1547340_ff.exe 2376 conduitinstaller.exe 2376 conduitinstaller.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 7 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{0a452a47-c5a8-4854-a237-4b9b06b376f0} ct1547340_ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{0a452a47-c5a8-4854-a237-4b9b06b376f0}\ = "Gossiper" ct1547340_ie.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{0a452a47-c5a8-4854-a237-4b9b06b376f0}\NoExplorer = "1" ct1547340_ie.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects ct1547340_ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ ct1547340_ie.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{0a452a47-c5a8-4854-a237-4b9b06b376f0} ct1547340_ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{0a452a47-c5a8-4854-a237-4b9b06b376f0}\ ct1547340_ie.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\GLBSINST.%$D GLB99DE.tmp -
Drops file in Program Files directory 12 IoCs
description ioc Process File created C:\Program Files (x86)\Gossiper\toolbar.cfg ct1547340_ie.exe File created C:\Program Files (x86)\Gossiper\SharedAppsContextMenu.xml ct1547340_ie.exe File created C:\Program Files (x86)\Gossiper\ToolbarContextMenu.xml ct1547340_ie.exe File created C:\Program Files (x86)\Gossiper\GossiperToolbarHelper.exe ct1547340_ie.exe File created C:\Program Files (x86)\Gossiper\tbGoss.dll ct1547340_ie.exe File created C:\Program Files (x86)\Gossiper\prxtbGoss.dll ct1547340_ie.exe File created C:\Program Files (x86)\Gossiper\ldrtbGoss.dll ct1547340_ie.exe File created C:\Program Files (x86)\Gossiper\GottenAppsContextMenu.xml ct1547340_ie.exe File created C:\Program Files (x86)\Gossiper\OtherAppsContextMenu.xml ct1547340_ie.exe File created C:\Program Files (x86)\Gossiper\uninstall.exe ct1547340_ie.exe File created C:\Program Files (x86)\Conduit\Community Alerts\Alert.dll ct1547340_ie.exe File opened for modification C:\Program Files (x86)\Gossiper\ ct1547340_ie.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language conduitinstaller.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ct1547340_ch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ct1547340_ff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gossiper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GLB99DE.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language STUBWR~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ct1547340_ie.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
NSIS installer 8 IoCs
resource yara_rule behavioral4/files/0x00070000000234ee-150.dat nsis_installer_1 behavioral4/files/0x00070000000234ee-150.dat nsis_installer_2 behavioral4/files/0x000a00000002341a-166.dat nsis_installer_1 behavioral4/files/0x000a00000002341a-166.dat nsis_installer_2 behavioral4/files/0x000a00000002341d-302.dat nsis_installer_1 behavioral4/files/0x000a00000002341d-302.dat nsis_installer_2 behavioral4/files/0x00090000000234d6-476.dat nsis_installer_1 behavioral4/files/0x00090000000234d6-476.dat nsis_installer_2 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Microsoft\Internet Explorer\Main ct1547340_ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Toolbar\{0A452A47-C5A8-4854-A237-4B9B06B376F0} = "Gossiper Toolbar" ct1547340_ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{2835E0F2-C004-49D7-8AAF-528357FE5FE9}\AppName = "GossiperAutoUpdateHelper.exe" ct1547340_ie.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{2835E0F2-C004-49D7-8AAF-528357FE5FE9}\Policy = "3" ct1547340_ie.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Microsoft\Internet Explorer\URLSearchHooks ct1547340_ie.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing ct1547340_ie.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Toolbar ct1547340_ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Toolbar\{0a452a47-c5a8-4854-a237-4b9b06b376f0} = "Gossiper Toolbar" ct1547340_ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{39E2FE6F-8D27-4D38-9F39-76A415FB3541}\AppPath = "C:\\Program Files (x86)\\Gossiper" ct1547340_ie.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{2835E0F2-C004-49D7-8AAF-528357FE5FE9} ct1547340_ie.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Internet Explorer\URLSearchHooks\{0a452a47-c5a8-4854-a237-4b9b06b376f0} ct1547340_ie.exe Set value (int) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPageShow = "1" ct1547340_ie.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{39E2FE6F-8D27-4D38-9F39-76A415FB3541} ct1547340_ie.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{39E2FE6F-8D27-4D38-9F39-76A415FB3541}\Policy = "3" ct1547340_ie.exe Set value (data) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{0a452a47-c5a8-4854-a237-4b9b06b376f0} ct1547340_ie.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Microsoft\Internet Explorer\Approved Extensions ct1547340_ie.exe Set value (data) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Internet Explorer\Approved Extensions\{0a452a47-c5a8-4854-a237-4b9b06b376f0} ct1547340_ie.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Enable Browser Extensions = "yes" ct1547340_ie.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Use Search Asst = "no" ct1547340_ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{39E2FE6F-8D27-4D38-9F39-76A415FB3541}\AppName = "GossiperToolbarHelper.exe" ct1547340_ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{2835E0F2-C004-49D7-8AAF-528357FE5FE9}\AppPath = "C:\\Users\\Admin\\AppData\\Local\\Conduit\\CT1547340" ct1547340_ie.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration ct1547340_ie.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://search.conduit.com?SearchSource=10&ctid=CT1547340" ct1547340_ie.exe -
Modifies registry class 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AFC17B18-F04F-4BE6-8146-ED9B57E6F24C}\ProgID\ = "Toolbar.CT1547340" ct1547340_ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{afc17b18-f04f-4be6-8146-ed9b57e6f24c}\VersionIndependentProgID ct1547340_ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Toolbar.CT1547340\CLSID ct1547340_ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A452A47-C5A8-4854-A237-4B9B06B376F0}\InprocServer32\ = "C:\\Program Files (x86)\\Gossiper\\prxtbGoss.dll㜀" ct1547340_ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{afc17b18-f04f-4be6-8146-ed9b57e6f24c}\ProgID ct1547340_ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AFC17B18-F04F-4BE6-8146-ED9B57E6F24C} ct1547340_ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3c471948-f874-49f5-b338-4f214a2ee0b1}\ = "Conduit Community Alerts" ct1547340_ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A452A47-C5A8-4854-A237-4B9B06B376F0}\ = "Gossiper Toolbar" ct1547340_ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A452A47-C5A8-4854-A237-4B9B06B376F0}\InprocServer32 ct1547340_ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AFC17B18-F04F-4BE6-8146-ED9B57E6F24C}\ = "Gossiper API Server" ct1547340_ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AFC17B18-F04F-4BE6-8146-ED9B57E6F24C}\InprocServer32 ct1547340_ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AFC17B18-F04F-4BE6-8146-ED9B57E6F24C}\InprocServer32\ = "C:\\Program Files (x86)\\Gossiper\\prxtbGoss.dll" ct1547340_ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Toolbar.CT1547340 ct1547340_ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3c471948-f874-49f5-b338-4f214a2ee0b1}\InprocServer32\ = "C:\\Program Files (x86)\\Conduit\\Community Alerts\\Alert.dll" ct1547340_ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A452A47-C5A8-4854-A237-4B9B06B376F0} ct1547340_ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A452A47-C5A8-4854-A237-4B9B06B376F0}\InprocServer32\ThreadingModel = "Apartment" ct1547340_ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Toolbar.CT1547340\CLSID\ = "{afc17b18-f04f-4be6-8146-ed9b57e6f24c}" ct1547340_ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3c471948-f874-49f5-b338-4f214a2ee0b1} ct1547340_ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3c471948-f874-49f5-b338-4f214a2ee0b1}\InprocServer32 ct1547340_ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3c471948-f874-49f5-b338-4f214a2ee0b1}\InprocServer32\ThreadingModel = "Apartment" ct1547340_ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AFC17B18-F04F-4BE6-8146-ED9B57E6F24C}\InprocServer32\ThreadingModel = "Apartment" ct1547340_ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AFC17B18-F04F-4BE6-8146-ED9B57E6F24C}\VersionIndependentProgID\ = "Toolbar.CT1547340" ct1547340_ie.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 400 ct1547340_ie.exe 400 ct1547340_ie.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3080 STUBWR~1.EXE 2376 conduitinstaller.exe 400 ct1547340_ie.exe 1084 ct1547340_ff.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2636 wrote to memory of 4076 2636 Gossiper.exe 84 PID 2636 wrote to memory of 4076 2636 Gossiper.exe 84 PID 2636 wrote to memory of 4076 2636 Gossiper.exe 84 PID 4076 wrote to memory of 3080 4076 GLB99DE.tmp 88 PID 4076 wrote to memory of 3080 4076 GLB99DE.tmp 88 PID 4076 wrote to memory of 3080 4076 GLB99DE.tmp 88 PID 3080 wrote to memory of 2376 3080 STUBWR~1.EXE 90 PID 3080 wrote to memory of 2376 3080 STUBWR~1.EXE 90 PID 3080 wrote to memory of 2376 3080 STUBWR~1.EXE 90 PID 2376 wrote to memory of 400 2376 conduitinstaller.exe 91 PID 2376 wrote to memory of 400 2376 conduitinstaller.exe 91 PID 2376 wrote to memory of 400 2376 conduitinstaller.exe 91 PID 400 wrote to memory of 464 400 ct1547340_ie.exe 93 PID 400 wrote to memory of 464 400 ct1547340_ie.exe 93 PID 400 wrote to memory of 464 400 ct1547340_ie.exe 93 PID 400 wrote to memory of 3500 400 ct1547340_ie.exe 94 PID 400 wrote to memory of 3500 400 ct1547340_ie.exe 94 PID 400 wrote to memory of 3500 400 ct1547340_ie.exe 94 PID 2376 wrote to memory of 1084 2376 conduitinstaller.exe 97 PID 2376 wrote to memory of 1084 2376 conduitinstaller.exe 97 PID 2376 wrote to memory of 1084 2376 conduitinstaller.exe 97 PID 2376 wrote to memory of 4224 2376 conduitinstaller.exe 100 PID 2376 wrote to memory of 4224 2376 conduitinstaller.exe 100 PID 2376 wrote to memory of 4224 2376 conduitinstaller.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\Gossiper.exe"C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\Gossiper.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\GLB99DE.tmpC:\Users\Admin\AppData\Local\Temp\GLB99DE.tmp 4736 C:\Users\Admin\AppData\Local\Temp\$PLUGI~1\Gossiper.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Users\Admin\AppData\Local\Temp\CT1547~1\STUBWR~1.EXE"C:\Users\Admin\AppData\Local\Temp\CT1547~1\STUBWR~1.EXE" -parameters=C:\Users\Admin\AppData\Local\Temp\CT1547340\parameters.csf3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Users\Admin\AppData\Local\Temp\conduitinstaller.exeC:\Users\Admin\AppData\Local\Temp\conduitinstaller.exe -StartPage=TRUE -DefaultSearch=TRUE -SearchFromAddress=TRUE -InstallId=CT1547340_Gossiper.exe -OpenUninstallPage=FALSE -Fix404=TRUE -EnableAlerts=TRUE -openwelcomedialog=FALSE -ctid=CT1547340 -ie=C:\Users\Admin\AppData\Local\Temp\CT1547340\CT1547340_ie.exe -ff=C:\Users\Admin\AppData\Local\Temp\CT1547340\CT1547340_ff.exe -ch=C:\Users\Admin\AppData\Local\Temp\CT1547340\CT1547340_ch.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2376 -
\??\c:\users\admin\appdata\local\temp\ct1547340\ct1547340_ie.exe"c:\users\admin\appdata\local\temp\ct1547340\ct1547340_ie.exe" /s -silent -startpage=true -defaultsearch=true -showwelcomepage=false -openwelcomedialog=false -showpersonalcompdialog=false -fix404=true -searchfromaddress=true -searchfromadress=true -openuninstallpage=false -defaultsearchdisplayname= -defaultsearchurl= -enablealerts=true -installtype=ConduitNSISIntegration -installid=ct1547340_gossiper.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\SysWOW64\rundll32.exerundll32 "C:\Program Files (x86)\Gossiper\tbGoss.dll" DllSendInstallationUsage New Installation6⤵
- Blocklisted process makes network request
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:464
-
-
C:\Windows\SysWOW64\rundll32.exerundll32 "C:\Program Files (x86)\Gossiper\tbGoss.dll" DllVerifyEnableExtension6⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3500
-
-
-
\??\c:\users\admin\appdata\local\temp\ct1547340\ct1547340_ff.exe"c:\users\admin\appdata\local\temp\ct1547340\ct1547340_ff.exe" /s -silent -startpage=true -defaultsearch=true -showwelcomepage=false -openwelcomedialog=false -showpersonalcompdialog=false -fix404=true -searchfromaddress=true -searchfromadress=true -openuninstallpage=false -defaultsearchdisplayname= -defaultsearchurl= -enablealerts=true -installtype=ConduitNSISIntegration -installid=ct1547340_gossiper.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1084
-
-
\??\c:\users\admin\appdata\local\temp\ct1547340\ct1547340_ch.exe"c:\users\admin\appdata\local\temp\ct1547340\ct1547340_ch.exe" /s -silent -startpage=true -defaultsearch=true -showwelcomepage=false -openwelcomedialog=false -showpersonalcompdialog=false -fix404=true -searchfromaddress=true -searchfromadress=true -openuninstallpage=false -defaultsearchdisplayname= -defaultsearchurl= -enablealerts=true -installtype=ConduitNSISIntegration -installid=ct1547340_gossiper.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4224
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
623KB
MD56796f6e449f90a543dc3345538acc46f
SHA197bccd25561f44e9b13f05f6eef083c9ce9ba529
SHA256f22e58cdfe94d4a5fbbf2795a743b167ed9923e289e14654631e0077dd306c1d
SHA512f4402027bf1d40f550aab809b17f3bb8543ae76694d1a0ca429c6e1a0e2eacd835b81c4d8f13debed5c80e51c4214991ec8dba8f3a5731b8e5c8ff88e047685a
-
Filesize
172KB
MD54c163bd2a5905d18893ee311608e8c54
SHA1a2d929a9864513c0e8ed84aad622ef6adcc9b950
SHA2564553d99f1f146e2359ceb60987d904bafd24843b71d3e95c358776f3a1d5c6f1
SHA512e1c7b44dc683f58c7c7b66b2448ed19c4e846b35f4018592c2d87191f3d8a2e4649ec3c92aa2f444b249f8ac27e5f2e7fe1cefbedd5d12721d21335a1c55afb1
-
Filesize
20B
MD5cd363c210e1e88a3c760577cf7246fa9
SHA140596f44914a12d3ef2da27a35e85df8fae3ef2e
SHA25666ffcf9708fa59ce6a218ff529e1e93c89542b48ee4938cb176d63c94993ce37
SHA512bb009e0555f0ab8e5e96265952c3a5ba9c58fb3906869027fc16cb8f9e527a1fde0764f4ab044d256b5d3947cd05abd6dd4de92583accc715f6d78bc30f3c04b
-
Filesize
257KB
MD576b3946090c94bb38dbbca54ac8ff9f7
SHA11e00782fec3ca539ae30f866502633ff550356c6
SHA256d3f942951b10476d7f16124295bbacd6da61f63edee8d136260715cc4d929e99
SHA5127c5e1231e6a0174f6c0c88c12bccdef673fd81001f746b7b4e543e73b078312b2fa808bda1616e93f98d44df99ee0d31a9bef2a7adcda783d6b21db7c897e793
-
Filesize
237KB
MD56c729a49e8776ba7b52503bb736de1b5
SHA13a26fbd2fbe2564e2a69f3a64c39940c3ea69920
SHA256b4a1c56c5936f81ceecd8ea31cd3aa56c9c8de954a8601d970ff8be2ef736fdb
SHA512cd9370b88f710fe552d640bb9330f3401864b293a57cb309bdde3afa8c1244858c86267c9d2a23da7f8b9f5a00adc5dbffa15f63cc79ace84d35e267a6c15d31
-
Filesize
70KB
MD5a64e7a7a00ae2ef9c15cb721c60c60c7
SHA1b738107d696aec72a3fc5a371c23023386c50b7d
SHA2565630aad833e5ae2eaa4e0e4ea2f829779470e7e22dcca28a6b2e96c352d737b9
SHA51205d9adfecf9d1ee19faa9fe108c6dc0e237b00f5e4c6e65ee7e9657287271961b018e8ea949c07e3a63ef37d423138ea80f825df5f6e12189157c57c5317dcf3
-
Filesize
161KB
MD58c97d8bb1470c6498e47b12c5a03ce39
SHA115d233b22f1c3d756dca29bcc0021e6fb0b8cdf7
SHA256a87f19f9fee475d2b2e82acfb4589be6d816b613064cd06826e1d4c147beb50a
SHA5127ad0b2b0319da52152c2595ee45045d0c06b157cdaaa56ad57dde9736be3e45fd7357949126f80d3e72b21510f9bf69d010d51b3967a7644662808beed067c3f
-
Filesize
33KB
MD5517419cae37f6c78c80f9b7d0fbb8661
SHA1a9e419f3d9ef589522556e0920c84fe37a548873
SHA256bfe7e013cfb85e78b994d3ad34eca08286494a835cb85f1d7bced3df6fe93a11
SHA5125046565443cf463b6fa4d2d5868879efc6a9db969bf05e3c80725b99bd091ce062cfe66c5551eb1cc5f00a38f2cfcda1f36fb4d60d9ff816c4ec3107b5a0df40
-
Filesize
199KB
MD577b50711b04aa0bf26f9977434db315d
SHA15110b3a2ade2494e1e2f58785c78ba3c6a7ee6b1
SHA256b268697abaa33a5e61532a99ee208861900d40b0ade549e45de228a5bb637d64
SHA512a276ac5e4c7f360ca1d0e56e56a95e3a06c6c423436e98ba1c2d40e7d11230c8ebb32744f5620df7f85d73780c342aeedcd91540381faaa16eeb31c48caa5f76
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
163KB
MD52dc35ddcabcb2b24919b9afae4ec3091
SHA19eeed33c3abc656353a7ebd1c66af38cccadd939
SHA2566bbeb39747f1526752980d4dbec2fe2c7347f3cc983a79c92561b92fe472e7a1
SHA5120ccac336924f684da1f73db2dd230a0c932c5b4115ae1fa0e708b9db5e39d2a07dc54dac8d95881a42069cbb2c2886e880cdad715deda83c0de38757a0f6a901
-
Filesize
11KB
MD5a82b0479708b96c7bf4dd6b798aedee0
SHA17e47b402848a86bdddd5f0de8bb4620471caaab0
SHA25672410442a894b8316da6ad469f03997ec17c0b0d117745bb6ac5cac3232c7d20
SHA51202e07def3897d87d546c0cf1492191591be587f64ae5c165b9a91fb977585c65a860135eb8c102b67dede913ea935459ce70c4ca973b292122c8d097ab130d58
-
Filesize
4.2MB
MD5caa8e6de32b2474f03faf1b42f537913
SHA19a1f6904557ae6a064776ccf9e2857c0baef6222
SHA2569945f7e93f87e81dcbe9f401c1f13aeeaa18e95055543de188370e69cfc4391e
SHA5125ca269628645f2218d2b7c8e4f8537c4aa81aa58410ae2579d6109754036bcdfba4fdcf3accafee8cff0132c88d3f75cafcee23008d1b5eaaccc5af9dff6ebc1
-
Filesize
342B
MD54c6d49a1adbf726a07d9dc9402a5d9d3
SHA1f038c26c561b3fe7fbb1d376fe44a40a0b039c8a
SHA2567a33b60dceac942468799a98c4cd83084b67d491c48def7fcdefc9724501c6f9
SHA5126e18a8284bcaabb55ffb7ae4ba2c161fb14fd2e55ea1c0010ec4352dc47ec64ecf99a62162203f6df0f6ecb1d3dea980ecbbd37a77fe7ca4411fc14da05a76fc
-
Filesize
471KB
MD570e3b20d184751b642b06c5a7855c455
SHA189b00dc942e9c4965765acdb08b3e4a392f2af66
SHA25692e693d3d8be731a66a314e5f15cfad1f4e656f3fee3d32e9e9a736b80be46c1
SHA51248318557e3eb67379b8a8732457ef07864d4dd7a711f22834f883aaa66dbdab01b490a8928c831690e9aadc1514dfb559731142d7c10afd3e75550ab303a0dd3
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\174bkmn3.Admin\extensions\{0a452a47-c5a8-4854-a237-4b9b06b376f0}\install.rdf
Filesize1KB
MD524865c8dd8bed15151f502bc88ffe62e
SHA110a3a311de4e9cf483b91c9fc806bbd705e25a46
SHA25630944d7cce9e71c64de29892fec67dd149d561cadb5510ef520e84bbf03fb8b4
SHA512291b1d8443f0d146b1b0df050cac76951132039470932a578f1ace1c39b1f39a703e08c0da1ea7df7f089d75da4466da1ff787cc02bc4ea8be4d7d7cd70e472f
-
Filesize
1.5MB
MD55d63e53a12f4ae4f3e0677de60a57d54
SHA14e17b4128c980fb80bef6f78a99852ca186f9756
SHA25661a3bc3330c57e1dced4130b7b9f88d1afa20c80b94e6dce06c6a0dc3cc32b67
SHA512cf3b59e4392087c3770aff01b53c70868ad8e09311b267efccb7e58f7bab2089b61a4baf0e09e4d06aa82e99c8b633de9334aaa880b151124767b3e51c7dd0f2
-
Filesize
1.3MB
MD50e46072ae89db808d6dbdaa76d1dc5f1
SHA1480c60ad8fc609419522026c40a2326ad8cff98c
SHA256f3b4e51419c5c336a232ff5531cb82d5a1fbd78dc3d8bb90b1f6e79eca0641f3
SHA5125cf96e9b2e19805facd78f41faab1c215ceb566af54ae097ff3fd4b763389805def87bd01e092fa31d224c1e2da893f41a31aaadcfd93ffcec1f0efc497da397
-
Filesize
2.0MB
MD587b855420cb25c56f25e1675735882c8
SHA12e4e39d92c4bb936d4c0398310e2978fc899c6d0
SHA2560d46102bbeab99df9ccbebe2b65ab7ee0e1f1ef36853056394568d8c500ec244
SHA512fb655abf08e5a14ba0a0feac007a9ed5107ca175fde1a5d8125bc961af8018aaf871736ce6926f1a77184064a117910a81f83f0eee80d8f682a1ebf9fbd10e4c
-
Filesize
411B
MD5e653bb1ca504157802b1da29bc9fe5ac
SHA12a67e089eb435ac0553b6c7b74239f1f479496f5
SHA256498c877c0d25237615e6d92428c17022b585789eabd99c1c25611bdf78830025
SHA51238b436136a3386430c8b3f73f3c2ea6567b006faccd858209ac0e52fa94749cbc9d14207c4c455ba7bd0abf135831dc31c60d2c07938dfa7ad02b194ca7923a1