Analysis

  • max time kernel
    190s
  • max time network
    174s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    24-09-2021 20:24

General

  • Target

    okta.swa.ie-5.33.0.exe

  • Size

    2.6MB

  • MD5

    b318e26f2c2355ea929a77e0c0f96200

  • SHA1

    1caacbd90bc1d0bdca3616234de909fa84961a34

  • SHA256

    43a5d2374dae6ac4c70aecd7570b1df3f2bd4ee8c85ab9613762502dca2f1b0d

  • SHA512

    cdc0a430f520f4837415d36f5e8b8af69589b429d304f2831a4bfb1a89771210b55db127ebaf718c53c8d5bfed6d292ca4762c726a7b14d546f0f9183718b340

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 7 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 12 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 58 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • System policy modification 1 TTPs 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\okta.swa.ie-5.33.0.exe
    "C:\Users\Admin\AppData\Local\Temp\okta.swa.ie-5.33.0.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2064
    • C:\Windows\system32\taskkill.exe
      "C:\Windows\system32\taskkill.exe" /im OktaIeHelper.exe /f
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2552
    • C:\ProgramData\InstallMate\{951D73C6-B2B4-4319-A4E0-0E393B3D20F3}\x86\regsvr32.exe
      "C:\ProgramData\InstallMate\{951D73C6-B2B4-4319-A4E0-0E393B3D20F3}\x86\regsvr32.exe" "C:\Program Files\Okta IE plugin\x86\OktaBHO.dll" /i:`` /r
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies registry class
      • System policy modification
      PID:3692
    • C:\ProgramData\InstallMate\{951D73C6-B2B4-4319-A4E0-0E393B3D20F3}\x64\regsvr32.exe
      "C:\ProgramData\InstallMate\{951D73C6-B2B4-4319-A4E0-0E393B3D20F3}\x64\regsvr32.exe" "C:\Program Files\Okta IE plugin\x64\toolbar\OktaIEBand.dll" /i:`` /r
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Modifies registry class
      • System policy modification
      PID:3588
    • C:\ProgramData\InstallMate\{951D73C6-B2B4-4319-A4E0-0E393B3D20F3}\x86\regsvr32.exe
      "C:\ProgramData\InstallMate\{951D73C6-B2B4-4319-A4E0-0E393B3D20F3}\x86\regsvr32.exe" "C:\Program Files\Okta IE plugin\x86\toolbar\OktaIEBand.dll" /i:`` /r
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Modifies registry class
      • System policy modification
      PID:3916
    • C:\ProgramData\InstallMate\{951D73C6-B2B4-4319-A4E0-0E393B3D20F3}\x64\regsvr32.exe
      "C:\ProgramData\InstallMate\{951D73C6-B2B4-4319-A4E0-0E393B3D20F3}\x64\regsvr32.exe" "C:\Program Files\Okta IE plugin\x64\OktaBHO.dll" /i:`` /r
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies registry class
      • System policy modification
      PID:1116
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" "https://system.okta.com/plugin/verification/ie"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2208
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2208 CREDAT:82945 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3940

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Browser Extensions

1
T1176

Defense Evasion

Modify Registry

3
T1112

Discovery

Query Registry

1
T1012

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Okta IE plugin\x64\OktaBHO.dll
    MD5

    bf81d7bd4d0ffe69534d62894016b2ca

    SHA1

    4c1d3b414b55d212a58ba8fb0082c1b717cfa1d9

    SHA256

    cc0fcd4d60c20b1e43148a615ddf2892be19b6b16521bca58829e94d493e59f8

    SHA512

    6abf9d80dbb310896f2fdb9891ff51050e48733a7f8f1881e0854f54a9baa72483d5cdc8cf3f29f92cbd0b3b231dade61d02e45bfe29591a9fd7fe287e470b1c

  • C:\Program Files\Okta IE plugin\x64\toolbar\OktaIEBand.dll
    MD5

    ad2c1ba7ce659d21cabb1d5178d0d93b

    SHA1

    32912792f8c5e32d1cdde23fb5d7cd4ba09aea0a

    SHA256

    c1b3f0ba8a7bed237bbd759511c045551200c70827d2068174c1385d785efe1c

    SHA512

    f65ebf49cae63b32a3bfe399e369e02aa208467d5342321fc0e91804abb7bc24bcd6f907b34207aebbf584b37d5a75c5fe98ef4ba54d03c330d6fe50c5c3e93f

  • C:\Program Files\Okta IE plugin\x86\OktaBHO.dll
    MD5

    8c0fee0ea798113f2cc0d088d17a909b

    SHA1

    40dab5811598515499b308b8e2af4acfe7b113a0

    SHA256

    4d11ae4d7777d72a7cf88561d561dcdb45b3ecc80af0021767e4a13e9eb89a49

    SHA512

    fedb69abdeca031a4f2c1c50fe11a88967e97eedda8884fa60130b24185575b8d41e754c350fce8f610affd05dcc095e6a2b8b043c5552ab4024cd79d5c461a3

  • C:\Program Files\Okta IE plugin\x86\toolbar\OktaIEBand.dll
    MD5

    2e1b9e21ae58898abb96c41375843733

    SHA1

    68332f19978d8050f32e5eb8e0d685b437cd1435

    SHA256

    71e3368f34c3b0ef6d999b68b70ee25d8adf2b1405e0ac7031e3ceb65dab2a1b

    SHA512

    b43f1392790854386bf600bbcd22161869fa81438d82bd81d76b403fd341dc976a5195496120cad9e145fd89eb03b4279b68bfa429bf35b3c90f1b88e65992b7

  • C:\ProgramData\InstallMate\{951D73C6-B2B4-4319-A4E0-0E393B3D20F3}\x64\regsvr32.exe
    MD5

    3353415c921cc5c7b38bb03d0244e0fd

    SHA1

    e7a269266e96066b8887054ebefe1807c52c97ca

    SHA256

    1c00adbbdae60fc68edb5e92d048a649564d6315e2062ef31569835cd2349025

    SHA512

    7d4efafb14fc2311cd3a9019b76bdc71a50692299b0ca96445dd625edfd3b4ca9a533d623b73b7ab4cb5f116d0b5f607391c32ef40a2361bd3341d86d68d3afd

  • C:\ProgramData\InstallMate\{951D73C6-B2B4-4319-A4E0-0E393B3D20F3}\x64\regsvr32.exe
    MD5

    3353415c921cc5c7b38bb03d0244e0fd

    SHA1

    e7a269266e96066b8887054ebefe1807c52c97ca

    SHA256

    1c00adbbdae60fc68edb5e92d048a649564d6315e2062ef31569835cd2349025

    SHA512

    7d4efafb14fc2311cd3a9019b76bdc71a50692299b0ca96445dd625edfd3b4ca9a533d623b73b7ab4cb5f116d0b5f607391c32ef40a2361bd3341d86d68d3afd

  • C:\ProgramData\InstallMate\{951D73C6-B2B4-4319-A4E0-0E393B3D20F3}\x64\regsvr32.exe
    MD5

    3353415c921cc5c7b38bb03d0244e0fd

    SHA1

    e7a269266e96066b8887054ebefe1807c52c97ca

    SHA256

    1c00adbbdae60fc68edb5e92d048a649564d6315e2062ef31569835cd2349025

    SHA512

    7d4efafb14fc2311cd3a9019b76bdc71a50692299b0ca96445dd625edfd3b4ca9a533d623b73b7ab4cb5f116d0b5f607391c32ef40a2361bd3341d86d68d3afd

  • C:\ProgramData\InstallMate\{951D73C6-B2B4-4319-A4E0-0E393B3D20F3}\x86\regsvr32.exe
    MD5

    c509ebdc4e6557ce525ed967b98295f9

    SHA1

    8585a83463f97c7d760e77038113b50f027441f0

    SHA256

    68d57181e59d069803b351ce40d1841110f1a171084f4cbeb4e8fa23716f5dc3

    SHA512

    e8b2a736b1bc79670d17db625c6a57f2b35aff0cf90eb0447be51affbadbeeef17121a1965d98bbb49e76e1a17ddbaf14b66f1ca2dcf87a1444aaad5c838a17c

  • C:\ProgramData\InstallMate\{951D73C6-B2B4-4319-A4E0-0E393B3D20F3}\x86\regsvr32.exe
    MD5

    c509ebdc4e6557ce525ed967b98295f9

    SHA1

    8585a83463f97c7d760e77038113b50f027441f0

    SHA256

    68d57181e59d069803b351ce40d1841110f1a171084f4cbeb4e8fa23716f5dc3

    SHA512

    e8b2a736b1bc79670d17db625c6a57f2b35aff0cf90eb0447be51affbadbeeef17121a1965d98bbb49e76e1a17ddbaf14b66f1ca2dcf87a1444aaad5c838a17c

  • C:\ProgramData\InstallMate\{951D73C6-B2B4-4319-A4E0-0E393B3D20F3}\x86\regsvr32.exe
    MD5

    c509ebdc4e6557ce525ed967b98295f9

    SHA1

    8585a83463f97c7d760e77038113b50f027441f0

    SHA256

    68d57181e59d069803b351ce40d1841110f1a171084f4cbeb4e8fa23716f5dc3

    SHA512

    e8b2a736b1bc79670d17db625c6a57f2b35aff0cf90eb0447be51affbadbeeef17121a1965d98bbb49e76e1a17ddbaf14b66f1ca2dcf87a1444aaad5c838a17c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2543B5AF7D46D42E6CEED21F85143F6A_515F3099EFB1C5E69E2D764425FF9E87
    MD5

    07a5ed13fee6ded28c48f40ee33ecb8f

    SHA1

    ac0759cafd7b163736bc44ad6209ee15bbb77911

    SHA256

    529ab9b8be74aa69f48c319ef821e2c1f3b2dfff6da8cf7fd79ab14aeddc0fa0

    SHA512

    c3c63493abe5297e9c27eaed47d018ef1dff99710339021b9b39d81f2b604cd89be63e2dff37d50ee90dc1887220fb53d249f6fe020fc5103b2c7faabc49dab5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_A30EA9B4E1BC5DBF09A8EF399E086D27
    MD5

    96d912754b19ecf01f2a44cb111a5836

    SHA1

    bdd29febe61e6518a02ed7436f4f693ed008702c

    SHA256

    02d969c7f8bfce21ddce96ec8520c1b2d36a1e4fb8fe12f3a5435d60cab9bbcf

    SHA512

    cd8f1d3c15d1e00bf98a847d0f8c23411be02e3136191a7c7a43296f832b7680d8ef9d6906138645914a0501bf234cd8a54c37e3163037faa62a28baa3affd41

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    f6c43ba8f66df7d9a8ba2cacbdbdec3e

    SHA1

    ca1689ef9e173070d54e22ab81655771134bb7bb

    SHA256

    edd8ca062a79f778031d3582d2ffcb90c3dda6a26cba0a7b01b1b12746912fc7

    SHA512

    f4c14a7b5695d0c3c37ae1d0c3d857853f236fecdaa8270ce41ef09addc2cef6a2f75a8c9e0cea5fd6cfe7dd8df68238ab4703b4553c23d1d2072efc3b37fc55

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2543B5AF7D46D42E6CEED21F85143F6A_515F3099EFB1C5E69E2D764425FF9E87
    MD5

    f261f6662386e410e00608b689b2c2e6

    SHA1

    d677373021f12442100fb49981c1969a28a37b48

    SHA256

    b7b0bb2d25c39b80ce5b643af41037c8fcbef513b5d970ab6663cee9c34860a5

    SHA512

    ca6f5f9a1c92330630d2c302fa219b17acaba97aa6fcadc0152288597eb47ac3950c1aed9ec1fc7c2af2d6f3ca3f39eb0910b92446482a95e87dfa1cf4cabc37

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_A30EA9B4E1BC5DBF09A8EF399E086D27
    MD5

    1b98d37110dae51971a4f889818cd764

    SHA1

    50b8bc707162625024dc74b5c2404d36d667ce07

    SHA256

    8a9274a8abbf43f45fb9c88f708ba9452e93bc04ae35d477223c5322650e2026

    SHA512

    8d40fc92c3de58234ecfff832f1d9847f582f1d1d8ecbe9e79dc4ee5614b8d65e6ae16465bc1f7658a46e170a2041466b1095ebb3fb5a98fbc3011be5cd669ce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    ec6259923b3374578fe0a9e73bec6f51

    SHA1

    27b1933e85b60b35ffa8a2db9fa6d413910c8498

    SHA256

    04bed63b5b872fd053b40d05cdc6701c92e7a771334f5ee7e2f82bb5878189f0

    SHA512

    5d3ba9edce8e6214b90cd4cd624216825cc327d8a677e9c240e982e40bd618ee9f55565b73d411c366a8150c9501e9949f5af13c797c479ebdf576db98cc9ce4

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\A8VXDAW1.cookie
    MD5

    800aa45e0e482c63b5b2be0a7dc9332c

    SHA1

    00dadba99571f7efc42a646f04b87ecc26f4e720

    SHA256

    0b6191c834874eac0e6fc43be52c6be26d800fddba6b487ecd22063b1d1228ed

    SHA512

    f5b5356c74e9eec9ffbaaf82124681a934cf8e47a7bd841c758e6c9023b3f0439b2d60ae0f45ff907663948904a70719e4300d3156427a4b7abde6d6e61e22c2

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\Y5FJI9BC.cookie
    MD5

    9cc7373e69776eb6826f6cbebc929d85

    SHA1

    387125914955b90d8ee55189374a805d670aa5d2

    SHA256

    57f884919850a7fc6d42a352fbfbe62a8eb007fd2164810dd2bc1a98414ffe2e

    SHA512

    dff583d308f05dec7e20760f62fb91d95a29a9b31c4cb59365d5fc5757893b7aa1a2dd8c66c6014ba9d082ddff4854d6e3f5912a47a9ee47028d3702326c5dc8

  • \Program Files\Okta IE plugin\x64\OktaBHO.dll
    MD5

    bf81d7bd4d0ffe69534d62894016b2ca

    SHA1

    4c1d3b414b55d212a58ba8fb0082c1b717cfa1d9

    SHA256

    cc0fcd4d60c20b1e43148a615ddf2892be19b6b16521bca58829e94d493e59f8

    SHA512

    6abf9d80dbb310896f2fdb9891ff51050e48733a7f8f1881e0854f54a9baa72483d5cdc8cf3f29f92cbd0b3b231dade61d02e45bfe29591a9fd7fe287e470b1c

  • \Program Files\Okta IE plugin\x64\toolbar\OktaIEBand.dll
    MD5

    ad2c1ba7ce659d21cabb1d5178d0d93b

    SHA1

    32912792f8c5e32d1cdde23fb5d7cd4ba09aea0a

    SHA256

    c1b3f0ba8a7bed237bbd759511c045551200c70827d2068174c1385d785efe1c

    SHA512

    f65ebf49cae63b32a3bfe399e369e02aa208467d5342321fc0e91804abb7bc24bcd6f907b34207aebbf584b37d5a75c5fe98ef4ba54d03c330d6fe50c5c3e93f

  • \Program Files\Okta IE plugin\x86\OktaBHO.dll
    MD5

    8c0fee0ea798113f2cc0d088d17a909b

    SHA1

    40dab5811598515499b308b8e2af4acfe7b113a0

    SHA256

    4d11ae4d7777d72a7cf88561d561dcdb45b3ecc80af0021767e4a13e9eb89a49

    SHA512

    fedb69abdeca031a4f2c1c50fe11a88967e97eedda8884fa60130b24185575b8d41e754c350fce8f610affd05dcc095e6a2b8b043c5552ab4024cd79d5c461a3

  • \Program Files\Okta IE plugin\x86\toolbar\OktaIEBand.dll
    MD5

    2e1b9e21ae58898abb96c41375843733

    SHA1

    68332f19978d8050f32e5eb8e0d685b437cd1435

    SHA256

    71e3368f34c3b0ef6d999b68b70ee25d8adf2b1405e0ac7031e3ceb65dab2a1b

    SHA512

    b43f1392790854386bf600bbcd22161869fa81438d82bd81d76b403fd341dc976a5195496120cad9e145fd89eb03b4279b68bfa429bf35b3c90f1b88e65992b7

  • \Users\Admin\AppData\Local\Temp\4FAA91E7\_Setup.dll
    MD5

    66b37af54b379443355a8702cfcb32c1

    SHA1

    a09f41cd717ddea32a992b61089f1901b4378db6

    SHA256

    2594cd5ddbd7802b1957eb4df1db415d6fd989fd96ac37a38118cfecfd76b544

    SHA512

    b453d8f32a97875ed88915748fba59489cf41593babaafeb2c9d58524ee8a62b8c16ddf11fc37a47639fa66f6e52a31ececfaaa8e673a453c053e16c6afd55be

  • \Users\Admin\AppData\Local\Temp\4FAA91E7\_Setupx.dll
    MD5

    b146d15a29fbbaecc2fb29f1f6d861f8

    SHA1

    ad61298b02137ff9bb4ccb19f3078154e6e643b3

    SHA256

    a3d3486fe5787f94d63bb0c13b00710928a5b21c641e746ee998d61377180a40

    SHA512

    5f4d372c93b06033ac1466099b7f4a88fc5f72f074f7a3642126e11224a9ff8167cb569d7261294c28dce810a71a397dd20dfd78070fd3cf203a036a9fd49de1

  • \Users\Admin\AppData\Local\Temp\TsuD2D6663B.dll
    MD5

    dc64c8a348fab6369762bccad3f86f6f

    SHA1

    5f5f21f8531039e32acfca45ef3210f4542c222e

    SHA256

    9c0655d7ab56cbe7a701096363997712ba01a06773dd046f62db8305eb331e72

    SHA512

    b5697eba36d25b1698beca8592da0c5b6ac58384c72df33b83431dbcdd86c572fd8c8cafb7dabddb9ffc8c2e4d5f7710b4486e3343f39adcbf0755faf93473ae

  • memory/1116-133-0x0000000000000000-mapping.dmp
  • memory/2208-137-0x0000000000000000-mapping.dmp
  • memory/2208-138-0x00007FFBC0580000-0x00007FFBC05EB000-memory.dmp
    Filesize

    428KB

  • memory/2552-118-0x0000000000000000-mapping.dmp
  • memory/3588-124-0x0000000000000000-mapping.dmp
  • memory/3692-119-0x0000000000000000-mapping.dmp
  • memory/3916-129-0x0000000000000000-mapping.dmp
  • memory/3940-139-0x0000000000000000-mapping.dmp