Analysis
-
max time kernel
42s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
28-05-2022 02:26
Static task
static1
Behavioral task
behavioral1
Sample
02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exe
Resource
win7-20220414-en
General
-
Target
02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exe
-
Size
943KB
-
MD5
7d76846dc65ecfc757cc5f8ada1bd60d
-
SHA1
871bf291b91b32f1b3ffadfd7e2c95280310e451
-
SHA256
02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0
-
SHA512
66d738cfa72b1127c1ec9618977d5059fce7b514869f1de55831972fa2b3ccf3a0d4399ad8e7d7cecc222ae1a886a2ce6b7de80fd8b257c92c10513a2e339634
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
Processes:
02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exeregsvr32.exepid process 1180 02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exe 2040 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs
BHOs are DLL modules which act as plugins for Internet Explorer.
-
Drops file in System32 directory 4 IoCs
Processes:
02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exedescription ioc process File opened for modification C:\Windows\System32\GroupPolicy 02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini 02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol 02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI 02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exe -
Drops file in Program Files directory 22 IoCs
Processes:
02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exedescription ioc process File created C:\Program Files (x86)\MediaPlayerV1\MediaPlayerV1alpha98\ff\chrome\content\icons\default\MediaPlayerV1alpha98_32.png 02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exe File opened for modification C:\Program Files (x86)\MediaPlayerV1\MediaPlayerV1alpha98\ch\MediaPlayerV1alpha98.crx 02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exe File created C:\Program Files (x86)\MediaPlayerV1\MediaPlayerV1alpha98\ff\chrome.manifest 02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exe File opened for modification C:\Program Files (x86)\MediaPlayerV1\MediaPlayerV1alpha98\ff\install.rdf 02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exe File opened for modification C:\Program Files (x86)\MediaPlayerV1\MediaPlayerV1alpha98\ff\chrome 02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exe File created C:\Program Files (x86)\MediaPlayerV1\MediaPlayerV1alpha98\ff\chrome\content\ffMediaPlayerV1alpha98.js 02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exe File created C:\Program Files (x86)\MediaPlayerV1\MediaPlayerV1alpha98\ch\MediaPlayerV1alpha98.crx 02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exe File created C:\Program Files (x86)\MediaPlayerV1\MediaPlayerV1alpha98\ff\chrome\content\overlay.xul 02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exe File opened for modification C:\Program Files (x86)\MediaPlayerV1\MediaPlayerV1alpha98\ff\chrome\content\overlay.xul 02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exe File opened for modification C:\Program Files (x86)\MediaPlayerV1\MediaPlayerV1alpha98\ff\chrome\content\icons\Thumbs.db 02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exe File opened for modification C:\Program Files (x86)\MediaPlayerV1\MediaPlayerV1alpha98\ff\chrome\content\icons\default 02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exe File opened for modification C:\Program Files (x86)\MediaPlayerV1\MediaPlayerV1alpha98\ff\chrome\content\icons\default\MediaPlayerV1alpha98_32.png 02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exe File opened for modification C:\Program Files (x86)\MediaPlayerV1\MediaPlayerV1alpha98\ff\chrome\content 02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exe File opened for modification C:\Program Files (x86)\MediaPlayerV1\MediaPlayerV1alpha98\ff\chrome\content\ffMediaPlayerV1alpha98.js 02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exe File created C:\Program Files (x86)\MediaPlayerV1\MediaPlayerV1alpha98\ff\chrome\content\ffMediaPlayerV1alpha98ffaction.js 02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exe File opened for modification C:\Program Files (x86)\MediaPlayerV1\MediaPlayerV1alpha98\ff\chrome\content\ffMediaPlayerV1alpha98ffaction.js 02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exe File created C:\Program Files (x86)\MediaPlayerV1\MediaPlayerV1alpha98\ff\chrome\content\icons\Thumbs.db 02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exe File created C:\Program Files (x86)\MediaPlayerV1\MediaPlayerV1alpha98\ie\MediaPlayerV1alpha98.dll 02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exe File opened for modification C:\Program Files (x86)\MediaPlayerV1\MediaPlayerV1alpha98\ff\chrome.manifest 02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exe File created C:\Program Files (x86)\MediaPlayerV1\MediaPlayerV1alpha98\ff\install.rdf 02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exe File opened for modification C:\Program Files (x86)\MediaPlayerV1\MediaPlayerV1alpha98\ff\chrome\content\icons 02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exe File created C:\Program Files (x86)\MediaPlayerV1\MediaPlayerV1alpha98\uninstall.exe 02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Approved Extensions 02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exe Set value (data) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Approved Extensions\{779895b3-b59a-414a-b601-511346f3df80} = 51667a6c4c1d3b1ba38a826fa4e0270aa302135344b29d9b 02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exe -
Modifies registry class 36 IoCs
Processes:
regsvr32.exe02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8E14B861-3377-4571-842F-A37368840900}\1.1\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{5856DC83-4425-4C01-8D4D-C567203E0FCA}\TypeLib\Version = "1.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{779895b3-b59a-414a-b601-511346f3df80}\TypeLib\ = "{8e14b861-3377-4571-842f-a37368840900}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8E14B861-3377-4571-842F-A37368840900}\1.1\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{5856DC83-4425-4C01-8D4D-C567203E0FCA}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5856DC83-4425-4C01-8D4D-C567203E0FCA}\TypeLib\Version = "1.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{779895b3-b59a-414a-b601-511346f3df80}\ = "Media Player" 02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{5856DC83-4425-4C01-8D4D-C567203E0FCA} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{5856DC83-4425-4C01-8D4D-C567203E0FCA}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8E14B861-3377-4571-842F-A37368840900}\1.1\HELPDIR regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{779895b3-b59a-414a-b601-511346f3df80}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8E14B861-3377-4571-842F-A37368840900}\1.1\ = "MediaPlayerV1alpha98Lib" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{5856DC83-4425-4C01-8D4D-C567203E0FCA}\ = "IMediaPlayerV1alpha98BHO" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5856DC83-4425-4C01-8D4D-C567203E0FCA}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{779895b3-b59a-414a-b601-511346f3df80}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8E14B861-3377-4571-842F-A37368840900}\1.1\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{779895b3-b59a-414a-b601-511346f3df80}\InprocServer32\ = "C:\\Program Files (x86)\\MediaPlayerV1\\MediaPlayerV1alpha98\\ie\\MediaPlayerV1alpha98.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{779895b3-b59a-414a-b601-511346f3df80}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{779895b3-b59a-414a-b601-511346f3df80}\Version regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8E14B861-3377-4571-842F-A37368840900} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8E14B861-3377-4571-842F-A37368840900}\1.1\FLAGS\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{5856DC83-4425-4C01-8D4D-C567203E0FCA}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{779895b3-b59a-414a-b601-511346f3df80}\ = "MediaPlayerV1alpha98" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{779895b3-b59a-414a-b601-511346f3df80}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5856DC83-4425-4C01-8D4D-C567203E0FCA}\ = "IMediaPlayerV1alpha98BHO" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5856DC83-4425-4C01-8D4D-C567203E0FCA}\TypeLib\ = "{8E14B861-3377-4571-842F-A37368840900}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5856DC83-4425-4C01-8D4D-C567203E0FCA}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{779895b3-b59a-414a-b601-511346f3df80}\Version\ = "1.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5856DC83-4425-4C01-8D4D-C567203E0FCA}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{779895b3-b59a-414a-b601-511346f3df80} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8E14B861-3377-4571-842F-A37368840900}\1.1\HELPDIR\ = "C:\\Program Files (x86)\\MediaPlayerV1\\MediaPlayerV1alpha98\\ie" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{5856DC83-4425-4C01-8D4D-C567203E0FCA}\TypeLib\ = "{8E14B861-3377-4571-842F-A37368840900}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5856DC83-4425-4C01-8D4D-C567203E0FCA} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{779895b3-b59a-414a-b601-511346f3df80} 02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8E14B861-3377-4571-842F-A37368840900}\1.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8E14B861-3377-4571-842F-A37368840900}\1.1\0\win32\ = "C:\\Program Files (x86)\\MediaPlayerV1\\MediaPlayerV1alpha98\\ie\\MediaPlayerV1alpha98.dll" regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exepid process 1180 02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exe 1180 02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exe 1180 02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exedescription pid process target process PID 1180 wrote to memory of 2040 1180 02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exe regsvr32.exe PID 1180 wrote to memory of 2040 1180 02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exe regsvr32.exe PID 1180 wrote to memory of 2040 1180 02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exe regsvr32.exe PID 1180 wrote to memory of 2040 1180 02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exe regsvr32.exe PID 1180 wrote to memory of 2040 1180 02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exe regsvr32.exe PID 1180 wrote to memory of 2040 1180 02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exe regsvr32.exe PID 1180 wrote to memory of 2040 1180 02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exe regsvr32.exe PID 1180 wrote to memory of 1960 1180 02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exe gpupdate.exe PID 1180 wrote to memory of 1960 1180 02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exe gpupdate.exe PID 1180 wrote to memory of 1960 1180 02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exe gpupdate.exe PID 1180 wrote to memory of 1960 1180 02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exe gpupdate.exe PID 1180 wrote to memory of 1960 1180 02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exe gpupdate.exe PID 1180 wrote to memory of 1960 1180 02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exe gpupdate.exe PID 1180 wrote to memory of 1960 1180 02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exe gpupdate.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exe"C:\Users\Admin\AppData\Local\Temp\02e1385fcb034399568d9f34e70537ef4da29c628a1e0abccdcf57571d69caa0.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 "C:\Program Files (x86)\MediaPlayerV1\MediaPlayerV1alpha98\ie\MediaPlayerV1alpha98.dll" /s2⤵
- Loads dropped DLL
- Modifies registry class
PID:2040
-
-
C:\Windows\SysWOW64\gpupdate.exe"C:\Windows\System32\gpupdate.exe" /force2⤵PID:1960
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
85KB
MD5fc2a328b618dd721e4df06af8ae16ab8
SHA11db4d50870e2984beb237168411555f406f499ba
SHA25624c9b08dd5167ee96e75a94db3e09abdbb682af7e4c70256b5bbc3e5b91d7a6b
SHA51294140c5f5424e128eb9ebc10433ae62459924c25e7499676f38689823a7acfe62a4b3069bb2c3a16daaaba53610f9e3c0b2d147584a6973b92bc4f41f8cd3029
-
Filesize
85KB
MD5fc2a328b618dd721e4df06af8ae16ab8
SHA11db4d50870e2984beb237168411555f406f499ba
SHA25624c9b08dd5167ee96e75a94db3e09abdbb682af7e4c70256b5bbc3e5b91d7a6b
SHA51294140c5f5424e128eb9ebc10433ae62459924c25e7499676f38689823a7acfe62a4b3069bb2c3a16daaaba53610f9e3c0b2d147584a6973b92bc4f41f8cd3029
-
Filesize
834KB
MD514ad04243334645f399639b028f21d17
SHA17368866dc95621a1407d2105d040da2cc9852ba9
SHA25602d13f28df1314640474ee77cd202a2c0da8e1d609c614f8fdff4451f8ee63fa
SHA5123859b6f6e7e46ba70fa0be24fd2ceadf3db746818f11a09109c7bb678ee4fc08824a0cf15c77df09c3b2bdc2a80067a98130660152f5ee61e4bd501ef5ed1728