Analysis
-
max time kernel
82s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
28-05-2022 02:30
Static task
static1
Behavioral task
behavioral1
Sample
02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exe
Resource
win7-20220414-en
General
-
Target
02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exe
-
Size
632KB
-
MD5
700b9e38b4fc30730737e60b2a2a20b8
-
SHA1
d5494ef42b6253e45d5e2285ac762528e676749e
-
SHA256
02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479
-
SHA512
67726bf82ca979785a150d14515f994e3ffc8404f5e7d036acf725e1357c55b5d413d91c505a78608266f153a2d3db60ae15e75f6dc987de3766993dd8b05b8c
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
Processes:
02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exeregsvr32.exepid process 1312 02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exe 1004 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs
BHOs are DLL modules which act as plugins for Internet Explorer.
-
Drops file in System32 directory 4 IoCs
Processes:
02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exedescription ioc process File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol 02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI 02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exe File opened for modification C:\Windows\System32\GroupPolicy 02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini 02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exe -
Drops file in Program Files directory 22 IoCs
Processes:
02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exedescription ioc process File opened for modification C:\Program Files (x86)\MediaViewV1\MediaViewV1alpha8766\ch\MediaViewV1alpha8766.crx 02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exe File opened for modification C:\Program Files (x86)\MediaViewV1\MediaViewV1alpha8766\ff\chrome 02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exe File created C:\Program Files (x86)\MediaViewV1\MediaViewV1alpha8766\ff\chrome\content\ffMediaViewV1alpha8766ffaction.js 02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exe File opened for modification C:\Program Files (x86)\MediaViewV1\MediaViewV1alpha8766\ff\chrome\content\overlay.xul 02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exe File opened for modification C:\Program Files (x86)\MediaViewV1\MediaViewV1alpha8766\ff\chrome\content\icons\default\MediaViewV1alpha8766_32.png 02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exe File created C:\Program Files (x86)\MediaViewV1\MediaViewV1alpha8766\uninstall.exe 02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exe File created C:\Program Files (x86)\MediaViewV1\MediaViewV1alpha8766\ff\install.rdf 02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exe File opened for modification C:\Program Files (x86)\MediaViewV1\MediaViewV1alpha8766\ff\chrome\content 02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exe File created C:\Program Files (x86)\MediaViewV1\MediaViewV1alpha8766\ff\chrome\content\ffMediaViewV1alpha8766.js 02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exe File opened for modification C:\Program Files (x86)\MediaViewV1\MediaViewV1alpha8766\ff\chrome\content\ffMediaViewV1alpha8766ffaction.js 02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exe File created C:\Program Files (x86)\MediaViewV1\MediaViewV1alpha8766\ff\chrome\content\overlay.xul 02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exe File opened for modification C:\Program Files (x86)\MediaViewV1\MediaViewV1alpha8766\ff\chrome\content\icons\Thumbs.db 02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exe File created C:\Program Files (x86)\MediaViewV1\MediaViewV1alpha8766\ff\chrome\content\icons\default\MediaViewV1alpha8766_32.png 02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exe File created C:\Program Files (x86)\MediaViewV1\MediaViewV1alpha8766\ie\MediaViewV1alpha8766.dll 02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exe File created C:\Program Files (x86)\MediaViewV1\MediaViewV1alpha8766\ch\MediaViewV1alpha8766.crx 02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exe File created C:\Program Files (x86)\MediaViewV1\MediaViewV1alpha8766\ff\chrome.manifest 02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exe File opened for modification C:\Program Files (x86)\MediaViewV1\MediaViewV1alpha8766\ff\chrome.manifest 02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exe File opened for modification C:\Program Files (x86)\MediaViewV1\MediaViewV1alpha8766\ff\chrome\content\ffMediaViewV1alpha8766.js 02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exe File opened for modification C:\Program Files (x86)\MediaViewV1\MediaViewV1alpha8766\ff\chrome\content\icons 02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exe File created C:\Program Files (x86)\MediaViewV1\MediaViewV1alpha8766\ff\chrome\content\icons\Thumbs.db 02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exe File opened for modification C:\Program Files (x86)\MediaViewV1\MediaViewV1alpha8766\ff\install.rdf 02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exe File opened for modification C:\Program Files (x86)\MediaViewV1\MediaViewV1alpha8766\ff\chrome\content\icons\default 02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Approved Extensions 02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exe Set value (data) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Approved Extensions\{ac781e9f-7197-4043-8eeb-2de028a67e6f} = 51667a6c4c1d3b1b8f0268b2a7202d0596e46da029e4327a 02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exe -
Modifies registry class 36 IoCs
Processes:
regsvr32.exe02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{ED6FF2AC-1217-4501-9800-CFF0566CD4AE}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{ac781e9f-7197-4043-8eeb-2de028a67e6f}\ = "MediaViewV1alpha8766" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{ac781e9f-7197-4043-8eeb-2de028a67e6f}\TypeLib\ = "{05e406e2-b80f-44ac-b28a-d21ce425efae}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{05E406E2-B80F-44AC-B28A-D21CE425EFAE}\1.1\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{05E406E2-B80F-44AC-B28A-D21CE425EFAE}\1.1\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{ac781e9f-7197-4043-8eeb-2de028a67e6f} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{ac781e9f-7197-4043-8eeb-2de028a67e6f}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{ED6FF2AC-1217-4501-9800-CFF0566CD4AE}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{ED6FF2AC-1217-4501-9800-CFF0566CD4AE}\TypeLib\ = "{05E406E2-B80F-44AC-B28A-D21CE425EFAE}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{ED6FF2AC-1217-4501-9800-CFF0566CD4AE}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{ac781e9f-7197-4043-8eeb-2de028a67e6f}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{ac781e9f-7197-4043-8eeb-2de028a67e6f}\Version\ = "1.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{05E406E2-B80F-44AC-B28A-D21CE425EFAE}\1.1\ = "MediaViewV1alpha8766Lib" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{ED6FF2AC-1217-4501-9800-CFF0566CD4AE}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{ED6FF2AC-1217-4501-9800-CFF0566CD4AE}\TypeLib\ = "{05E406E2-B80F-44AC-B28A-D21CE425EFAE}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{ac781e9f-7197-4043-8eeb-2de028a67e6f}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{ac781e9f-7197-4043-8eeb-2de028a67e6f}\Version regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{05E406E2-B80F-44AC-B28A-D21CE425EFAE} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{05E406E2-B80F-44AC-B28A-D21CE425EFAE}\1.1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{05E406E2-B80F-44AC-B28A-D21CE425EFAE}\1.1\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{ac781e9f-7197-4043-8eeb-2de028a67e6f} 02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{ac781e9f-7197-4043-8eeb-2de028a67e6f}\ = "Media View" 02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{ac781e9f-7197-4043-8eeb-2de028a67e6f}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{ac781e9f-7197-4043-8eeb-2de028a67e6f}\InprocServer32\ = "C:\\Program Files (x86)\\MediaViewV1\\MediaViewV1alpha8766\\ie\\MediaViewV1alpha8766.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{ED6FF2AC-1217-4501-9800-CFF0566CD4AE}\ = "IMediaViewV1alpha8766BHO" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{ED6FF2AC-1217-4501-9800-CFF0566CD4AE}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{ED6FF2AC-1217-4501-9800-CFF0566CD4AE}\TypeLib\Version = "1.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{ED6FF2AC-1217-4501-9800-CFF0566CD4AE} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{ED6FF2AC-1217-4501-9800-CFF0566CD4AE}\TypeLib\Version = "1.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{05E406E2-B80F-44AC-B28A-D21CE425EFAE}\1.1\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{05E406E2-B80F-44AC-B28A-D21CE425EFAE}\1.1\0\win32\ = "C:\\Program Files (x86)\\MediaViewV1\\MediaViewV1alpha8766\\ie\\MediaViewV1alpha8766.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{05E406E2-B80F-44AC-B28A-D21CE425EFAE}\1.1\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{05E406E2-B80F-44AC-B28A-D21CE425EFAE}\1.1\HELPDIR\ = "C:\\Program Files (x86)\\MediaViewV1\\MediaViewV1alpha8766\\ie" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{ED6FF2AC-1217-4501-9800-CFF0566CD4AE} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{ED6FF2AC-1217-4501-9800-CFF0566CD4AE}\ = "IMediaViewV1alpha8766BHO" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{ED6FF2AC-1217-4501-9800-CFF0566CD4AE}\ProxyStubClsid32 regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exepid process 1312 02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exe 1312 02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exe 1312 02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exedescription pid process target process PID 1312 wrote to memory of 1004 1312 02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exe regsvr32.exe PID 1312 wrote to memory of 1004 1312 02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exe regsvr32.exe PID 1312 wrote to memory of 1004 1312 02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exe regsvr32.exe PID 1312 wrote to memory of 1004 1312 02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exe regsvr32.exe PID 1312 wrote to memory of 1004 1312 02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exe regsvr32.exe PID 1312 wrote to memory of 1004 1312 02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exe regsvr32.exe PID 1312 wrote to memory of 1004 1312 02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exe regsvr32.exe PID 1312 wrote to memory of 1704 1312 02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exe gpupdate.exe PID 1312 wrote to memory of 1704 1312 02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exe gpupdate.exe PID 1312 wrote to memory of 1704 1312 02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exe gpupdate.exe PID 1312 wrote to memory of 1704 1312 02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exe gpupdate.exe PID 1312 wrote to memory of 1704 1312 02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exe gpupdate.exe PID 1312 wrote to memory of 1704 1312 02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exe gpupdate.exe PID 1312 wrote to memory of 1704 1312 02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exe gpupdate.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exe"C:\Users\Admin\AppData\Local\Temp\02dcb1861a5a0f80902ff17bf6bb525f2cd2ce91c6880ae4e65bbebdc6437479.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 "C:\Program Files (x86)\MediaViewV1\MediaViewV1alpha8766\ie\MediaViewV1alpha8766.dll" /s2⤵
- Loads dropped DLL
- Modifies registry class
PID:1004
-
-
C:\Windows\SysWOW64\gpupdate.exe"C:\Windows\System32\gpupdate.exe" /force2⤵PID:1704
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
85KB
MD556568296ad6ce13575a469a3c25c675d
SHA12e65885979dcb10727b8a3e94d9bf6877d98ce33
SHA256d9696ed42a8d44efa7938a2aa234017bee0fd8961d64f2d77fdbda2136fdd45f
SHA512e9d6fcd0b560aed4d6fb05b87d35eb61018ea616f296979294ba1083fd8dbad65b6f4214b15e99c61543097a81a986f8804cd78f4e13da5dd606a35933eb2b8e
-
Filesize
85KB
MD556568296ad6ce13575a469a3c25c675d
SHA12e65885979dcb10727b8a3e94d9bf6877d98ce33
SHA256d9696ed42a8d44efa7938a2aa234017bee0fd8961d64f2d77fdbda2136fdd45f
SHA512e9d6fcd0b560aed4d6fb05b87d35eb61018ea616f296979294ba1083fd8dbad65b6f4214b15e99c61543097a81a986f8804cd78f4e13da5dd606a35933eb2b8e
-
Filesize
559KB
MD575fccc3ffe4fdeaa26b9098975ba3772
SHA19f04339adecad084b9696f757a8c12d3fd036be0
SHA25671fd0603ba5bb405a0d134595c0d7f7d2ffd83bf1d083d4ccb6e7382f5bef81e
SHA512bd3c65aa43b88dd3e1449180944d7dd6df3734fb1097117be4285b8b4bd72e7decf5e3e18e8a49b51b71b47b9ae9e444128dfeb1167a4b04a08dc220d314e3bd