Analysis
-
max time kernel
92s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2022 15:21
Static task
static1
Behavioral task
behavioral1
Sample
d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe
Resource
win7-20220812-en
General
-
Target
d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe
-
Size
204KB
-
MD5
6a4de68fc2804b6c13a5d2abaa8abfb0
-
SHA1
a51c86e0d2a513f5e4bfdd4bea5ca64c4af8f4e1
-
SHA256
d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3
-
SHA512
f4565e6ca9d91dd875741bba6a8006a409134a0eb84213af8fbebea129aae26c09bd64a3c67841e9b22d4c25681f3133707fd4f1514ff04f751305f3bef17cb0
-
SSDEEP
3072:bZWRowsodnPxy+rri2H/qBrFd0NgWLYv4ls5jyYXdvS5ByUdoZfP:dWRlddnBXi3BN3vgaFtU0
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 3716 d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{2A8D06B4-1B40-009F-E531-629A59080F43} d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe -
Drops file in Program Files directory 6 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\altcmd\altcmd32.dll d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe File created C:\Program Files (x86)\altcmd\altcmd.inf d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe File opened for modification C:\Program Files (x86)\altcmd\altcmd.inf d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe File created C:\Program Files (x86)\altcmd\uninstall.bat d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe File opened for modification C:\Program Files (x86)\altcmd\uninstall.bat d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe File created C:\Program Files (x86)\altcmd\altcmd32.dll d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe -
Modifies registry class 60 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2A8D06B4-1B40-009F-E531-629A59080F43}\ = "BhoApp Class" d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2A8D06B4-1B40-009F-E531-629A59080F43}\ProgID d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A8954909-1F0F-41A5-A7FA-3B376D69E226}\1.0\HELPDIR\ = "C:\\Program Files (x86)\\altcmd\\" d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{967A494A-6AEC-4555-9CAF-FA6EB00ACF91}\TypeLib\Version = "1.0" d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{967A494A-6AEC-4555-9CAF-FA6EB00ACF91} d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{967A494A-6AEC-4555-9CAF-FA6EB00ACF91}\TypeLib\ = "{A8954909-1F0F-41A5-A7FA-3B376D69E226}" d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9692BE2F-EB8F-49D9-A11C-C24C1EF734D5} d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hzfeL1.BhoApp d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2A8D06B4-1B40-009F-E531-629A59080F43}\TypeLib d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{967A494A-6AEC-4555-9CAF-FA6EB00ACF91}\ProxyStubClsid32 d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hzfeL1.BhoApp\CLSID\ = "{2A8D06B4-1B40-009F-E531-629A59080F43}" d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hzfeL1.BhoApp\CurVer\ = "hzfeL1.BhoApp.1" d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9692BE2F-EB8F-49D9-A11C-C24C1EF734D5}\ProxyStubClsid32 d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{967A494A-6AEC-4555-9CAF-FA6EB00ACF91}\ = "_IBhoAppEvents" d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{967A494A-6AEC-4555-9CAF-FA6EB00ACF91}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9692BE2F-EB8F-49D9-A11C-C24C1EF734D5}\TypeLib d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2A8D06B4-1B40-009F-E531-629A59080F43}\VersionIndependentProgID\ = "hzfeL1.BhoApp" d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2A8D06B4-1B40-009F-E531-629A59080F43}\Programmable d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A8954909-1F0F-41A5-A7FA-3B376D69E226}\1.0 d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9692BE2F-EB8F-49D9-A11C-C24C1EF734D5}\TypeLib\Version = "1.0" d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hzfeL1.BhoApp.1\CLSID\ = "{2A8D06B4-1B40-009F-E531-629A59080F43}" d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A8954909-1F0F-41A5-A7FA-3B376D69E226} d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A8954909-1F0F-41A5-A7FA-3B376D69E226}\1.0\0 d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{967A494A-6AEC-4555-9CAF-FA6EB00ACF91}\TypeLib\ = "{A8954909-1F0F-41A5-A7FA-3B376D69E226}" d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9692BE2F-EB8F-49D9-A11C-C24C1EF734D5}\ProxyStubClsid32 d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2A8D06B4-1B40-009F-E531-629A59080F43}\InprocServer32\ = "C:\\Program Files (x86)\\altcmd\\altcmd32.dll" d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2A8D06B4-1B40-009F-E531-629A59080F43}\VersionIndependentProgID d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9692BE2F-EB8F-49D9-A11C-C24C1EF734D5}\ = "IBhoApp" d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9692BE2F-EB8F-49D9-A11C-C24C1EF734D5}\ = "IBhoApp" d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9692BE2F-EB8F-49D9-A11C-C24C1EF734D5}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hzfeL1.BhoApp.1\ = "BhoApp Class" d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{967A494A-6AEC-4555-9CAF-FA6EB00ACF91}\TypeLib\Version = "1.0" d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2A8D06B4-1B40-009F-E531-629A59080F43}\TypeLib\ = "{A8954909-1F0F-41A5-A7FA-3B376D69E226}" d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2A8D06B4-1B40-009F-E531-629A59080F43}\InprocServer32 d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{967A494A-6AEC-4555-9CAF-FA6EB00ACF91}\TypeLib d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9692BE2F-EB8F-49D9-A11C-C24C1EF734D5}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2A8D06B4-1B40-009F-E531-629A59080F43} d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{967A494A-6AEC-4555-9CAF-FA6EB00ACF91}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9692BE2F-EB8F-49D9-A11C-C24C1EF734D5}\TypeLib\ = "{A8954909-1F0F-41A5-A7FA-3B376D69E226}" d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hzfeL1.BhoApp.1\CLSID d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A8954909-1F0F-41A5-A7FA-3B376D69E226}\1.0\ = "MsVCL1 1.0 Type Library" d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A8954909-1F0F-41A5-A7FA-3B376D69E226}\1.0\FLAGS\ = "0" d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A8954909-1F0F-41A5-A7FA-3B376D69E226}\1.0\HELPDIR d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9692BE2F-EB8F-49D9-A11C-C24C1EF734D5}\TypeLib d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hzfeL1.BhoApp\CLSID d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2A8D06B4-1B40-009F-E531-629A59080F43}\InprocServer32\ThreadingModel = "Apartment" d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A8954909-1F0F-41A5-A7FA-3B376D69E226}\1.0\FLAGS d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{967A494A-6AEC-4555-9CAF-FA6EB00ACF91}\ProxyStubClsid32 d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9692BE2F-EB8F-49D9-A11C-C24C1EF734D5} d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hzfeL1.BhoApp\CurVer d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A8954909-1F0F-41A5-A7FA-3B376D69E226}\1.0\0\win32 d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A8954909-1F0F-41A5-A7FA-3B376D69E226}\1.0\0\win32\ = "C:\\Program Files (x86)\\altcmd\\altcmd32.dll" d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{967A494A-6AEC-4555-9CAF-FA6EB00ACF91}\ = "_IBhoAppEvents" d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9692BE2F-EB8F-49D9-A11C-C24C1EF734D5}\TypeLib\Version = "1.0" d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hzfeL1.BhoApp.1 d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2A8D06B4-1B40-009F-E531-629A59080F43}\ProgID\ = "hzfeL1.BhoApp.1" d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{967A494A-6AEC-4555-9CAF-FA6EB00ACF91} d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hzfeL1.BhoApp\ = "BhoApp Class" d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9692BE2F-EB8F-49D9-A11C-C24C1EF734D5}\TypeLib\ = "{A8954909-1F0F-41A5-A7FA-3B376D69E226}" d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{967A494A-6AEC-4555-9CAF-FA6EB00ACF91}\TypeLib d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3716 d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3716 wrote to memory of 4952 3716 d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe 81 PID 3716 wrote to memory of 4952 3716 d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe 81 PID 3716 wrote to memory of 4952 3716 d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe"C:\Users\Admin\AppData\Local\Temp\d134b3ff18ce49640a442de93d6280cfd245b50ca171f3c90806aaa5d4b543a3.exe"1⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\F14A.bat2⤵PID:4952
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD57a2ba0941d9690e9c9ba81b9982fa18d
SHA1030225b36f403f2a7df9cebd4b7d50061f97d399
SHA256b507d259033a343c8bea48333a55e12d37027f94edc50385b492b2f94ff9ecce
SHA5121e6b2e59793c0d3ef1f9b5653d207e3f0838780e86947f67b975e37ed25cfc376d5a360ae9f853a2463061c618c2609b25d95dd2b0f088da7f63b7b216c1e4f5
-
Filesize
295B
MD51e84c5c7417f06c64c866b9f3a1a5f01
SHA1d1a88e1bccf0cdc8a0337a6f9652e0d68f15ed71
SHA2566d333a8eea4c0399fcde70e7b2d1aa11547988353905054920268ac7e07dbffa
SHA512052cfad60ec963e7980eda893accbf9799f36f6cf4233482f13b3b985d465374ac749271dd6e35a5c68b03f15323d414ac46630dbcd600e0581b8e21123679f1