Analysis
-
max time kernel
73s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
21/10/2022, 01:13
Static task
static1
Behavioral task
behavioral1
Sample
9a72d9aad4ec1080d4bdaa50ec1140ceb37866d158656c4d33b7a92437977c62.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9a72d9aad4ec1080d4bdaa50ec1140ceb37866d158656c4d33b7a92437977c62.exe
Resource
win10v2004-20220901-en
General
-
Target
9a72d9aad4ec1080d4bdaa50ec1140ceb37866d158656c4d33b7a92437977c62.exe
-
Size
867KB
-
MD5
7546aa03a331abab33e324a147a1a4a0
-
SHA1
f14c0e158a05586c00d8dd12afaff76f8a255207
-
SHA256
9a72d9aad4ec1080d4bdaa50ec1140ceb37866d158656c4d33b7a92437977c62
-
SHA512
1037fd4d73126010e1a80465e4155b8037d07f164c568d7f8fd05a24abb028d8f680cc77a4b463c5444821efbf8fa7864e8adba96e9640bc1f12a722df67fe7d
-
SSDEEP
24576:1llBCpHNaOfAN0CaT4HC+MRPtEV1JpnrGC3lWtarSBnD:1llYVcOftkHC+MD4rG3tasnD
Malware Config
Signatures
-
Loads dropped DLL 5 IoCs
pid Process 4848 regsvr32.exe 4904 regsvr32.exe 4780 9a72d9aad4ec1080d4bdaa50ec1140ceb37866d158656c4d33b7a92437977c62.exe 4780 9a72d9aad4ec1080d4bdaa50ec1140ceb37866d158656c4d33b7a92437977c62.exe 4780 9a72d9aad4ec1080d4bdaa50ec1140ceb37866d158656c4d33b7a92437977c62.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\WinSkin.dll 9a72d9aad4ec1080d4bdaa50ec1140ceb37866d158656c4d33b7a92437977c62.exe File opened for modification C:\Windows\SysWOW64\WinSkin2.dll 9a72d9aad4ec1080d4bdaa50ec1140ceb37866d158656c4d33b7a92437977c62.exe File opened for modification C:\Windows\SysWOW64\MSCOMCTL.OCX 9a72d9aad4ec1080d4bdaa50ec1140ceb37866d158656c4d33b7a92437977c62.exe File opened for modification C:\Windows\SysWOW64\RICHTX32.OCX 9a72d9aad4ec1080d4bdaa50ec1140ceb37866d158656c4d33b7a92437977c62.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 624 4780 WerFault.exe 82 2836 4780 WerFault.exe 82 -
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{3B7C8860-D78F-101B-B9B5-04021C009402} regsvr32.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66833FE7-8583-11D1-B16A-00C0F0283628}\ = "IButtons" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3B7C8862-D78F-101B-B9B5-04021C009402}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66833FE6-8583-11D1-B16A-00C0F0283628}\MiscStatus\1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2C247F23-8591-11D1-B16A-00C0F0283628}\TypeLib\ = "{831FDD16-0C5C-11D2-A9FC-0000F8754DA1}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F08DF954-8592-11D1-B16A-00C0F0283628}\ToolboxBitmap32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F08DF954-8592-11D1-B16A-00C0F0283628}\InprocServer32\ = "C:\\Windows\\SysWow64\\MSCOMCTL.OCX" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F08DF954-8592-11D1-B16A-00C0F0283628}\Implemented Categories\{7DD95802-9882-11CF-9FA9-00AA006C42C4} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1EFB6594-857C-11D1-B16A-00C0F0283628}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BDD1F04C-858B-11D1-B16A-00C0F0283628}\TypeLib\ = "{831FDD16-0C5C-11D2-A9FC-0000F8754DA1}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2C247F21-8591-11D1-B16A-00C0F0283628}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DD9DA662-8594-11D1-B16A-00C0F0283628}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BDD1F04E-858B-11D1-B16A-00C0F0283628}\TypeLib\Version = "2.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BDD1F051-858B-11D1-B16A-00C0F0283628}\TypeLib\Version = "2.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F08DF954-8592-11D1-B16A-00C0F0283628}\TypeLib\ = "{831FDD16-0C5C-11D2-A9FC-0000F8754DA1}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C27CCE38-8596-11D1-B16A-00C0F0283628}\InprocServer32\ = "C:\\Windows\\SysWow64\\MSCOMCTL.OCX" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{66833FE7-8583-11D1-B16A-00C0F0283628}\ = "IButtons" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3B7C8860-D78F-101B-B9B5-04021C009402}\Implemented Categories\{40FC6ED4-2438-11CF-A3DB-080036F12502} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F08DF952-8592-11D1-B16A-00C0F0283628}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1EFB6594-857C-11D1-B16A-00C0F0283628}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BDD1F055-858B-11D1-B16A-00C0F0283628}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2C247F21-8591-11D1-B16A-00C0F0283628}\TypeLib\Version = "2.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\RICHTEXT.RichtextCtrl.1\CLSID\ = "{3B7C8860-D78F-101B-B9B5-04021C009402}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C74190B6-8589-11D1-B16A-00C0F0283628}\Implemented Categories\{7DD95801-9882-11CF-9FA9-00AA006C42C4} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD9DA666-8594-11D1-B16A-00C0F0283628}\MiscStatus regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3B7C8860-D78F-101B-B9B5-04021C009402}\ = "Microsoft Rich Textbox Control, version 6.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8E3867AA-8586-11D1-B16A-00C0F0283628}\TypeLib\ = "{831FDD16-0C5C-11D2-A9FC-0000F8754DA1}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RICHTEXT.RichtextCtrl.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSComctlLib.Slider.2\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C27CCE39-8596-11D1-B16A-00C0F0283628}\ = "StatusBar General Property Page Object" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2334D2B3-713E-11CF-8AE5-00AA00C00905}\TypeLib\ = "{831FDD16-0C5C-11D2-A9FC-0000F8754DA1}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8E3867A4-8586-11D1-B16A-00C0F0283628}\ = "IPanels" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BDD1F04E-858B-11D1-B16A-00C0F0283628}\TypeLib\Version = "2.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E9A5593C-CAB0-11D1-8C0B-0000F8754DA1} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2334D2B1-713E-11CF-8AE5-00AA00C00905} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2334D2B1-713E-11CF-8AE5-00AA00C00905}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C27CCE3A-8596-11D1-B16A-00C0F0283628}\InprocServer32\ = "C:\\Windows\\SysWow64\\MSCOMCTL.OCX" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1EFB6595-857C-11D1-B16A-00C0F0283628}\ = "ITabStripEvents" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1EFB6599-857C-11D1-B16A-00C0F0283628}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{66833FEB-8583-11D1-B16A-00C0F0283628} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{35053A21-8589-11D1-B16A-00C0F0283628}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSComctlLib.ListViewCtrl\CurVer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSComctlLib.TabStrip regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSComctlLib.TabStrip\CurVer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C74190B7-8589-11D1-B16A-00C0F0283628} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2C247F24-8591-11D1-B16A-00C0F0283628}\TypeLib\Version = "2.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66833FE6-8583-11D1-B16A-00C0F0283628}\Implemented Categories\{40FC6ED5-2438-11CF-A3DB-080036F12502} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSComctlLib.ImageListCtrl regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2334D2B1-713E-11CF-8AE5-00AA00C00905}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BDD1F04B-858B-11D1-B16A-00C0F0283628}\TypeLib\ = "{831FDD16-0C5C-11D2-A9FC-0000F8754DA1}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F08DF954-8592-11D1-B16A-00C0F0283628}\Version regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DD9DA664-8594-11D1-B16A-00C0F0283628}\TypeLib\Version = "2.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BDD1F04E-858B-11D1-B16A-00C0F0283628}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2C247F23-8591-11D1-B16A-00C0F0283628}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSComctlLib.ImageComboCtl\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8E3867AA-8586-11D1-B16A-00C0F0283628} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C27CCE3B-8596-11D1-B16A-00C0F0283628}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1EFB6594-857C-11D1-B16A-00C0F0283628}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BDD1F04A-858B-11D1-B16A-00C0F0283628}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66833FE9-8583-11D1-B16A-00C0F0283628}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C8A3DC00-8593-11D1-B16A-00C0F0283628}\TypeLib\ = "{831FDD16-0C5C-11D2-A9FC-0000F8754DA1}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3B7C8862-D78F-101B-B9B5-04021C009402}\ = "DRichTextEvents" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSComctlLib.ImageListCtrl\ = "Microsoft ImageList Control 6.0 (SP6)" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8E3867A3-8586-11D1-B16A-00C0F0283628}\MiscStatus\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C27CCE3B-8596-11D1-B16A-00C0F0283628} regsvr32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4780 9a72d9aad4ec1080d4bdaa50ec1140ceb37866d158656c4d33b7a92437977c62.exe 4780 9a72d9aad4ec1080d4bdaa50ec1140ceb37866d158656c4d33b7a92437977c62.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4780 wrote to memory of 4848 4780 9a72d9aad4ec1080d4bdaa50ec1140ceb37866d158656c4d33b7a92437977c62.exe 83 PID 4780 wrote to memory of 4848 4780 9a72d9aad4ec1080d4bdaa50ec1140ceb37866d158656c4d33b7a92437977c62.exe 83 PID 4780 wrote to memory of 4848 4780 9a72d9aad4ec1080d4bdaa50ec1140ceb37866d158656c4d33b7a92437977c62.exe 83 PID 4780 wrote to memory of 4904 4780 9a72d9aad4ec1080d4bdaa50ec1140ceb37866d158656c4d33b7a92437977c62.exe 84 PID 4780 wrote to memory of 4904 4780 9a72d9aad4ec1080d4bdaa50ec1140ceb37866d158656c4d33b7a92437977c62.exe 84 PID 4780 wrote to memory of 4904 4780 9a72d9aad4ec1080d4bdaa50ec1140ceb37866d158656c4d33b7a92437977c62.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a72d9aad4ec1080d4bdaa50ec1140ceb37866d158656c4d33b7a92437977c62.exe"C:\Users\Admin\AppData\Local\Temp\9a72d9aad4ec1080d4bdaa50ec1140ceb37866d158656c4d33b7a92437977c62.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 C:\Windows\system32\MSCOMCTL.OCX /s2⤵
- Loads dropped DLL
- Modifies registry class
PID:4848
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 C:\Windows\system32\RICHTX32.OCX /s2⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Modifies registry class
PID:4904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4780 -s 6002⤵
- Program crash
PID:624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4780 -s 6002⤵
- Program crash
PID:2836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 4780 -ip 47801⤵PID:1116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4780 -ip 47801⤵PID:1412
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5d268668751ee22997d7ef1417034cb04
SHA1d8a87438ab0df47fe252b06162a986399cafffe1
SHA256fac6736251d3c61ecbd63be0420d1c75d5cd0442181d479013330155ca37d358
SHA51275f40cc8c92e3fcdd381669f6aa0bf1e76ee6fec0c5cbf53ea0bbfbff199ac7229fc1405f737420badd24f438b49b8d2eed2bb0f3fad0bf8a974f54bd6964a34
-
Filesize
1.0MB
MD5d268668751ee22997d7ef1417034cb04
SHA1d8a87438ab0df47fe252b06162a986399cafffe1
SHA256fac6736251d3c61ecbd63be0420d1c75d5cd0442181d479013330155ca37d358
SHA51275f40cc8c92e3fcdd381669f6aa0bf1e76ee6fec0c5cbf53ea0bbfbff199ac7229fc1405f737420badd24f438b49b8d2eed2bb0f3fad0bf8a974f54bd6964a34
-
Filesize
198KB
MD5722435ba4d18f1704b43e823a12e489a
SHA148f3c6e2e14e397055b667e2c8baa85177eb6d44
SHA2567d59a8cc7a5c16b3b0e0e67c65cf98c45158909f95ca3a5c96b946fdee42c095
SHA51238fe59c3b38fb7593a695554ead9e56febc068057b8e1c4bb27b6af21f5f2e15ddcfabda2707a72edcedeaa8b0f172a05408b88ae8efff3d259277af03f7de04
-
Filesize
198KB
MD5722435ba4d18f1704b43e823a12e489a
SHA148f3c6e2e14e397055b667e2c8baa85177eb6d44
SHA2567d59a8cc7a5c16b3b0e0e67c65cf98c45158909f95ca3a5c96b946fdee42c095
SHA51238fe59c3b38fb7593a695554ead9e56febc068057b8e1c4bb27b6af21f5f2e15ddcfabda2707a72edcedeaa8b0f172a05408b88ae8efff3d259277af03f7de04
-
Filesize
83KB
MD5789a7f5672cd918693673106cb08aec9
SHA1e0b0430baceecab1b2a35efd89eee5ee3a117b8f
SHA25622ddc0a5749574b3e78b05af4a36137284e0470ddff7ed0d5f0c442c6f5695e5
SHA512e0e060ca530feccab1aaf7c68af98083151a395ddeab8473987dc0f6a6becaefc44fc481aa5d1a3b09dae43c073cd6273fd0fb8c9483a989c7ed86be6440f3ec
-
Filesize
6KB
MD5efd11853f38b9fbd7c40ae81b8ae62ec
SHA1bdcd526351540a9665b5e5efdebcc219275108f0
SHA256aacef6fe1a3b1fa69d951020657e3cf00c10c5fef10588f8dba51e8335e962d9
SHA512c549aaeea81b5a815b0cc0342f7f2416ed57af31bee882521884633c96c68999dfceff4dffcc98cd3ec08b001e93af56bc9c15571e802c2287113c2ec320d741
-
Filesize
6KB
MD5efd11853f38b9fbd7c40ae81b8ae62ec
SHA1bdcd526351540a9665b5e5efdebcc219275108f0
SHA256aacef6fe1a3b1fa69d951020657e3cf00c10c5fef10588f8dba51e8335e962d9
SHA512c549aaeea81b5a815b0cc0342f7f2416ed57af31bee882521884633c96c68999dfceff4dffcc98cd3ec08b001e93af56bc9c15571e802c2287113c2ec320d741