Analysis
-
max time kernel
48s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
06/11/2022, 04:45
Behavioral task
behavioral1
Sample
2969b9dc946a5d346ed2b7b5451d48e039e292688452e0aa08c79d38924878db.exe
Resource
win7-20220901-en
General
-
Target
2969b9dc946a5d346ed2b7b5451d48e039e292688452e0aa08c79d38924878db.exe
-
Size
18KB
-
MD5
24b642ce86bcecc248f389faae3af230
-
SHA1
0bf04f3b9ebce1eb173dd7b737e774d4b75cfe30
-
SHA256
2969b9dc946a5d346ed2b7b5451d48e039e292688452e0aa08c79d38924878db
-
SHA512
8a3cb6059d8c0acc4f5cfe863d5919281927a3312c5c20ff4684e8cb66d3c37a86546a55798cc021c63f8144c4f8f4491a6c07accd69e671df6629f6e93c4685
-
SSDEEP
384:QBPG/y5rlFS2yIJkdUvoUmAGLOa/9W20navY86hqIqZW0MK:QZZHS2yHSvdAOii2I4o
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000800000001413a-57.dat acprotect behavioral1/files/0x000800000001413a-58.dat acprotect -
resource yara_rule behavioral1/files/0x000800000001413a-57.dat upx behavioral1/files/0x000800000001413a-58.dat upx behavioral1/memory/1536-59-0x0000000000400000-0x000000000040C000-memory.dmp upx -
Loads dropped DLL 1 IoCs
pid Process 1584 regsvr32.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{17DA0C9E-4A27-4ac5-BB75-5D24B8CDB972} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{17DA0C9E-4A27-4ac5-BB75-5D24B8CDB972}\ = "Microsoft Excel" regsvr32.exe -
Modifies registry class 46 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{17DA0C9E-4A27-4ac5-BB75-5D24B8CDB972}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FB19BC08-E664-462C-909B-3E9C3F4FF90E} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FB19BC08-E664-462C-909B-3E9C3F4FF90E}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Office\\" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{212552CF-D5B0-49F0-961D-95CA146CDE03}\ = "IExcelExport" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{212552CF-D5B0-49F0-961D-95CA146CDE03}\ = "IExcelExport" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{17DA0C9E-4A27-4ac5-BB75-5D24B8CDB972}\ProgID\ = "SearchWord.ExcelExport.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SearchWord.ExcelExport\CurVer\ = "SearchWord.ExcelExport.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{17DA0C9E-4A27-4ac5-BB75-5D24B8CDB972}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FB19BC08-E664-462C-909B-3E9C3F4FF90E}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Office\\Excel10.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{212552CF-D5B0-49F0-961D-95CA146CDE03}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SearchWord.ExcelExport\CurVer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{17DA0C9E-4A27-4ac5-BB75-5D24B8CDB972} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{17DA0C9E-4A27-4ac5-BB75-5D24B8CDB972}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Office\\Excel10.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{212552CF-D5B0-49F0-961D-95CA146CDE03}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{212552CF-D5B0-49F0-961D-95CA146CDE03} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SearchWord.ExcelExport\CLSID\ = "{17DA0C9E-4A27-4ac5-BB75-5D24B8CDB972}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SearchWord.ExcelExport regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SearchWord.ExcelExport\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{17DA0C9E-4A27-4ac5-BB75-5D24B8CDB972}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{17DA0C9E-4A27-4ac5-BB75-5D24B8CDB972}\TypeLib\ = "{FB19BC08-E664-462c-909B-3E9C3F4FF90E}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FB19BC08-E664-462C-909B-3E9C3F4FF90E}\1.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FB19BC08-E664-462C-909B-3E9C3F4FF90E}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FB19BC08-E664-462C-909B-3E9C3F4FF90E}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SearchWord.ExcelExport.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{212552CF-D5B0-49F0-961D-95CA146CDE03}\TypeLib\ = "{FB19BC08-E664-462C-909B-3E9C3F4FF90E}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{212552CF-D5B0-49F0-961D-95CA146CDE03}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{212552CF-D5B0-49F0-961D-95CA146CDE03}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SearchWord.ExcelExport.1\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SearchWord.ExcelExport\ = "Microsoft Excel" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{17DA0C9E-4A27-4ac5-BB75-5D24B8CDB972}\ = "ExcelExport" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FB19BC08-E664-462C-909B-3E9C3F4FF90E}\1.0\ = "ExcelExport 1.1 Type Library" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FB19BC08-E664-462C-909B-3E9C3F4FF90E}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{212552CF-D5B0-49F0-961D-95CA146CDE03}\TypeLib\ = "{FB19BC08-E664-462C-909B-3E9C3F4FF90E}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SearchWord.ExcelExport.1\ = "Microsoft Excel" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{17DA0C9E-4A27-4ac5-BB75-5D24B8CDB972}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{17DA0C9E-4A27-4ac5-BB75-5D24B8CDB972}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FB19BC08-E664-462C-909B-3E9C3F4FF90E}\1.0\FLAGS\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{212552CF-D5B0-49F0-961D-95CA146CDE03}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SearchWord.ExcelExport.1\CLSID\ = "{17DA0C9E-4A27-4ac5-BB75-5D24B8CDB972}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{212552CF-D5B0-49F0-961D-95CA146CDE03}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{212552CF-D5B0-49F0-961D-95CA146CDE03}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FB19BC08-E664-462C-909B-3E9C3F4FF90E}\1.0\HELPDIR regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{17DA0C9E-4A27-4ac5-BB75-5D24B8CDB972}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{212552CF-D5B0-49F0-961D-95CA146CDE03} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{212552CF-D5B0-49F0-961D-95CA146CDE03}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{17DA0C9E-4A27-4ac5-BB75-5D24B8CDB972}\VersionIndependentProgID\ = "SearchWord.ExcelExport" regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1536 wrote to memory of 1584 1536 2969b9dc946a5d346ed2b7b5451d48e039e292688452e0aa08c79d38924878db.exe 26 PID 1536 wrote to memory of 1584 1536 2969b9dc946a5d346ed2b7b5451d48e039e292688452e0aa08c79d38924878db.exe 26 PID 1536 wrote to memory of 1584 1536 2969b9dc946a5d346ed2b7b5451d48e039e292688452e0aa08c79d38924878db.exe 26 PID 1536 wrote to memory of 1584 1536 2969b9dc946a5d346ed2b7b5451d48e039e292688452e0aa08c79d38924878db.exe 26 PID 1536 wrote to memory of 1584 1536 2969b9dc946a5d346ed2b7b5451d48e039e292688452e0aa08c79d38924878db.exe 26 PID 1536 wrote to memory of 1584 1536 2969b9dc946a5d346ed2b7b5451d48e039e292688452e0aa08c79d38924878db.exe 26 PID 1536 wrote to memory of 1584 1536 2969b9dc946a5d346ed2b7b5451d48e039e292688452e0aa08c79d38924878db.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\2969b9dc946a5d346ed2b7b5451d48e039e292688452e0aa08c79d38924878db.exe"C:\Users\Admin\AppData\Local\Temp\2969b9dc946a5d346ed2b7b5451d48e039e292688452e0aa08c79d38924878db.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Users\Admin\AppData\Roaming\Microsoft\Office\Excel10.dll"2⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:1584
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD51d921021ae404f7ba3ce952a2080b0be
SHA1b2fcb94af06c2c908eb77972f972768577e773cc
SHA256510fb8ca4e402592dfc363377d9c414cc1c7293c59d9c2b39a410d53f2a7a792
SHA5128f5914d46ed5bbb8ef287f8a4f6316b2a34ba299bb4ca5df958bf264f62cb6ba542d425343487c77ef7d1580d60d16451ab22527debd20b5d7336f8db1040642
-
Filesize
16KB
MD51d921021ae404f7ba3ce952a2080b0be
SHA1b2fcb94af06c2c908eb77972f972768577e773cc
SHA256510fb8ca4e402592dfc363377d9c414cc1c7293c59d9c2b39a410d53f2a7a792
SHA5128f5914d46ed5bbb8ef287f8a4f6316b2a34ba299bb4ca5df958bf264f62cb6ba542d425343487c77ef7d1580d60d16451ab22527debd20b5d7336f8db1040642