Analysis
-
max time kernel
94s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2022, 08:33
Static task
static1
Behavioral task
behavioral1
Sample
6f03ce2cb62c6385ad00012f08a17be1249b6686d5307585935e4b55d50ea34d.exe
Resource
win7-20220812-en
General
-
Target
6f03ce2cb62c6385ad00012f08a17be1249b6686d5307585935e4b55d50ea34d.exe
-
Size
208KB
-
MD5
3a346206a3e28d6d5b7fea28de855a30
-
SHA1
aad1b667565da95c373b162307519fc8be74fe97
-
SHA256
6f03ce2cb62c6385ad00012f08a17be1249b6686d5307585935e4b55d50ea34d
-
SHA512
65ca76236299c20f624cdc6aaf6ce4ef02aaf229aafd889a307fdf5510b607a09451802d59ce459a1745188289cd957e7618d2f15c2886b9b50203a7e188a21b
-
SSDEEP
3072:RkLfvJD4LUV7J5SKUjuRG5V2TIp4dHK+zhqGIiHUQR9UbZwalwMZbXfAPrH:RcngUsDoqjeHhUzXYT
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 4788 6f03ce2cb62c6385ad00012f08a17be1249b6686d5307585935e4b55d50ea34d.exe 4788 6f03ce2cb62c6385ad00012f08a17be1249b6686d5307585935e4b55d50ea34d.exe -
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{0EE16FA9-E135-43B5-8236-A0CC75F60BB6} 6f03ce2cb62c6385ad00012f08a17be1249b6686d5307585935e4b55d50ea34d.exe -
Modifies registry class 46 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE16FA9-E135-43B5-8236-A0CC75F60BB6}\VersionIndependentProgID 6f03ce2cb62c6385ad00012f08a17be1249b6686d5307585935e4b55d50ea34d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE16FA9-E135-43B5-8236-A0CC75F60BB6}\InprocServer32\ThreadingModel = "Apartment" 6f03ce2cb62c6385ad00012f08a17be1249b6686d5307585935e4b55d50ea34d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{649FBF2D-FE00-44E6-8A98-B4350960D943}\TypeLib\ = "{8003D2E5-F50C-4DC2-9670-C44ABCABCE02}" 6f03ce2cb62c6385ad00012f08a17be1249b6686d5307585935e4b55d50ea34d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8003D2E5-F50C-4DC2-9670-C44ABCABCE02}\1.0\ = "urladv 1.0 Type Library" 6f03ce2cb62c6385ad00012f08a17be1249b6686d5307585935e4b55d50ea34d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8003D2E5-F50C-4DC2-9670-C44ABCABCE02}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp" 6f03ce2cb62c6385ad00012f08a17be1249b6686d5307585935e4b55d50ea34d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{649FBF2D-FE00-44E6-8A98-B4350960D943}\ = "IAdv" 6f03ce2cb62c6385ad00012f08a17be1249b6686d5307585935e4b55d50ea34d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{649FBF2D-FE00-44E6-8A98-B4350960D943}\ProxyStubClsid32 6f03ce2cb62c6385ad00012f08a17be1249b6686d5307585935e4b55d50ea34d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Urladv.Adv 6f03ce2cb62c6385ad00012f08a17be1249b6686d5307585935e4b55d50ea34d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Urladv.Adv\ = "Adv Class" 6f03ce2cb62c6385ad00012f08a17be1249b6686d5307585935e4b55d50ea34d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE16FA9-E135-43B5-8236-A0CC75F60BB6}\VersionIndependentProgID\ = "Urladv.Adv" 6f03ce2cb62c6385ad00012f08a17be1249b6686d5307585935e4b55d50ea34d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8003D2E5-F50C-4DC2-9670-C44ABCABCE02}\1.0 6f03ce2cb62c6385ad00012f08a17be1249b6686d5307585935e4b55d50ea34d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{649FBF2D-FE00-44E6-8A98-B4350960D943}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 6f03ce2cb62c6385ad00012f08a17be1249b6686d5307585935e4b55d50ea34d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{649FBF2D-FE00-44E6-8A98-B4350960D943}\TypeLib 6f03ce2cb62c6385ad00012f08a17be1249b6686d5307585935e4b55d50ea34d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Urladv.Adv.1\ = "Adv Class" 6f03ce2cb62c6385ad00012f08a17be1249b6686d5307585935e4b55d50ea34d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8003D2E5-F50C-4DC2-9670-C44ABCABCE02}\1.0\FLAGS\ = "0" 6f03ce2cb62c6385ad00012f08a17be1249b6686d5307585935e4b55d50ea34d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8003D2E5-F50C-4DC2-9670-C44ABCABCE02}\1.0\0 6f03ce2cb62c6385ad00012f08a17be1249b6686d5307585935e4b55d50ea34d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8003D2E5-F50C-4DC2-9670-C44ABCABCE02}\1.0\0\win32 6f03ce2cb62c6385ad00012f08a17be1249b6686d5307585935e4b55d50ea34d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8003D2E5-F50C-4DC2-9670-C44ABCABCE02}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\shock.dll" 6f03ce2cb62c6385ad00012f08a17be1249b6686d5307585935e4b55d50ea34d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8003D2E5-F50C-4DC2-9670-C44ABCABCE02}\1.0\HELPDIR 6f03ce2cb62c6385ad00012f08a17be1249b6686d5307585935e4b55d50ea34d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{649FBF2D-FE00-44E6-8A98-B4350960D943}\TypeLib 6f03ce2cb62c6385ad00012f08a17be1249b6686d5307585935e4b55d50ea34d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE16FA9-E135-43B5-8236-A0CC75F60BB6} 6f03ce2cb62c6385ad00012f08a17be1249b6686d5307585935e4b55d50ea34d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE16FA9-E135-43B5-8236-A0CC75F60BB6}\ProgID 6f03ce2cb62c6385ad00012f08a17be1249b6686d5307585935e4b55d50ea34d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE16FA9-E135-43B5-8236-A0CC75F60BB6}\ProgID\ = "Urladv.Adv.1" 6f03ce2cb62c6385ad00012f08a17be1249b6686d5307585935e4b55d50ea34d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE16FA9-E135-43B5-8236-A0CC75F60BB6}\InprocServer32 6f03ce2cb62c6385ad00012f08a17be1249b6686d5307585935e4b55d50ea34d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{649FBF2D-FE00-44E6-8A98-B4350960D943}\ = "IAdv" 6f03ce2cb62c6385ad00012f08a17be1249b6686d5307585935e4b55d50ea34d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{649FBF2D-FE00-44E6-8A98-B4350960D943}\TypeLib\ = "{8003D2E5-F50C-4DC2-9670-C44ABCABCE02}" 6f03ce2cb62c6385ad00012f08a17be1249b6686d5307585935e4b55d50ea34d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{649FBF2D-FE00-44E6-8A98-B4350960D943}\TypeLib\Version = "1.0" 6f03ce2cb62c6385ad00012f08a17be1249b6686d5307585935e4b55d50ea34d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE16FA9-E135-43B5-8236-A0CC75F60BB6}\Programmable 6f03ce2cb62c6385ad00012f08a17be1249b6686d5307585935e4b55d50ea34d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE16FA9-E135-43B5-8236-A0CC75F60BB6}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\shock.dll" 6f03ce2cb62c6385ad00012f08a17be1249b6686d5307585935e4b55d50ea34d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE16FA9-E135-43B5-8236-A0CC75F60BB6}\TypeLib 6f03ce2cb62c6385ad00012f08a17be1249b6686d5307585935e4b55d50ea34d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8003D2E5-F50C-4DC2-9670-C44ABCABCE02} 6f03ce2cb62c6385ad00012f08a17be1249b6686d5307585935e4b55d50ea34d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{649FBF2D-FE00-44E6-8A98-B4350960D943} 6f03ce2cb62c6385ad00012f08a17be1249b6686d5307585935e4b55d50ea34d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Urladv.Adv.1\CLSID 6f03ce2cb62c6385ad00012f08a17be1249b6686d5307585935e4b55d50ea34d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Urladv.Adv\CLSID\ = "{0EE16FA9-E135-43B5-8236-A0CC75F60BB6}" 6f03ce2cb62c6385ad00012f08a17be1249b6686d5307585935e4b55d50ea34d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE16FA9-E135-43B5-8236-A0CC75F60BB6}\ = "Adv Class" 6f03ce2cb62c6385ad00012f08a17be1249b6686d5307585935e4b55d50ea34d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{649FBF2D-FE00-44E6-8A98-B4350960D943} 6f03ce2cb62c6385ad00012f08a17be1249b6686d5307585935e4b55d50ea34d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Urladv.Adv\CLSID 6f03ce2cb62c6385ad00012f08a17be1249b6686d5307585935e4b55d50ea34d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE16FA9-E135-43B5-8236-A0CC75F60BB6}\TypeLib\ = "{8003D2E5-F50C-4DC2-9670-C44ABCABCE02}" 6f03ce2cb62c6385ad00012f08a17be1249b6686d5307585935e4b55d50ea34d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{649FBF2D-FE00-44E6-8A98-B4350960D943}\ProxyStubClsid32 6f03ce2cb62c6385ad00012f08a17be1249b6686d5307585935e4b55d50ea34d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{649FBF2D-FE00-44E6-8A98-B4350960D943}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 6f03ce2cb62c6385ad00012f08a17be1249b6686d5307585935e4b55d50ea34d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8003D2E5-F50C-4DC2-9670-C44ABCABCE02}\1.0\FLAGS 6f03ce2cb62c6385ad00012f08a17be1249b6686d5307585935e4b55d50ea34d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{649FBF2D-FE00-44E6-8A98-B4350960D943}\TypeLib\Version = "1.0" 6f03ce2cb62c6385ad00012f08a17be1249b6686d5307585935e4b55d50ea34d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Urladv.Adv.1 6f03ce2cb62c6385ad00012f08a17be1249b6686d5307585935e4b55d50ea34d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Urladv.Adv.1\CLSID\ = "{0EE16FA9-E135-43B5-8236-A0CC75F60BB6}" 6f03ce2cb62c6385ad00012f08a17be1249b6686d5307585935e4b55d50ea34d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Urladv.Adv\CurVer 6f03ce2cb62c6385ad00012f08a17be1249b6686d5307585935e4b55d50ea34d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Urladv.Adv\CurVer\ = "Urladv.Adv.1" 6f03ce2cb62c6385ad00012f08a17be1249b6686d5307585935e4b55d50ea34d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f03ce2cb62c6385ad00012f08a17be1249b6686d5307585935e4b55d50ea34d.exe"C:\Users\Admin\AppData\Local\Temp\6f03ce2cb62c6385ad00012f08a17be1249b6686d5307585935e4b55d50ea34d.exe"1⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:4788
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD55fba886190c11b3071e90b6d36d39138
SHA1238450e31e8620974d47f590e2e6778dd1d5224f
SHA256f10d4248b67f171f5cf72c8c9b7e2bbda15b9ecd56fa76368cddb208c5831586
SHA5123e70f201f273ef9e66ffa29895e47c51e50441f31ef84e0bab7ec027030fd5f8befafecb3e08feff3ad025d39df69f5bd51f2e3526c4ea784e0eef6e90b70437
-
Filesize
132KB
MD55fba886190c11b3071e90b6d36d39138
SHA1238450e31e8620974d47f590e2e6778dd1d5224f
SHA256f10d4248b67f171f5cf72c8c9b7e2bbda15b9ecd56fa76368cddb208c5831586
SHA5123e70f201f273ef9e66ffa29895e47c51e50441f31ef84e0bab7ec027030fd5f8befafecb3e08feff3ad025d39df69f5bd51f2e3526c4ea784e0eef6e90b70437