Analysis
-
max time kernel
247s -
max time network
337s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 22:31
Static task
static1
Behavioral task
behavioral1
Sample
dd052876fd4f95aad11593cef76a97baf04afeeb63e419b4e9cba1806ab8fe63.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
dd052876fd4f95aad11593cef76a97baf04afeeb63e419b4e9cba1806ab8fe63.exe
Resource
win10v2004-20221111-en
General
-
Target
dd052876fd4f95aad11593cef76a97baf04afeeb63e419b4e9cba1806ab8fe63.exe
-
Size
810KB
-
MD5
dd1d387b7edc06a168acc6ca6cbabf47
-
SHA1
d9b383dd1c409eb3d8e5e413a4d234c595925f58
-
SHA256
dd052876fd4f95aad11593cef76a97baf04afeeb63e419b4e9cba1806ab8fe63
-
SHA512
99992de3d8e9211c421966b416ae9ed5fc4abdf84559d8753a406fe8c11c90c07ecaa12dc4a717c947899e141e62c3425b2307f59e35ae25bc813ee53a284ef9
-
SSDEEP
24576:ttOSLE/lijS+aneH9qFGYUbFh7KCWVTyk0:tQ0onA4QjbF56b0
Malware Config
Signatures
-
Registers COM server for autorun 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000_CLASSES\Wow6432Node\CLSID\{F28C2F70-47DE-4EA5-8F6D-7D1476CD1EF5}\LocalServer32 dd052876fd4f95aad11593cef76a97baf04afeeb63e419b4e9cba1806ab8fe63.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000_CLASSES\Wow6432Node\CLSID\{F28C2F70-47DE-4EA5-8F6D-7D1476CD1EF5}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dd052876fd4f95aad11593cef76a97baf04afeeb63e419b4e9cba1806ab8fe63.exe" dd052876fd4f95aad11593cef76a97baf04afeeb63e419b4e9cba1806ab8fe63.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000_CLASSES\Wow6432Node\CLSID\{F28C2F70-47DE-4EA5-8F6D-7D1476CD1EF5}\LocalServer32\ServerExecutable = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dd052876fd4f95aad11593cef76a97baf04afeeb63e419b4e9cba1806ab8fe63.exe" dd052876fd4f95aad11593cef76a97baf04afeeb63e419b4e9cba1806ab8fe63.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dd052876fd4f95aad11593cef76a97baf04afeeb63e419b4e9cba1806ab8fe63.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main dd052876fd4f95aad11593cef76a97baf04afeeb63e419b4e9cba1806ab8fe63.exe -
Modifies registry class 36 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3B3F3AAD-FB97-49FF-BFEE-D22869AC4326}\TypeLib\ = "{157B1AA6-3E5C-404A-9118-C1D91F537040}" dd052876fd4f95aad11593cef76a97baf04afeeb63e419b4e9cba1806ab8fe63.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000_CLASSES\Wow6432Node dd052876fd4f95aad11593cef76a97baf04afeeb63e419b4e9cba1806ab8fe63.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000_CLASSES\Wow6432Node\CLSID\{F28C2F70-47DE-4EA5-8F6D-7D1476CD1EF5}\TypeLib\ = "{7E77E9F2-D76B-4D54-B515-9A7F93DF03DF}" dd052876fd4f95aad11593cef76a97baf04afeeb63e419b4e9cba1806ab8fe63.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000_CLASSES\Wow6432Node\CLSID\{F28C2F70-47DE-4EA5-8F6D-7D1476CD1EF5}\Version\ = "1.0" dd052876fd4f95aad11593cef76a97baf04afeeb63e419b4e9cba1806ab8fe63.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3B3F3AAD-FB97-49FF-BFEE-D22869AC4326} dd052876fd4f95aad11593cef76a97baf04afeeb63e419b4e9cba1806ab8fe63.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3B3F3AAD-FB97-49FF-BFEE-D22869AC4326}\ProxyStubClsid32 dd052876fd4f95aad11593cef76a97baf04afeeb63e419b4e9cba1806ab8fe63.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000_CLASSES\Wow6432Node\CLSID\{F28C2F70-47DE-4EA5-8F6D-7D1476CD1EF5} dd052876fd4f95aad11593cef76a97baf04afeeb63e419b4e9cba1806ab8fe63.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000_CLASSES\Wow6432Node\CLSID\{F28C2F70-47DE-4EA5-8F6D-7D1476CD1EF5}\Version dd052876fd4f95aad11593cef76a97baf04afeeb63e419b4e9cba1806ab8fe63.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3B3F3AAD-FB97-49FF-BFEE-D22869AC4326}\TypeLib dd052876fd4f95aad11593cef76a97baf04afeeb63e419b4e9cba1806ab8fe63.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3B3F3AAD-FB97-49FF-BFEE-D22869AC4326}\ = "ITinyJSObject" dd052876fd4f95aad11593cef76a97baf04afeeb63e419b4e9cba1806ab8fe63.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000_CLASSES\Wow6432Node\CLSID\{F28C2F70-47DE-4EA5-8F6D-7D1476CD1EF5}\TypeLib dd052876fd4f95aad11593cef76a97baf04afeeb63e419b4e9cba1806ab8fe63.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{157B1AA6-3E5C-404A-9118-C1D91F537040}\1.0 dd052876fd4f95aad11593cef76a97baf04afeeb63e419b4e9cba1806ab8fe63.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{157B1AA6-3E5C-404A-9118-C1D91F537040}\1.0\0\win32 dd052876fd4f95aad11593cef76a97baf04afeeb63e419b4e9cba1806ab8fe63.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{157B1AA6-3E5C-404A-9118-C1D91F537040}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dd052876fd4f95aad11593cef76a97baf04afeeb63e419b4e9cba1806ab8fe63.exe" dd052876fd4f95aad11593cef76a97baf04afeeb63e419b4e9cba1806ab8fe63.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3B3F3AAD-FB97-49FF-BFEE-D22869AC4326}\ = "ITinyJSObject" dd052876fd4f95aad11593cef76a97baf04afeeb63e419b4e9cba1806ab8fe63.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3B3F3AAD-FB97-49FF-BFEE-D22869AC4326}\ProxyStubClsid32 dd052876fd4f95aad11593cef76a97baf04afeeb63e419b4e9cba1806ab8fe63.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3B3F3AAD-FB97-49FF-BFEE-D22869AC4326}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" dd052876fd4f95aad11593cef76a97baf04afeeb63e419b4e9cba1806ab8fe63.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3B3F3AAD-FB97-49FF-BFEE-D22869AC4326}\TypeLib\Version = "1.0" dd052876fd4f95aad11593cef76a97baf04afeeb63e419b4e9cba1806ab8fe63.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3B3F3AAD-FB97-49FF-BFEE-D22869AC4326}\TypeLib\Version = "1.0" dd052876fd4f95aad11593cef76a97baf04afeeb63e419b4e9cba1806ab8fe63.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000_CLASSES\Wow6432Node\CLSID\{F28C2F70-47DE-4EA5-8F6D-7D1476CD1EF5}\ = "TinyJSObject Class" dd052876fd4f95aad11593cef76a97baf04afeeb63e419b4e9cba1806ab8fe63.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000_CLASSES\Wow6432Node\CLSID\{F28C2F70-47DE-4EA5-8F6D-7D1476CD1EF5}\LocalServer32 dd052876fd4f95aad11593cef76a97baf04afeeb63e419b4e9cba1806ab8fe63.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{157B1AA6-3E5C-404A-9118-C1D91F537040} dd052876fd4f95aad11593cef76a97baf04afeeb63e419b4e9cba1806ab8fe63.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{157B1AA6-3E5C-404A-9118-C1D91F537040}\1.0\FLAGS\ = "0" dd052876fd4f95aad11593cef76a97baf04afeeb63e419b4e9cba1806ab8fe63.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{157B1AA6-3E5C-404A-9118-C1D91F537040}\1.0\0 dd052876fd4f95aad11593cef76a97baf04afeeb63e419b4e9cba1806ab8fe63.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3B3F3AAD-FB97-49FF-BFEE-D22869AC4326}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" dd052876fd4f95aad11593cef76a97baf04afeeb63e419b4e9cba1806ab8fe63.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000_CLASSES\Wow6432Node\CLSID\{F28C2F70-47DE-4EA5-8F6D-7D1476CD1EF5}\LocalServer32\ServerExecutable = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dd052876fd4f95aad11593cef76a97baf04afeeb63e419b4e9cba1806ab8fe63.exe" dd052876fd4f95aad11593cef76a97baf04afeeb63e419b4e9cba1806ab8fe63.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{157B1AA6-3E5C-404A-9118-C1D91F537040}\1.0\HELPDIR dd052876fd4f95aad11593cef76a97baf04afeeb63e419b4e9cba1806ab8fe63.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{157B1AA6-3E5C-404A-9118-C1D91F537040}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp" dd052876fd4f95aad11593cef76a97baf04afeeb63e419b4e9cba1806ab8fe63.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3B3F3AAD-FB97-49FF-BFEE-D22869AC4326} dd052876fd4f95aad11593cef76a97baf04afeeb63e419b4e9cba1806ab8fe63.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3B3F3AAD-FB97-49FF-BFEE-D22869AC4326}\TypeLib\ = "{157B1AA6-3E5C-404A-9118-C1D91F537040}" dd052876fd4f95aad11593cef76a97baf04afeeb63e419b4e9cba1806ab8fe63.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000_CLASSES\Wow6432Node\CLSID dd052876fd4f95aad11593cef76a97baf04afeeb63e419b4e9cba1806ab8fe63.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000_CLASSES\Wow6432Node\CLSID\{F28C2F70-47DE-4EA5-8F6D-7D1476CD1EF5}\Programmable dd052876fd4f95aad11593cef76a97baf04afeeb63e419b4e9cba1806ab8fe63.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{157B1AA6-3E5C-404A-9118-C1D91F537040}\1.0\ = "JSIELib" dd052876fd4f95aad11593cef76a97baf04afeeb63e419b4e9cba1806ab8fe63.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{157B1AA6-3E5C-404A-9118-C1D91F537040}\1.0\FLAGS dd052876fd4f95aad11593cef76a97baf04afeeb63e419b4e9cba1806ab8fe63.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000_CLASSES\Wow6432Node\CLSID\{F28C2F70-47DE-4EA5-8F6D-7D1476CD1EF5}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dd052876fd4f95aad11593cef76a97baf04afeeb63e419b4e9cba1806ab8fe63.exe" dd052876fd4f95aad11593cef76a97baf04afeeb63e419b4e9cba1806ab8fe63.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3B3F3AAD-FB97-49FF-BFEE-D22869AC4326}\TypeLib dd052876fd4f95aad11593cef76a97baf04afeeb63e419b4e9cba1806ab8fe63.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 772 dd052876fd4f95aad11593cef76a97baf04afeeb63e419b4e9cba1806ab8fe63.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 772 dd052876fd4f95aad11593cef76a97baf04afeeb63e419b4e9cba1806ab8fe63.exe 772 dd052876fd4f95aad11593cef76a97baf04afeeb63e419b4e9cba1806ab8fe63.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd052876fd4f95aad11593cef76a97baf04afeeb63e419b4e9cba1806ab8fe63.exe"C:\Users\Admin\AppData\Local\Temp\dd052876fd4f95aad11593cef76a97baf04afeeb63e419b4e9cba1806ab8fe63.exe"1⤵
- Registers COM server for autorun
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:772