Analysis
-
max time kernel
29s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 14:17
Static task
static1
Behavioral task
behavioral1
Sample
562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe
Resource
win10v2004-20221111-en
General
-
Target
562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe
-
Size
3.0MB
-
MD5
2fae6c03c9cec38d6d674aa13d934961
-
SHA1
28b305f77a556a4f3216d0543065c034868e2ab3
-
SHA256
562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402
-
SHA512
5ee5cc6a33ec7fdf76df50e0397ddc05811b572e264176869378d9068a41b6c9d8fd01656979ad73876ce1d5fb92b924b657297b5a917b21b679886dc6a1aa9e
-
SSDEEP
49152:Ja+rpFCFSaMxuYNwAufZx78NjJe0eTRt2QhIdNqAr6Z0OR80s2LxCylbmt:JaCpFfuKcH7wJe0eRt2ddNEZ0q80s2LX
Malware Config
Signatures
-
Registers COM server for autorun 1 TTPs 4 IoCs
Processes:
regsvr32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C62DF514-F7DB-78E0-E651-8EA3841421D6}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C62DF514-F7DB-78E0-E651-8EA3841421D6}\InprocServer32\ = "C:\\Program Files (x86)\\SaveClicker\\TiWryHfd.x64.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C62DF514-F7DB-78E0-E651-8EA3841421D6}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C62DF514-F7DB-78E0-E651-8EA3841421D6}\InprocServer32 regsvr32.exe -
Loads dropped DLL 3 IoCs
Processes:
562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exeregsvr32.exeregsvr32.exepid process 940 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe 1468 regsvr32.exe 2024 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 3 IoCs
Processes:
562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exedescription ioc process File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\obmmbodeapngmkhdgjbbgkmabeingmnf\2.1\manifest.json 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\obmmbodeapngmkhdgjbbgkmabeingmnf\2.1\manifest.json 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\obmmbodeapngmkhdgjbbgkmabeingmnf\2.1\manifest.json 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe -
Installs/modifies Browser Helper Object 2 TTPs 8 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exeregsvr32.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{C62DF514-F7DB-78E0-E651-8EA3841421D6} 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{C62DF514-F7DB-78E0-E651-8EA3841421D6} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{C62DF514-F7DB-78E0-E651-8EA3841421D6}\ = "SaveClicker" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{C62DF514-F7DB-78E0-E651-8EA3841421D6}\NoExplorer = "1" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{C62DF514-F7DB-78E0-E651-8EA3841421D6} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{C62DF514-F7DB-78E0-E651-8EA3841421D6} 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{C62DF514-F7DB-78E0-E651-8EA3841421D6}\ = "SaveClicker" 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{C62DF514-F7DB-78E0-E651-8EA3841421D6}\NoExplorer = "1" 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe -
Drops file in System32 directory 4 IoCs
Processes:
562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exedescription ioc process File opened for modification C:\Windows\System32\GroupPolicy 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe -
Drops file in Program Files directory 8 IoCs
Processes:
562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exedescription ioc process File created C:\Program Files (x86)\SaveClicker\TiWryHfd.x64.dll 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe File opened for modification C:\Program Files (x86)\SaveClicker\TiWryHfd.x64.dll 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe File created C:\Program Files (x86)\SaveClicker\TiWryHfd.dll 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe File opened for modification C:\Program Files (x86)\SaveClicker\TiWryHfd.dll 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe File created C:\Program Files (x86)\SaveClicker\TiWryHfd.tlb 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe File opened for modification C:\Program Files (x86)\SaveClicker\TiWryHfd.tlb 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe File created C:\Program Files (x86)\SaveClicker\TiWryHfd.dat 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe File opened for modification C:\Program Files (x86)\SaveClicker\TiWryHfd.dat 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe -
Processes:
562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exeregsvr32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{C62DF514-F7DB-78E0-E651-8EA3841421D6} 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Key deleted \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{C62DF514-F7DB-78E0-E651-8EA3841421D6} 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Key deleted \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Key deleted \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{C62DF514-F7DB-78E0-E651-8EA3841421D6} regsvr32.exe Key deleted \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{C62DF514-F7DB-78E0-E651-8EA3841421D6} regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe -
Modifies registry class 64 IoCs
Processes:
562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exeregsvr32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C62DF514-F7DB-78E0-E651-8EA3841421D6}\ProgID 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C62DF514-F7DB-78E0-E651-8EA3841421D6}\ProgID\ = "SaveClicker.2.1" 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR\ = "C:\\Program Files (x86)\\SaveClicker" 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C62DF514-F7DB-78E0-E651-8EA3841421D6} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C62DF514-F7DB-78E0-E651-8EA3841421D6}\Implemented Categories\{59FB2056-D625-48D0-A944-1A85B5AB2640} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SaveClicker.SaveClicker.2.1\CLSID 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C62DF514-F7DB-78E0-E651-8EA3841421D6}\Programmable regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C62DF514-F7DB-78E0-E651-8EA3841421D6}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SaveClicker.SaveClicker\ = "SaveClicker" 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C62DF514-F7DB-78E0-E651-8EA3841421D6}\ProgID 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ProxyStubClsid32 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SaveClicker.SaveClicker.2.1 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C62DF514-F7DB-78E0-E651-8EA3841421D6}\VersionIndependentProgID\ = "SaveClicker" 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C62DF514-F7DB-78E0-E651-8EA3841421D6}\InprocServer32 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C62DF514-F7DB-78E0-E651-8EA3841421D6}\InprocServer32\ = "C:\\Program Files (x86)\\SaveClicker\\TiWryHfd.x64.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C62DF514-F7DB-78E0-E651-8EA3841421D6}\Implemented Categories 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C62DF514-F7DB-78E0-E651-8EA3841421D6}\ProgID\ = "SaveClicker.2.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C62DF514-F7DB-78E0-E651-8EA3841421D6}\VersionIndependentProgID\ = "SaveClicker" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0} 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC} 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SaveClicker.SaveClicker.2.1\CLSID\ = "{C62DF514-F7DB-78E0-E651-8EA3841421D6}" 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SaveClicker.SaveClicker 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C62DF514-F7DB-78E0-E651-8EA3841421D6}\VersionIndependentProgID 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\ = "IEPluginLib" 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib\Version = "1.0" 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ProxyStubClsid32 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SaveClicker.SaveClicker\ = "SaveClicker" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\ProxyStubClsid32 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ = "IRegistry" 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C62DF514-F7DB-78E0-E651-8EA3841421D6}\InprocServer32\ = "C:\\Program Files (x86)\\SaveClicker\\TiWryHfd.dll" 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C62DF514-F7DB-78E0-E651-8EA3841421D6}\InprocServer32\ThreadingModel = "Apartment" 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS\ = "0" 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SaveClicker.SaveClicker\CLSID 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C62DF514-F7DB-78E0-E651-8EA3841421D6}\Programmable 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\TypeLib\Version = "1.0" 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ = "IRegistry" 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib\Version = "1.0" 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF} 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ = "IPlaghinMein" 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib\Version = "1.0" 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SaveClicker.SaveClicker.2.1\CLSID\ = "{C62DF514-F7DB-78E0-E651-8EA3841421D6}" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C62DF514-F7DB-78E0-E651-8EA3841421D6}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ = "IPlaghinMein" 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\TypeLib 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C62DF514-F7DB-78E0-E651-8EA3841421D6}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C62DF514-F7DB-78E0-E651-8EA3841421D6}\Implemented Categories regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\ = "ILocalStorage" 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C62DF514-F7DB-78E0-E651-8EA3841421D6}\ = "SaveClicker" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C62DF514-F7DB-78E0-E651-8EA3841421D6}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SaveClicker.SaveClicker\CLSID\ = "{C62DF514-F7DB-78E0-E651-8EA3841421D6}" 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32\ = "C:\\Program Files (x86)\\SaveClicker\\TiWryHfd.tlb" 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF} 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exepid process 940 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe 940 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe 940 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe 940 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe 940 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe 940 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe 940 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe 940 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exedescription pid process Token: SeDebugPrivilege 940 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Token: SeDebugPrivilege 940 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Token: SeDebugPrivilege 940 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Token: SeDebugPrivilege 940 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Token: SeDebugPrivilege 940 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Token: SeDebugPrivilege 940 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exeregsvr32.exedescription pid process target process PID 940 wrote to memory of 1468 940 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe regsvr32.exe PID 940 wrote to memory of 1468 940 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe regsvr32.exe PID 940 wrote to memory of 1468 940 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe regsvr32.exe PID 940 wrote to memory of 1468 940 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe regsvr32.exe PID 940 wrote to memory of 1468 940 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe regsvr32.exe PID 940 wrote to memory of 1468 940 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe regsvr32.exe PID 940 wrote to memory of 1468 940 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe regsvr32.exe PID 1468 wrote to memory of 2024 1468 regsvr32.exe regsvr32.exe PID 1468 wrote to memory of 2024 1468 regsvr32.exe regsvr32.exe PID 1468 wrote to memory of 2024 1468 regsvr32.exe regsvr32.exe PID 1468 wrote to memory of 2024 1468 regsvr32.exe regsvr32.exe PID 1468 wrote to memory of 2024 1468 regsvr32.exe regsvr32.exe PID 1468 wrote to memory of 2024 1468 regsvr32.exe regsvr32.exe PID 1468 wrote to memory of 2024 1468 regsvr32.exe regsvr32.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{C62DF514-F7DB-78E0-E651-8EA3841421D6} = "1" 562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe"C:\Users\Admin\AppData\Local\Temp\562bd2013aeccb257d1cc8d10d554a3169d532736d5977d7740db405183a3402.exe"1⤵
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:940 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\SaveClicker\TiWryHfd.x64.dll"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\SaveClicker\TiWryHfd.x64.dll"3⤵
- Registers COM server for autorun
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies Internet Explorer settings
- Modifies registry class
PID:2024
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD51a993cee1420f0955752eef77136199a
SHA1d664d07a61ff96166e9a8e54a5ee52a91169e384
SHA25641f9ce47af7f8b09d49376e30ea4bc66158982654e1eb6aaa4ec4ada0e65b11f
SHA512bedfdd3d3c53e6fef8465f9ff4f615e9a7c57baf7d71a9ebbaae210030ed94a2b27072662053efd7d46e817441547f014094f556f561278b1095153a95e3d040
-
Filesize
3KB
MD53fdfaa71c68f31e83daf46b214ff8c89
SHA1fe4a9d2172e9a94570f46fc151b94f90db08da77
SHA2562d4e42ee22cf2171777f6f2aa232df7a2ad3445b6988ee2f2666ec2a863aca93
SHA512392faf168a97d35fc4fa414844cae3662d231f18d5db55891e6cf281f34cef590cb94f6a650565b5b2bdf2c0899dc872c432106449604079f3283da241f2a100
-
Filesize
687KB
MD5cd1a0489adc1f05fc31a65eb26e08c92
SHA195af9d7095d36dee3e4d2e2952ca1a199c2bb596
SHA256b63804fa2e99e3bd6b8dac3e203cba731ae2317e1fdae32014a88ff40a7a4755
SHA51252bc43818912822eb746196aea22b11287a914f156c2838e8c2bc01469758ac18f0575df3d05f7b37042e8c3fd88d5c905d69f359963d5d57c42d0bd7b073c19
-
Filesize
610KB
MD58c17652e3d7951221e9afeb07a4c71e6
SHA168aeb97e567f4e705d4126a60bd94ef567760b61
SHA2564085d30c67ed3d336266d7dd5c2a1bfac8e6ba45f9240b31283e43ac9555ea24
SHA5126f21a4058579e7babe1ee44199fc41bf282d6e0c92352c636f39160c7c9e61191f9eb4186dcba8f0a25cf51f97c181e3027f2bbcee9f723a85de159121655065
-
Filesize
687KB
MD5cd1a0489adc1f05fc31a65eb26e08c92
SHA195af9d7095d36dee3e4d2e2952ca1a199c2bb596
SHA256b63804fa2e99e3bd6b8dac3e203cba731ae2317e1fdae32014a88ff40a7a4755
SHA51252bc43818912822eb746196aea22b11287a914f156c2838e8c2bc01469758ac18f0575df3d05f7b37042e8c3fd88d5c905d69f359963d5d57c42d0bd7b073c19
-
Filesize
687KB
MD5cd1a0489adc1f05fc31a65eb26e08c92
SHA195af9d7095d36dee3e4d2e2952ca1a199c2bb596
SHA256b63804fa2e99e3bd6b8dac3e203cba731ae2317e1fdae32014a88ff40a7a4755
SHA51252bc43818912822eb746196aea22b11287a914f156c2838e8c2bc01469758ac18f0575df3d05f7b37042e8c3fd88d5c905d69f359963d5d57c42d0bd7b073c19