Analysis
-
max time kernel
205s -
max time network
209s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 14:28
Static task
static1
Behavioral task
behavioral1
Sample
44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe
Resource
win10v2004-20221111-en
General
-
Target
44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe
-
Size
2.9MB
-
MD5
619f94a96f83368d205f44d34fb24061
-
SHA1
2b996a2cf1e57cbd377b301cb1bbbde876b0ba7e
-
SHA256
44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f
-
SHA512
e2a626e74da57433fe4f531a23fb9909404ab639dbef650cb501fbb0bcf2959f41bf0ca67de2bc5ae0ad57712358f1b70309b2ccfce62f81de6ca440851dad68
-
SSDEEP
49152:wNlIwOj323Z/CYbkOoZyNuWL5mq+9Ou4SzROsp6XmICGFbsbg1VL9enR:WWoFCYbMCLYcPxYmRQg1U
Malware Config
Signatures
-
Registers COM server for autorun 1 TTPs 4 IoCs
Processes:
regsvr32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D71742D5-0875-4EE8-5FA9-E2335EDEBEE6}\InprocServer32\ = "C:\\Program Files (x86)\\cosstminn\\LVl_.x64.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D71742D5-0875-4EE8-5FA9-E2335EDEBEE6}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D71742D5-0875-4EE8-5FA9-E2335EDEBEE6}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D71742D5-0875-4EE8-5FA9-E2335EDEBEE6}\InprocServer32 regsvr32.exe -
Loads dropped DLL 3 IoCs
Processes:
44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exeregsvr32.exeregsvr32.exepid process 4668 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe 3948 regsvr32.exe 4148 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 5 IoCs
Processes:
44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exedescription ioc process File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\cfobdanmjolnbejjohecamlhhffmmfeg\2.0\manifest.json 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe File created C:\Users\DefaultAccount\AppData\Local\Google\Chrome\User Data\Default\Extensions\cfobdanmjolnbejjohecamlhhffmmfeg\2.0\manifest.json 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\cfobdanmjolnbejjohecamlhhffmmfeg\2.0\manifest.json 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe File created C:\Users\WDAGUtilityAccount\AppData\Local\Google\Chrome\User Data\Default\Extensions\cfobdanmjolnbejjohecamlhhffmmfeg\2.0\manifest.json 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\cfobdanmjolnbejjohecamlhhffmmfeg\2.0\manifest.json 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe -
Installs/modifies Browser Helper Object 2 TTPs 8 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exeregsvr32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{D71742D5-0875-4EE8-5FA9-E2335EDEBEE6}\ = "cosstminn" 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{D71742D5-0875-4EE8-5FA9-E2335EDEBEE6}\NoExplorer = "1" 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{D71742D5-0875-4EE8-5FA9-E2335EDEBEE6} 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{D71742D5-0875-4EE8-5FA9-E2335EDEBEE6} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{D71742D5-0875-4EE8-5FA9-E2335EDEBEE6}\ = "cosstminn" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{D71742D5-0875-4EE8-5FA9-E2335EDEBEE6}\NoExplorer = "1" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{D71742D5-0875-4EE8-5FA9-E2335EDEBEE6} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{D71742D5-0875-4EE8-5FA9-E2335EDEBEE6} 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe -
Drops file in System32 directory 4 IoCs
Processes:
44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exedescription ioc process File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe File opened for modification C:\Windows\System32\GroupPolicy 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe -
Drops file in Program Files directory 8 IoCs
Processes:
44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exedescription ioc process File created C:\Program Files (x86)\cosstminn\LVl_.tlb 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe File opened for modification C:\Program Files (x86)\cosstminn\LVl_.tlb 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe File created C:\Program Files (x86)\cosstminn\LVl_.dat 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe File opened for modification C:\Program Files (x86)\cosstminn\LVl_.dat 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe File created C:\Program Files (x86)\cosstminn\LVl_.x64.dll 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe File opened for modification C:\Program Files (x86)\cosstminn\LVl_.x64.dll 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe File created C:\Program Files (x86)\cosstminn\LVl_.dll 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe File opened for modification C:\Program Files (x86)\cosstminn\LVl_.dll 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe -
Processes:
44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exeregsvr32.exedescription ioc process Key deleted \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Key deleted \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\APPROVEDEXTENSIONSMIGRATION\{D71742D5-0875-4EE8-5FA9-E2335EDEBEE6} regsvr32.exe Key deleted \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{D71742D5-0875-4EE8-5FA9-E2335EDEBEE6} regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{D71742D5-0875-4EE8-5FA9-E2335EDEBEE6} 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Key deleted \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\APPROVEDEXTENSIONSMIGRATION\{D71742D5-0875-4EE8-5FA9-E2335EDEBEE6} 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe -
Modifies registry class 64 IoCs
Processes:
44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exeregsvr32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ProxyStubClsid32 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ = "IPlaghinMein" 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D71742D5-0875-4EE8-5FA9-E2335EDEBEE6}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\cosstminn.cosstminn.2.0\CLSID\ = "{D71742D5-0875-4EE8-5FA9-E2335EDEBEE6}" 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\cosstminn.cosstminn\CLSID 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D71742D5-0875-4EE8-5FA9-E2335EDEBEE6}\ = "cosstminn" 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D71742D5-0875-4EE8-5FA9-E2335EDEBEE6}\Programmable 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ = "IPlaghinMein" 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D71742D5-0875-4EE8-5FA9-E2335EDEBEE6}\Implemented Categories\{59FB2056-D625-48D0-A944-1A85B5AB2640} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D71742D5-0875-4EE8-5FA9-E2335EDEBEE6}\InprocServer32\ = "C:\\Program Files (x86)\\cosstminn\\LVl_.x64.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\cosstminn.cosstminn 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR\ = "C:\\Program Files (x86)\\cosstminn" 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ProxyStubClsid32 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D71742D5-0875-4EE8-5FA9-E2335EDEBEE6}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D71742D5-0875-4EE8-5FA9-E2335EDEBEE6}\InprocServer32\ = "C:\\Program Files (x86)\\cosstminn\\LVl_.dll" 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\ = "IEPluginLib" 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS\ = "0" 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF} 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\ = "ILocalStorage" 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D71742D5-0875-4EE8-5FA9-E2335EDEBEE6}\InprocServer32 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D71742D5-0875-4EE8-5FA9-E2335EDEBEE6}\VersionIndependentProgID\ = "cosstminn" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D71742D5-0875-4EE8-5FA9-E2335EDEBEE6}\ProgID\ = "cosstminn.2.0" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D71742D5-0875-4EE8-5FA9-E2335EDEBEE6}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D71742D5-0875-4EE8-5FA9-E2335EDEBEE6}\InprocServer32\ThreadingModel = "Apartment" 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF} 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\ = "ILocalStorage" 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D71742D5-0875-4EE8-5FA9-E2335EDEBEE6}\Implemented Categories regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D71742D5-0875-4EE8-5FA9-E2335EDEBEE6}\VersionIndependentProgID\ = "cosstminn" 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ = "IRegistry" 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\cosstminn.cosstminn\ = "cosstminn" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D71742D5-0875-4EE8-5FA9-E2335EDEBEE6}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D71742D5-0875-4EE8-5FA9-E2335EDEBEE6} 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\TypeLib 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\TypeLib\Version = "1.0" 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D71742D5-0875-4EE8-5FA9-E2335EDEBEE6}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D71742D5-0875-4EE8-5FA9-E2335EDEBEE6}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\cosstminn.cosstminn.2.0\ = "cosstminn" 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\cosstminn.cosstminn\ = "cosstminn" 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\cosstminn.cosstminn\CurVer\ = "cosstminn.2.0" 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D71742D5-0875-4EE8-5FA9-E2335EDEBEE6}\VersionIndependentProgID 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\TypeLib 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib\Version = "1.0" 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0} 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\cosstminn.cosstminn.2.0\CLSID 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\cosstminn.cosstminn\CLSID\ = "{D71742D5-0875-4EE8-5FA9-E2335EDEBEE6}" 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\cosstminn.cosstminn\CurVer 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D71742D5-0875-4EE8-5FA9-E2335EDEBEE6}\ProgID 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib\Version = "1.0" 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D71742D5-0875-4EE8-5FA9-E2335EDEBEE6}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ = "IRegistry" 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC} 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D71742D5-0875-4EE8-5FA9-E2335EDEBEE6} 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exepid process 4668 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe 4668 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe 4668 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe 4668 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe 4668 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe 4668 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe 4668 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe 4668 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe 4668 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe 4668 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe 4668 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe 4668 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe 4668 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe 4668 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe 4668 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe 4668 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exedescription pid process Token: SeDebugPrivilege 4668 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Token: SeDebugPrivilege 4668 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Token: SeDebugPrivilege 4668 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Token: SeDebugPrivilege 4668 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Token: SeDebugPrivilege 4668 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe Token: SeDebugPrivilege 4668 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exeregsvr32.exedescription pid process target process PID 4668 wrote to memory of 3948 4668 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe regsvr32.exe PID 4668 wrote to memory of 3948 4668 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe regsvr32.exe PID 4668 wrote to memory of 3948 4668 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe regsvr32.exe PID 3948 wrote to memory of 4148 3948 regsvr32.exe regsvr32.exe PID 3948 wrote to memory of 4148 3948 regsvr32.exe regsvr32.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{D71742D5-0875-4EE8-5FA9-E2335EDEBEE6} = "1" 44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe"C:\Users\Admin\AppData\Local\Temp\44fcb7c35a401ad0e320c992ef96b1d54e6564ec2a89ae9656d268049344c33f.exe"1⤵
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4668 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\cosstminn\LVl_.x64.dll"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\cosstminn\LVl_.x64.dll"3⤵
- Registers COM server for autorun
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies Internet Explorer settings
- Modifies registry class
PID:4148
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:4424
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:4464
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5613911524406c85d6254e9c3246ad5a9
SHA1b0d5f8deaf1d3dd3876f013b62acd5fc1e61d922
SHA2564862b819d2d1904015d6bc73989c799c73c31ad19e162fbfe76cfe48b9b914c1
SHA5127e3785bd8cfe238db746b68316b0aaff7ae7a2d60287a7b31141d8a8a54f2003bdc0943d53002e3eaf65c0246ba9c451b8992b1fe177c0b1e8bf17afdc4585c3
-
Filesize
605KB
MD572ae14ac560cd862a9dc671547286d1b
SHA1929cc12b75cbcbbb18ca5d1a8d463fd0bf607d19
SHA2560e3cd6bddd4109628f9193cbd68da68a06d92bdc6afd2544b6d2cf7a25813f9a
SHA512ebc2da889fb26a2137783e1fadbd7d6f9eed47449df6583efd9df66f89c6c05fd34d01c8da15cbf64d493f07bcbcc0d84800e7bbe34fb7d7e018c1a5de265c26
-
Filesize
3KB
MD5531346571ee2e23320503dd0cf8dde04
SHA1ed110980a7d9e2b1fe6e870291cfbcaf1d2c1219
SHA2565a60546a281eb5a6961b925a60995cb8f888cc1a66e327e6263c21ea3d3b0e7c
SHA5127e04a177e6375f382a88d01a43763e0f4be945426b6635b262597408a320b0e2f0aabea394a923be60c79a009c1737104b69cb5e47bc884215966a8cd679d691
-
Filesize
687KB
MD581d4889568a6f6e358ca9a3d307765e1
SHA160990e17843d1de4b2ed29acd97e988c33b5e55e
SHA256b1b3213c365c3bb4047a30446181aab8cd835eda9a4ebfb02d29f8629d205bfc
SHA512689289e254060a9f5e6e3c2ad69871c28cb9bd7cf5af16257a95a65205ae2c52c928737dac348084a8870f69de9f530c60f2895d4cfccc2275d0f8f25420f138
-
Filesize
687KB
MD581d4889568a6f6e358ca9a3d307765e1
SHA160990e17843d1de4b2ed29acd97e988c33b5e55e
SHA256b1b3213c365c3bb4047a30446181aab8cd835eda9a4ebfb02d29f8629d205bfc
SHA512689289e254060a9f5e6e3c2ad69871c28cb9bd7cf5af16257a95a65205ae2c52c928737dac348084a8870f69de9f530c60f2895d4cfccc2275d0f8f25420f138
-
Filesize
687KB
MD581d4889568a6f6e358ca9a3d307765e1
SHA160990e17843d1de4b2ed29acd97e988c33b5e55e
SHA256b1b3213c365c3bb4047a30446181aab8cd835eda9a4ebfb02d29f8629d205bfc
SHA512689289e254060a9f5e6e3c2ad69871c28cb9bd7cf5af16257a95a65205ae2c52c928737dac348084a8870f69de9f530c60f2895d4cfccc2275d0f8f25420f138