Analysis
-
max time kernel
59s -
max time network
66s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 23:55
Static task
static1
Behavioral task
behavioral1
Sample
7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe
Resource
win10v2004-20220812-en
General
-
Target
7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe
-
Size
4.2MB
-
MD5
44692a887d2b9f65b57ecf5b5661e9de
-
SHA1
969c806d34d0662e78faf15ade5e6a7e1e0c5c94
-
SHA256
7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b
-
SHA512
0a4881758dbb180e6546007fb54a0ebd389755bf866a77345afa78bc067c815780c3e246a720f4e4913536c3d4ab725ed6df24fb67bc98d3328c684658645d25
-
SSDEEP
98304:e9HCYdVemdSAIGXZlA81sO5GZ/oLTr9nqHb+Sh:O3XA81sO5ugLVqHb+
Malware Config
Signatures
-
Registers COM server for autorun 1 TTPs 4 IoCs
Processes:
regsvr32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{165d797f-216b-4fc6-a4e4-da4823c4eeed}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{165d797f-216b-4fc6-a4e4-da4823c4eeed}\InprocServer32\ = "C:\\Program Files (x86)\\PriceLess\\1fTWWHPGWR887E.x64.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{165d797f-216b-4fc6-a4e4-da4823c4eeed}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{165d797f-216b-4fc6-a4e4-da4823c4eeed}\InprocServer32 regsvr32.exe -
Loads dropped DLL 3 IoCs
Processes:
7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exeregsvr32.exeregsvr32.exepid process 956 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe 268 regsvr32.exe 1112 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 3 IoCs
Processes:
7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exedescription ioc process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\kclpgieahninkchkfolcmjoajddcaclc\5.2\manifest.json 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\kclpgieahninkchkfolcmjoajddcaclc\5.2\manifest.json 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\kclpgieahninkchkfolcmjoajddcaclc\5.2\manifest.json 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe -
Installs/modifies Browser Helper Object 2 TTPs 8 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exeregsvr32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{165d797f-216b-4fc6-a4e4-da4823c4eeed}\ = "PriceLess" 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{165d797f-216b-4fc6-a4e4-da4823c4eeed}\NoExplorer = "1" 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{165d797f-216b-4fc6-a4e4-da4823c4eeed} 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{165d797f-216b-4fc6-a4e4-da4823c4eeed} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{165d797f-216b-4fc6-a4e4-da4823c4eeed}\ = "PriceLess" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{165d797f-216b-4fc6-a4e4-da4823c4eeed}\NoExplorer = "1" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{165d797f-216b-4fc6-a4e4-da4823c4eeed} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{165d797f-216b-4fc6-a4e4-da4823c4eeed} 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe -
Drops file in System32 directory 4 IoCs
Processes:
7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exedescription ioc process File opened for modification C:\Windows\System32\GroupPolicy 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe -
Drops file in Program Files directory 8 IoCs
Processes:
7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exedescription ioc process File created C:\Program Files (x86)\PriceLess\1fTWWHPGWR887E.tlb 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe File opened for modification C:\Program Files (x86)\PriceLess\1fTWWHPGWR887E.tlb 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe File created C:\Program Files (x86)\PriceLess\1fTWWHPGWR887E.dat 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe File opened for modification C:\Program Files (x86)\PriceLess\1fTWWHPGWR887E.dat 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe File created C:\Program Files (x86)\PriceLess\1fTWWHPGWR887E.x64.dll 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe File opened for modification C:\Program Files (x86)\PriceLess\1fTWWHPGWR887E.x64.dll 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe File created C:\Program Files (x86)\PriceLess\1fTWWHPGWR887E.dll 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe File opened for modification C:\Program Files (x86)\PriceLess\1fTWWHPGWR887E.dll 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe -
Processes:
7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exeregsvr32.exedescription ioc process Key deleted \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{165D797F-216B-4FC6-A4E4-DA4823C4EEED} 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Key deleted \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Key deleted \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{165D797F-216B-4FC6-A4E4-DA4823C4EEED} regsvr32.exe Key deleted \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{165d797f-216b-4fc6-a4e4-da4823c4eeed} regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{165d797f-216b-4fc6-a4e4-da4823c4eeed} 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe -
Modifies registry class 64 IoCs
Processes:
7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exeregsvr32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ProxyStubClsid32 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\ProxyStubClsid32 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{165d797f-216b-4fc6-a4e4-da4823c4eeed}\InprocServer32 regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{165d797f-216b-4fc6-a4e4-da4823c4eeed} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{165d797f-216b-4fc6-a4e4-da4823c4eeed}\ProgID\ = ".9" 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{165d797f-216b-4fc6-a4e4-da4823c4eeed}\Programmable 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR\ = "C:\\Program Files (x86)\\PriceLess" 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF} 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ = "IPlaghinMein" 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ProxyStubClsid32 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib\Version = "1.0" 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\..9\CLSID 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.\CLSID 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{165d797f-216b-4fc6-a4e4-da4823c4eeed} 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{165d797f-216b-4fc6-a4e4-da4823c4eeed}\ProgID regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{165d797f-216b-4fc6-a4e4-da4823c4eeed}\ProgID regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{165d797f-216b-4fc6-a4e4-da4823c4eeed}\Programmable 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ProxyStubClsid32 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{165d797f-216b-4fc6-a4e4-da4823c4eeed} 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{165D797F-216B-4FC6-A4E4-DA4823C4EEED}\Implemented Categories 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib\Version = "1.0" 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\ = "ILocalStorage" 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\TypeLib\Version = "1.0" 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\..9 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{165d797f-216b-4fc6-a4e4-da4823c4eeed}\ = "PriceLess" 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{165d797f-216b-4fc6-a4e4-da4823c4eeed}\VersionIndependentProgID 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{165d797f-216b-4fc6-a4e4-da4823c4eeed}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib\Version = "1.0" 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\..9\ = "PriceLess" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{165d797f-216b-4fc6-a4e4-da4823c4eeed}\ = "PriceLess" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{165d797f-216b-4fc6-a4e4-da4823c4eeed}\VersionIndependentProgID\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{165d797f-216b-4fc6-a4e4-da4823c4eeed}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{165D797F-216B-4FC6-A4E4-DA4823C4EEED} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\. 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{165d797f-216b-4fc6-a4e4-da4823c4eeed}\InprocServer32\ThreadingModel = "Apartment" 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\TypeLib\Version = "1.0" 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{165d797f-216b-4fc6-a4e4-da4823c4eeed} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\..9\CLSID\ = "{165d797f-216b-4fc6-a4e4-da4823c4eeed}" 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\ = "IEPluginLib" 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0} 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\TypeLib 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{165d797f-216b-4fc6-a4e4-da4823c4eeed}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{165D797F-216B-4FC6-A4E4-DA4823C4EEED}\Implemented Categories regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\..9\ = "PriceLess" 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.\CurVer 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF} 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.\CLSID\ = "{165d797f-216b-4fc6-a4e4-da4823c4eeed}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{165d797f-216b-4fc6-a4e4-da4823c4eeed}\InprocServer32 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{165d797f-216b-4fc6-a4e4-da4823c4eeed}\InprocServer32 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ProxyStubClsid32 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{165d797f-216b-4fc6-a4e4-da4823c4eeed}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{165d797f-216b-4fc6-a4e4-da4823c4eeed}\ProgID\ = ".9" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755} 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\ProxyStubClsid32 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exepid process 956 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe 956 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe 956 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe 956 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe 956 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe 956 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe 956 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe 956 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe 956 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe 956 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exedescription pid process Token: SeDebugPrivilege 956 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Token: SeDebugPrivilege 956 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Token: SeDebugPrivilege 956 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Token: SeDebugPrivilege 956 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Token: SeDebugPrivilege 956 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Token: SeDebugPrivilege 956 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exeregsvr32.exedescription pid process target process PID 956 wrote to memory of 268 956 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe regsvr32.exe PID 956 wrote to memory of 268 956 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe regsvr32.exe PID 956 wrote to memory of 268 956 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe regsvr32.exe PID 956 wrote to memory of 268 956 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe regsvr32.exe PID 956 wrote to memory of 268 956 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe regsvr32.exe PID 956 wrote to memory of 268 956 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe regsvr32.exe PID 956 wrote to memory of 268 956 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe regsvr32.exe PID 268 wrote to memory of 1112 268 regsvr32.exe regsvr32.exe PID 268 wrote to memory of 1112 268 regsvr32.exe regsvr32.exe PID 268 wrote to memory of 1112 268 regsvr32.exe regsvr32.exe PID 268 wrote to memory of 1112 268 regsvr32.exe regsvr32.exe PID 268 wrote to memory of 1112 268 regsvr32.exe regsvr32.exe PID 268 wrote to memory of 1112 268 regsvr32.exe regsvr32.exe PID 268 wrote to memory of 1112 268 regsvr32.exe regsvr32.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{165d797f-216b-4fc6-a4e4-da4823c4eeed} = "1" 7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe"C:\Users\Admin\AppData\Local\Temp\7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b.exe"1⤵
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:956 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\PriceLess\1fTWWHPGWR887E.x64.dll"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\PriceLess\1fTWWHPGWR887E.x64.dll"3⤵
- Registers COM server for autorun
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies Internet Explorer settings
- Modifies registry class
PID:1112
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD550b8171ec41f5461132e7761491005af
SHA1dddcc0eb4acf698fcf9b29ab9b2a68f02db16cc1
SHA2569e833086ba213be738d0aaf3b1c9f911a93ad2d5ccb041573cefe37606b771bf
SHA5126370a2f9f855c756c7896b5fe71982d4a38299cda88bae6ee9d17e0084fd2cb627f585c97e30a9cd73c455d04d0cbf0880f0ebc711019f0ca77a66c290954180
-
Filesize
3KB
MD5dad7dc8242a2925ade239718a506374e
SHA108d7aba181e62216e2976c15a9107b760e0ef3ab
SHA2567dd64eeefd4900b4ef39b47ef2cbe5cf6f7e184ca74dedb351c749c60d39981b
SHA51271dd707836f3415c8b36cc485a879f82d3d5bd0cae95b891eb8cc3fcb3a3ada8f3fa53b68a06a866bca111b8c72d75bcefc118c9785fa20178cf13c4e57ac8ea
-
Filesize
875KB
MD50c3a0b1a34377f22a3a16b868c74205c
SHA1d24dd7c000de9f860b66a66539ea145feb8d94cc
SHA2564744114a0e7734acac9ec0e7c91da4074811f5b71349d235491da22a3f6293fc
SHA5120785ea18a70c03858026fe056c630a83231db8941407766cca99ab8414868943e6994964a15aa7ec8d13a72daafa016e0d2ca638b43e6e21cf077fc8f96bbc61
-
Filesize
740KB
MD5f37095c241e62cc8b66a00a187fd1155
SHA182a9120f26b4e76df5fe123a5176d28aa898b23c
SHA2560810e4c7b6fb4ad3f7a3abee5bf321f720515e6c3e605c9348bc51e741906874
SHA512eab1bdf2b0f79af777ce967d02789cf3fc39a09fafa43ff230a650bc42e871538e98953479a2849249d765037dc92175069335d8010da4fc1286f48a088b8b9b
-
Filesize
875KB
MD50c3a0b1a34377f22a3a16b868c74205c
SHA1d24dd7c000de9f860b66a66539ea145feb8d94cc
SHA2564744114a0e7734acac9ec0e7c91da4074811f5b71349d235491da22a3f6293fc
SHA5120785ea18a70c03858026fe056c630a83231db8941407766cca99ab8414868943e6994964a15aa7ec8d13a72daafa016e0d2ca638b43e6e21cf077fc8f96bbc61
-
Filesize
875KB
MD50c3a0b1a34377f22a3a16b868c74205c
SHA1d24dd7c000de9f860b66a66539ea145feb8d94cc
SHA2564744114a0e7734acac9ec0e7c91da4074811f5b71349d235491da22a3f6293fc
SHA5120785ea18a70c03858026fe056c630a83231db8941407766cca99ab8414868943e6994964a15aa7ec8d13a72daafa016e0d2ca638b43e6e21cf077fc8f96bbc61