Analysis
-
max time kernel
41s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 12:46
Static task
static1
Behavioral task
behavioral1
Sample
bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe
Resource
win10v2004-20221111-en
General
-
Target
bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe
-
Size
4.2MB
-
MD5
3d7dd8d68dbbd73c7f050e1d4e9cb811
-
SHA1
df08364c94c2ad4ae9b6e5d3f0070fd9c5c01edc
-
SHA256
bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990
-
SHA512
877108068ecc5393429a04d018811f13380ad9b5ba099ceaf2dd6e7035fd9a0d6badc5973d299fa2f1219f756ff59c0be46249a24c2a9039ad3d2cf1f89e7c6d
-
SSDEEP
49152:KIGKW46/4dVemXfVCxdYgcsVrxR9VaG1tYp0O408fB+Nf/tyUReq7TLzbv:N5W54dVem9C4ghXv1Gt/tvR3z
Malware Config
Signatures
-
Registers COM server for autorun 1 TTPs 4 IoCs
Processes:
regsvr32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{bb35187c-fa84-45bc-a938-579884dce2f5}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{bb35187c-fa84-45bc-a938-579884dce2f5}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{bb35187c-fa84-45bc-a938-579884dce2f5}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{bb35187c-fa84-45bc-a938-579884dce2f5}\InprocServer32\ = "C:\\Program Files (x86)\\SmartOnes\\kFDnXm1JgEuAtN.x64.dll" regsvr32.exe -
Loads dropped DLL 3 IoCs
Processes:
bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exeregsvr32.exeregsvr32.exepid process 108 bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe 1276 regsvr32.exe 1120 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 3 IoCs
Processes:
bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exedescription ioc process File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\iicccbbijpnhdnmmidjkhcgojfpebdfb\4.0\manifest.json bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\iicccbbijpnhdnmmidjkhcgojfpebdfb\4.0\manifest.json bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\iicccbbijpnhdnmmidjkhcgojfpebdfb\4.0\manifest.json bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe -
Installs/modifies Browser Helper Object 2 TTPs 8 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
regsvr32.exebc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{bb35187c-fa84-45bc-a938-579884dce2f5} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{bb35187c-fa84-45bc-a938-579884dce2f5}\ = "SmartOnes" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{bb35187c-fa84-45bc-a938-579884dce2f5}\NoExplorer = "1" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{bb35187c-fa84-45bc-a938-579884dce2f5} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{bb35187c-fa84-45bc-a938-579884dce2f5} bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{bb35187c-fa84-45bc-a938-579884dce2f5}\ = "SmartOnes" bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{bb35187c-fa84-45bc-a938-579884dce2f5}\NoExplorer = "1" bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{bb35187c-fa84-45bc-a938-579884dce2f5} bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe -
Drops file in System32 directory 4 IoCs
Processes:
bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exedescription ioc process File opened for modification C:\Windows\System32\GroupPolicy bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe -
Drops file in Program Files directory 8 IoCs
Processes:
bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exedescription ioc process File opened for modification C:\Program Files (x86)\SmartOnes\kFDnXm1JgEuAtN.x64.dll bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe File created C:\Program Files (x86)\SmartOnes\kFDnXm1JgEuAtN.dll bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe File opened for modification C:\Program Files (x86)\SmartOnes\kFDnXm1JgEuAtN.dll bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe File created C:\Program Files (x86)\SmartOnes\kFDnXm1JgEuAtN.tlb bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe File opened for modification C:\Program Files (x86)\SmartOnes\kFDnXm1JgEuAtN.tlb bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe File created C:\Program Files (x86)\SmartOnes\kFDnXm1JgEuAtN.dat bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe File opened for modification C:\Program Files (x86)\SmartOnes\kFDnXm1JgEuAtN.dat bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe File created C:\Program Files (x86)\SmartOnes\kFDnXm1JgEuAtN.x64.dll bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe -
Processes:
bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exeregsvr32.exedescription ioc process Key deleted \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{BB35187C-FA84-45BC-A938-579884DCE2F5} bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Key deleted \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Key deleted \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{BB35187C-FA84-45BC-A938-579884DCE2F5} regsvr32.exe Key deleted \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{bb35187c-fa84-45bc-a938-579884dce2f5} regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{bb35187c-fa84-45bc-a938-579884dce2f5} bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe -
Modifies registry class 64 IoCs
Processes:
bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exeregsvr32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ = "IRegistry" bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{bb35187c-fa84-45bc-a938-579884dce2f5} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{bb35187c-fa84-45bc-a938-579884dce2f5}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\..9\CLSID\ = "{bb35187c-fa84-45bc-a938-579884dce2f5}" bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\. bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32\ = "C:\\Program Files (x86)\\SmartOnes\\kFDnXm1JgEuAtN.tlb" bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\ProxyStubClsid32 bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib\Version = "1.0" bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.\CurVer\ = ".9" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{bb35187c-fa84-45bc-a938-579884dce2f5}\ = "SmartOnes" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\..9 bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ = "IPlaghinMein" bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0} bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\TypeLib bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{bb35187c-fa84-45bc-a938-579884dce2f5}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.\ = "SmartOnes" bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ProxyStubClsid32 bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ = "IRegistry" bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF} bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{bb35187c-fa84-45bc-a938-579884dce2f5}\InprocServer32 regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{bb35187c-fa84-45bc-a938-579884dce2f5}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{bb35187c-fa84-45bc-a938-579884dce2f5} bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{bb35187c-fa84-45bc-a938-579884dce2f5}\ProgID\ = ".9" bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{bb35187c-fa84-45bc-a938-579884dce2f5}\InprocServer32\ThreadingModel = "Apartment" bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{bb35187c-fa84-45bc-a938-579884dce2f5}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\..9\ = "SmartOnes" bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{bb35187c-fa84-45bc-a938-579884dce2f5}\ = "SmartOnes" bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{bb35187c-fa84-45bc-a938-579884dce2f5}\Programmable bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib\Version = "1.0" bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{bb35187c-fa84-45bc-a938-579884dce2f5}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{bb35187c-fa84-45bc-a938-579884dce2f5}\VersionIndependentProgID\ bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32 bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ProxyStubClsid32 bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\TypeLib\Version = "1.0" bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\..9\ = "SmartOnes" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{bb35187c-fa84-45bc-a938-579884dce2f5}\InprocServer32\ = "C:\\Program Files (x86)\\SmartOnes\\kFDnXm1JgEuAtN.x64.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib\Version = "1.0" bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF} bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BB35187C-FA84-45BC-A938-579884DCE2F5} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\TypeLib bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{bb35187c-fa84-45bc-a938-579884dce2f5}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{bb35187c-fa84-45bc-a938-579884dce2f5}\InprocServer32 bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{bb35187c-fa84-45bc-a938-579884dce2f5}\InprocServer32 bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0 bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS\ = "0" bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\..9\CLSID\ = "{bb35187c-fa84-45bc-a938-579884dce2f5}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.\ = "SmartOnes" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.\CLSID\ = "{bb35187c-fa84-45bc-a938-579884dce2f5}" bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.\CurVer bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BB35187C-FA84-45BC-A938-579884DCE2F5}\Implemented Categories\{59FB2056-D625-48D0-A944-1A85B5AB2640} bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\ = "IEPluginLib" bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755} bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0 bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\ProxyStubClsid32 bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exepid process 108 bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe 108 bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe 108 bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe 108 bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe 108 bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe 108 bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe 108 bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe 108 bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe 108 bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe 108 bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exedescription pid process Token: SeDebugPrivilege 108 bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Token: SeDebugPrivilege 108 bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Token: SeDebugPrivilege 108 bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Token: SeDebugPrivilege 108 bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Token: SeDebugPrivilege 108 bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Token: SeDebugPrivilege 108 bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exeregsvr32.exedescription pid process target process PID 108 wrote to memory of 1276 108 bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe regsvr32.exe PID 108 wrote to memory of 1276 108 bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe regsvr32.exe PID 108 wrote to memory of 1276 108 bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe regsvr32.exe PID 108 wrote to memory of 1276 108 bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe regsvr32.exe PID 108 wrote to memory of 1276 108 bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe regsvr32.exe PID 108 wrote to memory of 1276 108 bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe regsvr32.exe PID 108 wrote to memory of 1276 108 bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe regsvr32.exe PID 1276 wrote to memory of 1120 1276 regsvr32.exe regsvr32.exe PID 1276 wrote to memory of 1120 1276 regsvr32.exe regsvr32.exe PID 1276 wrote to memory of 1120 1276 regsvr32.exe regsvr32.exe PID 1276 wrote to memory of 1120 1276 regsvr32.exe regsvr32.exe PID 1276 wrote to memory of 1120 1276 regsvr32.exe regsvr32.exe PID 1276 wrote to memory of 1120 1276 regsvr32.exe regsvr32.exe PID 1276 wrote to memory of 1120 1276 regsvr32.exe regsvr32.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{bb35187c-fa84-45bc-a938-579884dce2f5} = "1" bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe"C:\Users\Admin\AppData\Local\Temp\bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990.exe"1⤵
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:108 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\SmartOnes\kFDnXm1JgEuAtN.x64.dll"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\SmartOnes\kFDnXm1JgEuAtN.x64.dll"3⤵
- Registers COM server for autorun
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies Internet Explorer settings
- Modifies registry class
PID:1120
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD526ae0d08744e896a96a6eb35f0eba415
SHA1beb55682f24c6e10151f5bf2d19e0dd1ae5f5499
SHA2560c9709b061dc13728be866ac5622fb659fb732f6886aaf86e25066b47efdefa1
SHA51271a19cf48b6f823e088ea082a65b9244b3edf597ef47eb5d235ac0b34e8d317c72a5d7e4f094cb7d956f327c843253c1f1e39bd18a540d82598e845666516a64
-
Filesize
3KB
MD5dad7dc8242a2925ade239718a506374e
SHA108d7aba181e62216e2976c15a9107b760e0ef3ab
SHA2567dd64eeefd4900b4ef39b47ef2cbe5cf6f7e184ca74dedb351c749c60d39981b
SHA51271dd707836f3415c8b36cc485a879f82d3d5bd0cae95b891eb8cc3fcb3a3ada8f3fa53b68a06a866bca111b8c72d75bcefc118c9785fa20178cf13c4e57ac8ea
-
Filesize
875KB
MD50c3a0b1a34377f22a3a16b868c74205c
SHA1d24dd7c000de9f860b66a66539ea145feb8d94cc
SHA2564744114a0e7734acac9ec0e7c91da4074811f5b71349d235491da22a3f6293fc
SHA5120785ea18a70c03858026fe056c630a83231db8941407766cca99ab8414868943e6994964a15aa7ec8d13a72daafa016e0d2ca638b43e6e21cf077fc8f96bbc61
-
Filesize
740KB
MD5f37095c241e62cc8b66a00a187fd1155
SHA182a9120f26b4e76df5fe123a5176d28aa898b23c
SHA2560810e4c7b6fb4ad3f7a3abee5bf321f720515e6c3e605c9348bc51e741906874
SHA512eab1bdf2b0f79af777ce967d02789cf3fc39a09fafa43ff230a650bc42e871538e98953479a2849249d765037dc92175069335d8010da4fc1286f48a088b8b9b
-
Filesize
875KB
MD50c3a0b1a34377f22a3a16b868c74205c
SHA1d24dd7c000de9f860b66a66539ea145feb8d94cc
SHA2564744114a0e7734acac9ec0e7c91da4074811f5b71349d235491da22a3f6293fc
SHA5120785ea18a70c03858026fe056c630a83231db8941407766cca99ab8414868943e6994964a15aa7ec8d13a72daafa016e0d2ca638b43e6e21cf077fc8f96bbc61
-
Filesize
875KB
MD50c3a0b1a34377f22a3a16b868c74205c
SHA1d24dd7c000de9f860b66a66539ea145feb8d94cc
SHA2564744114a0e7734acac9ec0e7c91da4074811f5b71349d235491da22a3f6293fc
SHA5120785ea18a70c03858026fe056c630a83231db8941407766cca99ab8414868943e6994964a15aa7ec8d13a72daafa016e0d2ca638b43e6e21cf077fc8f96bbc61