Analysis
-
max time kernel
24s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 17:32
Static task
static1
Behavioral task
behavioral1
Sample
e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe
Resource
win10v2004-20220812-en
General
-
Target
e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe
-
Size
4.2MB
-
MD5
db60bfac070a6f39392e6b2cf340c9d7
-
SHA1
eaed1418e8eaa131931622564d306c668974e514
-
SHA256
e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab
-
SHA512
bfa0201cdea7d85e1974fe94f8b5bff876eafcfeed3ef2fb8098e80cb5c61c47528971c423259799dbd09de92bff4b579eebe45ada569ecf42348d4379328109
-
SSDEEP
98304:YPHy4dVem3IU8PXy8bdlJTvUSNclqDkx:WnY3NNDkx
Malware Config
Signatures
-
Registers COM server for autorun 1 TTPs 4 IoCs
Processes:
regsvr32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{28e0a4d4-03d3-41e8-ba77-6fff31e71fc4}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{28e0a4d4-03d3-41e8-ba77-6fff31e71fc4}\InprocServer32\ = "C:\\Program Files (x86)\\PriceLess\\nBOK6fhS2ghRi7.x64.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{28e0a4d4-03d3-41e8-ba77-6fff31e71fc4}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{28e0a4d4-03d3-41e8-ba77-6fff31e71fc4}\InprocServer32 regsvr32.exe -
Loads dropped DLL 3 IoCs
Processes:
e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exeregsvr32.exeregsvr32.exepid process 1948 e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe 1492 regsvr32.exe 280 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 3 IoCs
Processes:
e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exedescription ioc process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\jcdchmhihphcakhhciipelgbbbkdbmjm\5.2\manifest.json e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\jcdchmhihphcakhhciipelgbbbkdbmjm\5.2\manifest.json e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\jcdchmhihphcakhhciipelgbbbkdbmjm\5.2\manifest.json e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe -
Installs/modifies Browser Helper Object 2 TTPs 8 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exeregsvr32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{28e0a4d4-03d3-41e8-ba77-6fff31e71fc4}\ = "PriceLess" e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{28e0a4d4-03d3-41e8-ba77-6fff31e71fc4}\NoExplorer = "1" e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{28e0a4d4-03d3-41e8-ba77-6fff31e71fc4} e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{28e0a4d4-03d3-41e8-ba77-6fff31e71fc4} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{28e0a4d4-03d3-41e8-ba77-6fff31e71fc4}\ = "PriceLess" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{28e0a4d4-03d3-41e8-ba77-6fff31e71fc4}\NoExplorer = "1" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{28e0a4d4-03d3-41e8-ba77-6fff31e71fc4} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{28e0a4d4-03d3-41e8-ba77-6fff31e71fc4} e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe -
Drops file in System32 directory 4 IoCs
Processes:
e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exedescription ioc process File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe File opened for modification C:\Windows\System32\GroupPolicy e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe -
Drops file in Program Files directory 8 IoCs
Processes:
e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exedescription ioc process File opened for modification C:\Program Files (x86)\PriceLess\nBOK6fhS2ghRi7.tlb e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe File created C:\Program Files (x86)\PriceLess\nBOK6fhS2ghRi7.dat e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe File opened for modification C:\Program Files (x86)\PriceLess\nBOK6fhS2ghRi7.dat e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe File created C:\Program Files (x86)\PriceLess\nBOK6fhS2ghRi7.x64.dll e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe File opened for modification C:\Program Files (x86)\PriceLess\nBOK6fhS2ghRi7.x64.dll e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe File created C:\Program Files (x86)\PriceLess\nBOK6fhS2ghRi7.dll e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe File opened for modification C:\Program Files (x86)\PriceLess\nBOK6fhS2ghRi7.dll e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe File created C:\Program Files (x86)\PriceLess\nBOK6fhS2ghRi7.tlb e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe -
Processes:
regsvr32.exee97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{28e0a4d4-03d3-41e8-ba77-6fff31e71fc4} regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{28e0a4d4-03d3-41e8-ba77-6fff31e71fc4} e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Key deleted \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{28E0A4D4-03D3-41E8-BA77-6FFF31E71FC4} e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Key deleted \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Key deleted \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{28E0A4D4-03D3-41E8-BA77-6FFF31E71FC4} regsvr32.exe Key deleted \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration regsvr32.exe -
Modifies registry class 64 IoCs
Processes:
e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exeregsvr32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{28e0a4d4-03d3-41e8-ba77-6fff31e71fc4}\ProgID\ = ".9" e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0 e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC} e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ProxyStubClsid32 e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.\ = "PriceLess" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{28e0a4d4-03d3-41e8-ba77-6fff31e71fc4} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ProxyStubClsid32 e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0} e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ = "IRegistry" e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{28e0a4d4-03d3-41e8-ba77-6fff31e71fc4}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.\CLSID\ = "{28e0a4d4-03d3-41e8-ba77-6fff31e71fc4}" e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{28E0A4D4-03D3-41E8-BA77-6FFF31E71FC4}\Implemented Categories e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32 e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\ = "ILocalStorage" e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\ProxyStubClsid32 e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.\CurVer\ = ".9" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{28e0a4d4-03d3-41e8-ba77-6fff31e71fc4}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{28E0A4D4-03D3-41E8-BA77-6FFF31E71FC4}\Implemented Categories regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\..9\CLSID e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\. e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{28e0a4d4-03d3-41e8-ba77-6fff31e71fc4}\ProgID e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ = "IRegistry" e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib\Version = "1.0" e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS\ = "0" e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{28e0a4d4-03d3-41e8-ba77-6fff31e71fc4}\VersionIndependentProgID\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\..9\CLSID\ = "{28e0a4d4-03d3-41e8-ba77-6fff31e71fc4}" e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{28e0a4d4-03d3-41e8-ba77-6fff31e71fc4}\VersionIndependentProgID e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{28e0a4d4-03d3-41e8-ba77-6fff31e71fc4}\InprocServer32 e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{28e0a4d4-03d3-41e8-ba77-6fff31e71fc4}\Programmable e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0 e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF} e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ = "IPlaghinMein" e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\ = "ILocalStorage" e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib\Version = "1.0" e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{28e0a4d4-03d3-41e8-ba77-6fff31e71fc4}\InprocServer32\ = "C:\\Program Files (x86)\\PriceLess\\nBOK6fhS2ghRi7.dll" e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{28e0a4d4-03d3-41e8-ba77-6fff31e71fc4}\ProgID e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\ = "IEPluginLib" e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32\ = "C:\\Program Files (x86)\\PriceLess\\nBOK6fhS2ghRi7.tlb" e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ = "IPlaghinMein" e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{28e0a4d4-03d3-41e8-ba77-6fff31e71fc4}\InprocServer32\ = "C:\\Program Files (x86)\\PriceLess\\nBOK6fhS2ghRi7.x64.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{28E0A4D4-03D3-41E8-BA77-6FFF31E71FC4} e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ProxyStubClsid32 e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib\Version = "1.0" e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{28e0a4d4-03d3-41e8-ba77-6fff31e71fc4}\ProgID regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{28e0a4d4-03d3-41e8-ba77-6fff31e71fc4} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.\CurVer e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{28e0a4d4-03d3-41e8-ba77-6fff31e71fc4}\ProgID\ = ".9" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{28e0a4d4-03d3-41e8-ba77-6fff31e71fc4}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{28e0a4d4-03d3-41e8-ba77-6fff31e71fc4} e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{28e0a4d4-03d3-41e8-ba77-6fff31e71fc4}\VersionIndependentProgID\ e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{28e0a4d4-03d3-41e8-ba77-6fff31e71fc4}\InprocServer32\ThreadingModel = "Apartment" e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\ProxyStubClsid32 e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{28E0A4D4-03D3-41E8-BA77-6FFF31E71FC4} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR\ = "C:\\Program Files (x86)\\PriceLess" e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exepid process 1948 e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe 1948 e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe 1948 e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe 1948 e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe 1948 e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe 1948 e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe 1948 e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe 1948 e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe 1948 e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe 1948 e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exedescription pid process Token: SeDebugPrivilege 1948 e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Token: SeDebugPrivilege 1948 e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Token: SeDebugPrivilege 1948 e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Token: SeDebugPrivilege 1948 e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Token: SeDebugPrivilege 1948 e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Token: SeDebugPrivilege 1948 e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exeregsvr32.exedescription pid process target process PID 1948 wrote to memory of 1492 1948 e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe regsvr32.exe PID 1948 wrote to memory of 1492 1948 e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe regsvr32.exe PID 1948 wrote to memory of 1492 1948 e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe regsvr32.exe PID 1948 wrote to memory of 1492 1948 e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe regsvr32.exe PID 1948 wrote to memory of 1492 1948 e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe regsvr32.exe PID 1948 wrote to memory of 1492 1948 e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe regsvr32.exe PID 1948 wrote to memory of 1492 1948 e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe regsvr32.exe PID 1492 wrote to memory of 280 1492 regsvr32.exe regsvr32.exe PID 1492 wrote to memory of 280 1492 regsvr32.exe regsvr32.exe PID 1492 wrote to memory of 280 1492 regsvr32.exe regsvr32.exe PID 1492 wrote to memory of 280 1492 regsvr32.exe regsvr32.exe PID 1492 wrote to memory of 280 1492 regsvr32.exe regsvr32.exe PID 1492 wrote to memory of 280 1492 regsvr32.exe regsvr32.exe PID 1492 wrote to memory of 280 1492 regsvr32.exe regsvr32.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{28e0a4d4-03d3-41e8-ba77-6fff31e71fc4} = "1" e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe"C:\Users\Admin\AppData\Local\Temp\e97cfa28f86a98d8b63c66f8bd4aa2bf078dbcc9eeb4526fb198552baf43c7ab.exe"1⤵
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1948 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\PriceLess\nBOK6fhS2ghRi7.x64.dll"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\PriceLess\nBOK6fhS2ghRi7.x64.dll"3⤵
- Registers COM server for autorun
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies Internet Explorer settings
- Modifies registry class
PID:280
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5406488d627600c96c5225f688c447a90
SHA1f1d0881ee4d11d24e46301c597490912a0bae454
SHA256fbdb09766ec7dccccce8cd74be527f9350795ab43f5cd7923de16dcda4d2e27d
SHA512d9c97a1ccefcbeb95ec4a6b5ca4b6616343f09acc4d5b2fcf7b49e78098b0a91bd132c899ef52bc100a1c66e5bc9361874cbadfe0b160fd9a805bdc8de4af77f
-
Filesize
3KB
MD5dad7dc8242a2925ade239718a506374e
SHA108d7aba181e62216e2976c15a9107b760e0ef3ab
SHA2567dd64eeefd4900b4ef39b47ef2cbe5cf6f7e184ca74dedb351c749c60d39981b
SHA51271dd707836f3415c8b36cc485a879f82d3d5bd0cae95b891eb8cc3fcb3a3ada8f3fa53b68a06a866bca111b8c72d75bcefc118c9785fa20178cf13c4e57ac8ea
-
Filesize
875KB
MD50c3a0b1a34377f22a3a16b868c74205c
SHA1d24dd7c000de9f860b66a66539ea145feb8d94cc
SHA2564744114a0e7734acac9ec0e7c91da4074811f5b71349d235491da22a3f6293fc
SHA5120785ea18a70c03858026fe056c630a83231db8941407766cca99ab8414868943e6994964a15aa7ec8d13a72daafa016e0d2ca638b43e6e21cf077fc8f96bbc61
-
Filesize
740KB
MD5f37095c241e62cc8b66a00a187fd1155
SHA182a9120f26b4e76df5fe123a5176d28aa898b23c
SHA2560810e4c7b6fb4ad3f7a3abee5bf321f720515e6c3e605c9348bc51e741906874
SHA512eab1bdf2b0f79af777ce967d02789cf3fc39a09fafa43ff230a650bc42e871538e98953479a2849249d765037dc92175069335d8010da4fc1286f48a088b8b9b
-
Filesize
875KB
MD50c3a0b1a34377f22a3a16b868c74205c
SHA1d24dd7c000de9f860b66a66539ea145feb8d94cc
SHA2564744114a0e7734acac9ec0e7c91da4074811f5b71349d235491da22a3f6293fc
SHA5120785ea18a70c03858026fe056c630a83231db8941407766cca99ab8414868943e6994964a15aa7ec8d13a72daafa016e0d2ca638b43e6e21cf077fc8f96bbc61
-
Filesize
875KB
MD50c3a0b1a34377f22a3a16b868c74205c
SHA1d24dd7c000de9f860b66a66539ea145feb8d94cc
SHA2564744114a0e7734acac9ec0e7c91da4074811f5b71349d235491da22a3f6293fc
SHA5120785ea18a70c03858026fe056c630a83231db8941407766cca99ab8414868943e6994964a15aa7ec8d13a72daafa016e0d2ca638b43e6e21cf077fc8f96bbc61