Analysis
-
max time kernel
195s -
max time network
242s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 17:00
Static task
static1
Behavioral task
behavioral1
Sample
f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe
Resource
win10v2004-20221111-en
General
-
Target
f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe
-
Size
4.4MB
-
MD5
4502245e0b02ae96258226d99721d23c
-
SHA1
83d8858cfbf232acd0debfed4892623a996610db
-
SHA256
f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60
-
SHA512
3003fce276eb5a7e717923e1874d9aaac884f4235cddb87bfa4b8fd8565f9a85aac04d51961e52a97c2a7bc7029e2dca28fb3b29fd479dcdddc95ba4596be785
-
SSDEEP
98304:PWs4acUedFHuI/jHlahs/cD7HjaeffUSG7TPU:r53eNjHla5aeff/G7L
Malware Config
Signatures
-
Registers COM server for autorun 1 TTPs 4 IoCs
Processes:
regsvr32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c40dfc63-bd91-413b-b29c-716f73472a74}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c40dfc63-bd91-413b-b29c-716f73472a74}\InprocServer32\ = "C:\\Program Files (x86)\\PriceChop\\rOkEWMNm6UTZhP.x64.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c40dfc63-bd91-413b-b29c-716f73472a74}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c40dfc63-bd91-413b-b29c-716f73472a74}\InprocServer32 regsvr32.exe -
Loads dropped DLL 3 IoCs
Processes:
f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exeregsvr32.exeregsvr32.exepid process 4000 f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe 1668 regsvr32.exe 3108 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 5 IoCs
Processes:
f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exedescription ioc process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\iejnhmaojgchfikdhnipanmggmigconm\2.0\manifest.json f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\iejnhmaojgchfikdhnipanmggmigconm\2.0\manifest.json f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe File created C:\Users\DefaultAccount\AppData\Local\Google\Chrome\User Data\Default\Extensions\iejnhmaojgchfikdhnipanmggmigconm\2.0\manifest.json f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\iejnhmaojgchfikdhnipanmggmigconm\2.0\manifest.json f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe File created C:\Users\WDAGUtilityAccount\AppData\Local\Google\Chrome\User Data\Default\Extensions\iejnhmaojgchfikdhnipanmggmigconm\2.0\manifest.json f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe -
Installs/modifies Browser Helper Object 2 TTPs 8 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exeregsvr32.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{c40dfc63-bd91-413b-b29c-716f73472a74}\NoExplorer = "1" f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{c40dfc63-bd91-413b-b29c-716f73472a74} f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{c40dfc63-bd91-413b-b29c-716f73472a74} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{c40dfc63-bd91-413b-b29c-716f73472a74}\ = "PriceChop" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{c40dfc63-bd91-413b-b29c-716f73472a74}\NoExplorer = "1" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{c40dfc63-bd91-413b-b29c-716f73472a74} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{c40dfc63-bd91-413b-b29c-716f73472a74} f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{c40dfc63-bd91-413b-b29c-716f73472a74}\ = "PriceChop" f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe -
Drops file in System32 directory 4 IoCs
Processes:
f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exedescription ioc process File opened for modification C:\Windows\System32\GroupPolicy f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe -
Drops file in Program Files directory 8 IoCs
Processes:
f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exedescription ioc process File created C:\Program Files (x86)\PriceChop\rOkEWMNm6UTZhP.dat f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe File opened for modification C:\Program Files (x86)\PriceChop\rOkEWMNm6UTZhP.dat f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe File created C:\Program Files (x86)\PriceChop\rOkEWMNm6UTZhP.x64.dll f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe File opened for modification C:\Program Files (x86)\PriceChop\rOkEWMNm6UTZhP.x64.dll f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe File created C:\Program Files (x86)\PriceChop\rOkEWMNm6UTZhP.dll f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe File opened for modification C:\Program Files (x86)\PriceChop\rOkEWMNm6UTZhP.dll f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe File created C:\Program Files (x86)\PriceChop\rOkEWMNm6UTZhP.tlb f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe File opened for modification C:\Program Files (x86)\PriceChop\rOkEWMNm6UTZhP.tlb f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe -
Processes:
regsvr32.exef3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{c40dfc63-bd91-413b-b29c-716f73472a74} regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{c40dfc63-bd91-413b-b29c-716f73472a74} f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe Key deleted \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\APPROVEDEXTENSIONSMIGRATION\{C40DFC63-BD91-413B-B29C-716F73472A74} f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe Key deleted \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe Key deleted \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\APPROVEDEXTENSIONSMIGRATION\{C40DFC63-BD91-413B-B29C-716F73472A74} regsvr32.exe Key deleted \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration regsvr32.exe -
Modifies registry class 64 IoCs
Processes:
f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exeregsvr32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C40DFC63-BD91-413B-B29C-716F73472A74}\Implemented Categories f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR\ = "C:\\Program Files (x86)\\PriceChop" f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF} f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0} f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ProxyStubClsid32 f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{c40dfc63-bd91-413b-b29c-716f73472a74}\InprocServer32\ = "C:\\Program Files (x86)\\PriceChop\\rOkEWMNm6UTZhP.dll" f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{c40dfc63-bd91-413b-b29c-716f73472a74}\ProgID f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\..9\ = "PriceChop" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c40dfc63-bd91-413b-b29c-716f73472a74}\VersionIndependentProgID\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c40dfc63-bd91-413b-b29c-716f73472a74}\InprocServer32\ = "C:\\Program Files (x86)\\PriceChop\\rOkEWMNm6UTZhP.x64.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c40dfc63-bd91-413b-b29c-716f73472a74}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c40dfc63-bd91-413b-b29c-716f73472a74}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\..9\CLSID f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{c40dfc63-bd91-413b-b29c-716f73472a74}\InprocServer32 f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib\Version = "1.0" f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\ProxyStubClsid32 f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ = "IRegistry" f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{c40dfc63-bd91-413b-b29c-716f73472a74} f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c40dfc63-bd91-413b-b29c-716f73472a74}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0 f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\TypeLib\Version = "1.0" f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib\Version = "1.0" f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c40dfc63-bd91-413b-b29c-716f73472a74}\ProgID\ = ".9" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{c40dfc63-bd91-413b-b29c-716f73472a74}\ProgID f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.\CLSID\ = "{c40dfc63-bd91-413b-b29c-716f73472a74}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.\ = "PriceChop" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.\ = "PriceChop" f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.\CurVer f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{c40dfc63-bd91-413b-b29c-716f73472a74}\ProgID\ = ".9" f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS\ = "0" f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c40dfc63-bd91-413b-b29c-716f73472a74}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c40dfc63-bd91-413b-b29c-716f73472a74}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\..9\CLSID\ = "{c40dfc63-bd91-413b-b29c-716f73472a74}" f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c40dfc63-bd91-413b-b29c-716f73472a74}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ProxyStubClsid32 f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0} f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\ = "ILocalStorage" f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ = "IPlaghinMein" f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755} f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\ = "IEPluginLib" f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib\Version = "1.0" f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{c40dfc63-bd91-413b-b29c-716f73472a74} f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ = "IPlaghinMein" f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ProxyStubClsid32 f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c40dfc63-bd91-413b-b29c-716f73472a74}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c40dfc63-bd91-413b-b29c-716f73472a74}\InprocServer32 regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c40dfc63-bd91-413b-b29c-716f73472a74} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C40DFC63-BD91-413B-B29C-716F73472A74}\Implemented Categories\{59FB2056-D625-48D0-A944-1A85B5AB2640} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32 f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\. f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{c40dfc63-bd91-413b-b29c-716f73472a74}\VersionIndependentProgID f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\ = "ILocalStorage" f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.\CLSID\ = "{c40dfc63-bd91-413b-b29c-716f73472a74}" f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exepid process 4000 f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe 4000 f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe 4000 f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe 4000 f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe 4000 f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe 4000 f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe 4000 f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe 4000 f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exeregsvr32.exedescription pid process target process PID 4000 wrote to memory of 1668 4000 f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe regsvr32.exe PID 4000 wrote to memory of 1668 4000 f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe regsvr32.exe PID 4000 wrote to memory of 1668 4000 f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe regsvr32.exe PID 1668 wrote to memory of 3108 1668 regsvr32.exe regsvr32.exe PID 1668 wrote to memory of 3108 1668 regsvr32.exe regsvr32.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{c40dfc63-bd91-413b-b29c-716f73472a74} = "1" f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe"C:\Users\Admin\AppData\Local\Temp\f3cead31bdf55bbb18a14719c925ddc380e59c8fc76093a496521469c18fdf60.exe"1⤵
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4000 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\PriceChop\rOkEWMNm6UTZhP.x64.dll"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\PriceChop\rOkEWMNm6UTZhP.x64.dll"3⤵
- Registers COM server for autorun
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies Internet Explorer settings
- Modifies registry class
PID:3108
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:4872
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:1640
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5e01e74ac2374fedccc96c8ece2ff7924
SHA130ffc580453f9bd03040153c5657a81eac99142d
SHA256896befb661b359b49a4a9853920e93841bf2e2818c7551edf238d7057bcab6c8
SHA512c02328f02bf207aebed9a9e44a41ffaf2390daa2759d2ef75da7a453423e4e677c9e9b13bec5cae19274e8acea751b1973d05987a2d9d3924974c4637fec1708
-
Filesize
747KB
MD5d949da968ea04ac3a7ddf0e300bb32be
SHA1581d7d799c538b8e9e578cf57c420fb802d5a201
SHA2565c4756451acf8622efa75639f9131ca8215c165e2ef21cc1ab7f8fee77db462b
SHA512fd00e332af52646425f0d4032bb1bbfc85a44ff274bcf212f1264a29be546db4c1ceab7da32c70248a6baa2c55d2dff47dcb2ac441c783a1d9d1260c4685eb7e
-
Filesize
3KB
MD55b503f1b4056c3d4fbf2d03f88e1adfe
SHA1c8d659ea27bf0ca0bbfd46865d5796589bf9ef68
SHA256231ef0fef77ab6c7fea053f64a9ce7f9e21646b868bfe391962262fc15c9bb6c
SHA512229207201368d9674258389df19132070390f913aa5cc21b7567c515be5f5e0f07cdaa460d497ae355f27f00f7fc75538783d8890f6c9c0e861a7ecb8f520bdb
-
Filesize
885KB
MD51a6b1013f17c1cdc6e98f82cd2568ea8
SHA1c96e7bdba616743a5c05b08a342d89ed102376b0
SHA256fa9dd2bd7850053b251c9b5f27f1ac43ad04abf85de61b1928b7c2d562d3290a
SHA51210596f46c52ca3f50d6b3c7c894fff8b41f4fe920c6e5e0138cf7e95e85bfe1db8d5f1a63939832cd48cf29f571dd36de40ebb931fb9b14a106518ae4fc17ef9
-
Filesize
885KB
MD51a6b1013f17c1cdc6e98f82cd2568ea8
SHA1c96e7bdba616743a5c05b08a342d89ed102376b0
SHA256fa9dd2bd7850053b251c9b5f27f1ac43ad04abf85de61b1928b7c2d562d3290a
SHA51210596f46c52ca3f50d6b3c7c894fff8b41f4fe920c6e5e0138cf7e95e85bfe1db8d5f1a63939832cd48cf29f571dd36de40ebb931fb9b14a106518ae4fc17ef9
-
Filesize
885KB
MD51a6b1013f17c1cdc6e98f82cd2568ea8
SHA1c96e7bdba616743a5c05b08a342d89ed102376b0
SHA256fa9dd2bd7850053b251c9b5f27f1ac43ad04abf85de61b1928b7c2d562d3290a
SHA51210596f46c52ca3f50d6b3c7c894fff8b41f4fe920c6e5e0138cf7e95e85bfe1db8d5f1a63939832cd48cf29f571dd36de40ebb931fb9b14a106518ae4fc17ef9