Analysis
-
max time kernel
61s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 17:08
Static task
static1
Behavioral task
behavioral1
Sample
f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe
Resource
win10v2004-20221111-en
General
-
Target
f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe
-
Size
4.2MB
-
MD5
b0521765159491bc4098b2c04fa392fe
-
SHA1
444a8d44ebb1b6037d0892d92afb2c37c1c5f48a
-
SHA256
f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1
-
SHA512
fd90a00229754b7d02bd744e8bd5294765c8a2c45a88f8f64e9f2b0cb0f93b418cbed7dc0a1eff08be396cc64e0fb3b0c07cba4902b1d82a1710e7ad8f9f72c6
-
SSDEEP
49152:fIGKW46/4dVemXfVCxdYgcsVrxR9VadbdEkoCfLeCyvJ+2ZyUReq7TLziv:A5W54dVem9C4ghXObdlqCyFZvR3z
Malware Config
Signatures
-
Registers COM server for autorun 1 TTPs 4 IoCs
Processes:
regsvr32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{411d05b9-f04c-46c1-8b4c-52ec01224175}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{411d05b9-f04c-46c1-8b4c-52ec01224175}\InprocServer32\ = "C:\\Program Files (x86)\\PriceLess\\rxt2NsXCzNZi1k.x64.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{411d05b9-f04c-46c1-8b4c-52ec01224175}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{411d05b9-f04c-46c1-8b4c-52ec01224175}\InprocServer32 regsvr32.exe -
Loads dropped DLL 3 IoCs
Processes:
f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exeregsvr32.exeregsvr32.exepid process 1752 f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe 580 regsvr32.exe 1448 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 3 IoCs
Processes:
f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exedescription ioc process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\mlieoipgphpglbjalfdmkldjbonakfdc\5.2\manifest.json f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\mlieoipgphpglbjalfdmkldjbonakfdc\5.2\manifest.json f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\mlieoipgphpglbjalfdmkldjbonakfdc\5.2\manifest.json f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe -
Installs/modifies Browser Helper Object 2 TTPs 8 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
regsvr32.exef194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{411d05b9-f04c-46c1-8b4c-52ec01224175}\ = "PriceLess" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{411d05b9-f04c-46c1-8b4c-52ec01224175}\NoExplorer = "1" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{411d05b9-f04c-46c1-8b4c-52ec01224175} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{411d05b9-f04c-46c1-8b4c-52ec01224175} f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{411d05b9-f04c-46c1-8b4c-52ec01224175}\ = "PriceLess" f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{411d05b9-f04c-46c1-8b4c-52ec01224175}\NoExplorer = "1" f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{411d05b9-f04c-46c1-8b4c-52ec01224175} f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{411d05b9-f04c-46c1-8b4c-52ec01224175} regsvr32.exe -
Drops file in System32 directory 4 IoCs
Processes:
f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exedescription ioc process File opened for modification C:\Windows\System32\GroupPolicy f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe -
Drops file in Program Files directory 8 IoCs
Processes:
f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exedescription ioc process File opened for modification C:\Program Files (x86)\PriceLess\rxt2NsXCzNZi1k.tlb f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe File created C:\Program Files (x86)\PriceLess\rxt2NsXCzNZi1k.dat f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe File opened for modification C:\Program Files (x86)\PriceLess\rxt2NsXCzNZi1k.dat f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe File created C:\Program Files (x86)\PriceLess\rxt2NsXCzNZi1k.x64.dll f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe File opened for modification C:\Program Files (x86)\PriceLess\rxt2NsXCzNZi1k.x64.dll f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe File created C:\Program Files (x86)\PriceLess\rxt2NsXCzNZi1k.dll f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe File opened for modification C:\Program Files (x86)\PriceLess\rxt2NsXCzNZi1k.dll f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe File created C:\Program Files (x86)\PriceLess\rxt2NsXCzNZi1k.tlb f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe -
Processes:
f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exeregsvr32.exedescription ioc process Key deleted \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Key deleted \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{411D05B9-F04C-46C1-8B4C-52EC01224175} regsvr32.exe Key deleted \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{411d05b9-f04c-46c1-8b4c-52ec01224175} regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{411d05b9-f04c-46c1-8b4c-52ec01224175} f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Key deleted \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{411D05B9-F04C-46C1-8B4C-52EC01224175} f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe -
Modifies registry class 64 IoCs
Processes:
f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exeregsvr32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{411D05B9-F04C-46C1-8B4C-52EC01224175}\Implemented Categories\{59FB2056-D625-48D0-A944-1A85B5AB2640} f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC} f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib\Version = "1.0" f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{411d05b9-f04c-46c1-8b4c-52ec01224175}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\..9 f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\. f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{411d05b9-f04c-46c1-8b4c-52ec01224175}\VersionIndependentProgID\ f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\ = "IEPluginLib" f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.\CurVer\ = ".9" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{411d05b9-f04c-46c1-8b4c-52ec01224175}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{411d05b9-f04c-46c1-8b4c-52ec01224175}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.\CurVer f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ProxyStubClsid32 f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{411d05b9-f04c-46c1-8b4c-52ec01224175} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{411d05b9-f04c-46c1-8b4c-52ec01224175}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{411d05b9-f04c-46c1-8b4c-52ec01224175}\ProgID f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0 f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\TypeLib\Version = "1.0" f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{411d05b9-f04c-46c1-8b4c-52ec01224175}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{411D05B9-F04C-46C1-8B4C-52EC01224175}\Implemented Categories f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF} f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{411d05b9-f04c-46c1-8b4c-52ec01224175}\VersionIndependentProgID f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{411d05b9-f04c-46c1-8b4c-52ec01224175}\InprocServer32\ = "C:\\Program Files (x86)\\PriceLess\\rxt2NsXCzNZi1k.dll" f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\ProxyStubClsid32 f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0} f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\TypeLib f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ = "IRegistry" f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{411d05b9-f04c-46c1-8b4c-52ec01224175} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\ = "ILocalStorage" f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{411D05B9-F04C-46C1-8B4C-52EC01224175}\Implemented Categories regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ = "IPlaghinMein" f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ProxyStubClsid32 f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ = "IPlaghinMein" f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ProxyStubClsid32 f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{411d05b9-f04c-46c1-8b4c-52ec01224175}\ = "PriceLess" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{411d05b9-f04c-46c1-8b4c-52ec01224175}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{411D05B9-F04C-46C1-8B4C-52EC01224175} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.\ = "PriceLess" f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0} f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\TypeLib f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\ProxyStubClsid32 f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\..9\ = "PriceLess" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.\ = "PriceLess" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{411d05b9-f04c-46c1-8b4c-52ec01224175}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{411D05B9-F04C-46C1-8B4C-52EC01224175}\Implemented Categories\{59FB2056-D625-48D0-A944-1A85B5AB2640} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.\CLSID f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{411d05b9-f04c-46c1-8b4c-52ec01224175}\Programmable f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{411D05B9-F04C-46C1-8B4C-52EC01224175} f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR\ = "C:\\Program Files (x86)\\PriceLess" f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.\CLSID\ = "{411d05b9-f04c-46c1-8b4c-52ec01224175}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\..9\CLSID\ = "{411d05b9-f04c-46c1-8b4c-52ec01224175}" f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{411d05b9-f04c-46c1-8b4c-52ec01224175}\ProgID f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\TypeLib\Version = "1.0" f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\..9\CLSID\ = "{411d05b9-f04c-46c1-8b4c-52ec01224175}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\..9\CLSID f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{411d05b9-f04c-46c1-8b4c-52ec01224175}\InprocServer32 f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{411d05b9-f04c-46c1-8b4c-52ec01224175}\InprocServer32\ThreadingModel = "Apartment" f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exepid process 1752 f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe 1752 f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe 1752 f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe 1752 f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe 1752 f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe 1752 f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe 1752 f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe 1752 f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe 1752 f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe 1752 f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exedescription pid process Token: SeDebugPrivilege 1752 f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Token: SeDebugPrivilege 1752 f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Token: SeDebugPrivilege 1752 f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Token: SeDebugPrivilege 1752 f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Token: SeDebugPrivilege 1752 f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Token: SeDebugPrivilege 1752 f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exeregsvr32.exedescription pid process target process PID 1752 wrote to memory of 580 1752 f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe regsvr32.exe PID 1752 wrote to memory of 580 1752 f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe regsvr32.exe PID 1752 wrote to memory of 580 1752 f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe regsvr32.exe PID 1752 wrote to memory of 580 1752 f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe regsvr32.exe PID 1752 wrote to memory of 580 1752 f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe regsvr32.exe PID 1752 wrote to memory of 580 1752 f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe regsvr32.exe PID 1752 wrote to memory of 580 1752 f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe regsvr32.exe PID 580 wrote to memory of 1448 580 regsvr32.exe regsvr32.exe PID 580 wrote to memory of 1448 580 regsvr32.exe regsvr32.exe PID 580 wrote to memory of 1448 580 regsvr32.exe regsvr32.exe PID 580 wrote to memory of 1448 580 regsvr32.exe regsvr32.exe PID 580 wrote to memory of 1448 580 regsvr32.exe regsvr32.exe PID 580 wrote to memory of 1448 580 regsvr32.exe regsvr32.exe PID 580 wrote to memory of 1448 580 regsvr32.exe regsvr32.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{411d05b9-f04c-46c1-8b4c-52ec01224175} = "1" f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe"C:\Users\Admin\AppData\Local\Temp\f194d778990f7a1b30738285be883adde43631c7d94e08b522b4c9889189ccd1.exe"1⤵
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1752 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\PriceLess\rxt2NsXCzNZi1k.x64.dll"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\PriceLess\rxt2NsXCzNZi1k.x64.dll"3⤵
- Registers COM server for autorun
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies Internet Explorer settings
- Modifies registry class
PID:1448
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD51e682f14c8ebfc6a78d7f4fde8fa6740
SHA19416e9905d4b9a18231b544cb9a01b09e81ad2f3
SHA25648d423e453c3a8c50ee73ef449cfbe7b92b241bc26fbcfca5db5c6dbec42821f
SHA512ab5817834a4c917ed62c67f567b9d0b2f8687ab6d86abcf0f5f32c69ffd4718e44efb57683149be9f6be5f5bda406de0a67d3bcb85c3938e8ecd96f6766f5cf9
-
Filesize
3KB
MD5dad7dc8242a2925ade239718a506374e
SHA108d7aba181e62216e2976c15a9107b760e0ef3ab
SHA2567dd64eeefd4900b4ef39b47ef2cbe5cf6f7e184ca74dedb351c749c60d39981b
SHA51271dd707836f3415c8b36cc485a879f82d3d5bd0cae95b891eb8cc3fcb3a3ada8f3fa53b68a06a866bca111b8c72d75bcefc118c9785fa20178cf13c4e57ac8ea
-
Filesize
875KB
MD50c3a0b1a34377f22a3a16b868c74205c
SHA1d24dd7c000de9f860b66a66539ea145feb8d94cc
SHA2564744114a0e7734acac9ec0e7c91da4074811f5b71349d235491da22a3f6293fc
SHA5120785ea18a70c03858026fe056c630a83231db8941407766cca99ab8414868943e6994964a15aa7ec8d13a72daafa016e0d2ca638b43e6e21cf077fc8f96bbc61
-
Filesize
740KB
MD5f37095c241e62cc8b66a00a187fd1155
SHA182a9120f26b4e76df5fe123a5176d28aa898b23c
SHA2560810e4c7b6fb4ad3f7a3abee5bf321f720515e6c3e605c9348bc51e741906874
SHA512eab1bdf2b0f79af777ce967d02789cf3fc39a09fafa43ff230a650bc42e871538e98953479a2849249d765037dc92175069335d8010da4fc1286f48a088b8b9b
-
Filesize
875KB
MD50c3a0b1a34377f22a3a16b868c74205c
SHA1d24dd7c000de9f860b66a66539ea145feb8d94cc
SHA2564744114a0e7734acac9ec0e7c91da4074811f5b71349d235491da22a3f6293fc
SHA5120785ea18a70c03858026fe056c630a83231db8941407766cca99ab8414868943e6994964a15aa7ec8d13a72daafa016e0d2ca638b43e6e21cf077fc8f96bbc61
-
Filesize
875KB
MD50c3a0b1a34377f22a3a16b868c74205c
SHA1d24dd7c000de9f860b66a66539ea145feb8d94cc
SHA2564744114a0e7734acac9ec0e7c91da4074811f5b71349d235491da22a3f6293fc
SHA5120785ea18a70c03858026fe056c630a83231db8941407766cca99ab8414868943e6994964a15aa7ec8d13a72daafa016e0d2ca638b43e6e21cf077fc8f96bbc61