Analysis
-
max time kernel
41s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 18:01
Static task
static1
Behavioral task
behavioral1
Sample
e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe
Resource
win10v2004-20220901-en
General
-
Target
e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe
-
Size
3.4MB
-
MD5
50e3facdd909602cd2302651c4659db3
-
SHA1
ad921886bd9333238624c2fdf51aa2827b83a1c6
-
SHA256
e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709
-
SHA512
9e3b5c11143c0f7586ccc088164b11fc4d8f6119fa7dd567a0f9d17dd0869a90fcee71c94e1b401fd070a85bbeb2a1c81d81772ee18323946368761058f67b48
-
SSDEEP
49152:Qgod0gwbgYXIq3Bdr1XHqbhwKL9zYH7pZIRShwwwsMeAxjgonFOPghMrqr:QRwYqTRKbhh9zJSmReAdPQPXrq
Malware Config
Signatures
-
Registers COM server for autorun 1 TTPs 4 IoCs
Processes:
regsvr32.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b}\InprocServer32\ = "C:\\Program Files (x86)\\SmartOnes\\27kZNZxji3UbD7.x64.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe -
Loads dropped DLL 3 IoCs
Processes:
e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exeregsvr32.exeregsvr32.exepid process 960 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe 1552 regsvr32.exe 1716 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 3 IoCs
Processes:
e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exedescription ioc process File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\cnncjhkonlpnaggkipanpepldhkfgobg\4.0\manifest.json e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\cnncjhkonlpnaggkipanpepldhkfgobg\4.0\manifest.json e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\cnncjhkonlpnaggkipanpepldhkfgobg\4.0\manifest.json e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe -
Installs/modifies Browser Helper Object 2 TTPs 8 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exeregsvr32.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b}\NoExplorer = "1" e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b} e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b}\ = "SmartOnes" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b}\NoExplorer = "1" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b} e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b}\ = "SmartOnes" e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe -
Drops file in System32 directory 4 IoCs
Processes:
e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exedescription ioc process File opened for modification C:\Windows\System32\GroupPolicy e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe -
Drops file in Program Files directory 8 IoCs
Processes:
e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exedescription ioc process File opened for modification C:\Program Files (x86)\SmartOnes\27kZNZxji3UbD7.tlb e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe File created C:\Program Files (x86)\SmartOnes\27kZNZxji3UbD7.dat e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe File opened for modification C:\Program Files (x86)\SmartOnes\27kZNZxji3UbD7.dat e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe File created C:\Program Files (x86)\SmartOnes\27kZNZxji3UbD7.x64.dll e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe File opened for modification C:\Program Files (x86)\SmartOnes\27kZNZxji3UbD7.x64.dll e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe File created C:\Program Files (x86)\SmartOnes\27kZNZxji3UbD7.dll e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe File opened for modification C:\Program Files (x86)\SmartOnes\27kZNZxji3UbD7.dll e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe File created C:\Program Files (x86)\SmartOnes\27kZNZxji3UbD7.tlb e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe -
Processes:
e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exeregsvr32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b} e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Key deleted \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{DD7433A3-4CF2-4C2E-90C1-8E7426200A8B} e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Key deleted \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Key deleted \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{DD7433A3-4CF2-4C2E-90C1-8E7426200A8B} regsvr32.exe Key deleted \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b} regsvr32.exe -
Modifies registry class 64 IoCs
Processes:
e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exeregsvr32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32\ = "C:\\Program Files (x86)\\SmartOnes\\27kZNZxji3UbD7.tlb" e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0} e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\ProxyStubClsid32 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0} e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\TypeLib\Version = "1.0" e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b}\ProgID e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b}\VersionIndependentProgID regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b}\ProgID regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.\ = "SmartOnes" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\ProxyStubClsid32 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ = "IRegistry" e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b}\ = "SmartOnes" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DD7433A3-4CF2-4C2E-90C1-8E7426200A8B}\Implemented Categories regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DD7433A3-4CF2-4C2E-90C1-8E7426200A8B}\Implemented Categories\{59FB2056-D625-48D0-A944-1A85B5AB2640} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ProxyStubClsid32 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib\Version = "1.0" e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ProxyStubClsid32 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.\CurVer\ = ".9" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b}\Programmable e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\ = "ILocalStorage" e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b}\ProgID\ = ".9" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b}\InprocServer32\ = "C:\\Program Files (x86)\\SmartOnes\\27kZNZxji3UbD7.dll" e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR\ = "C:\\Program Files (x86)\\SmartOnes" e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ = "IPlaghinMein" e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF} e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\TypeLib\Version = "1.0" e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\. e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b}\VersionIndependentProgID\ e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\ = "ILocalStorage" e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib\Version = "1.0" e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\..9\ = "SmartOnes" e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b}\ = "SmartOnes" e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b}\VersionIndependentProgID e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.\CurVer e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.\CLSID\ = "{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b}" e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b} e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS\ = "0" e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF} e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.\CLSID e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib\Version = "1.0" e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\..9\ = "SmartOnes" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DD7433A3-4CF2-4C2E-90C1-8E7426200A8B} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC} e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b}\VersionIndependentProgID\ regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exepid process 960 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe 960 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe 960 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe 960 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe 960 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe 960 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe 960 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe 960 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe 960 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exedescription pid process Token: SeDebugPrivilege 960 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Token: SeDebugPrivilege 960 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Token: SeDebugPrivilege 960 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Token: SeDebugPrivilege 960 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Token: SeDebugPrivilege 960 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Token: SeDebugPrivilege 960 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exeregsvr32.exedescription pid process target process PID 960 wrote to memory of 1552 960 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe regsvr32.exe PID 960 wrote to memory of 1552 960 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe regsvr32.exe PID 960 wrote to memory of 1552 960 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe regsvr32.exe PID 960 wrote to memory of 1552 960 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe regsvr32.exe PID 960 wrote to memory of 1552 960 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe regsvr32.exe PID 960 wrote to memory of 1552 960 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe regsvr32.exe PID 960 wrote to memory of 1552 960 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe regsvr32.exe PID 1552 wrote to memory of 1716 1552 regsvr32.exe regsvr32.exe PID 1552 wrote to memory of 1716 1552 regsvr32.exe regsvr32.exe PID 1552 wrote to memory of 1716 1552 regsvr32.exe regsvr32.exe PID 1552 wrote to memory of 1716 1552 regsvr32.exe regsvr32.exe PID 1552 wrote to memory of 1716 1552 regsvr32.exe regsvr32.exe PID 1552 wrote to memory of 1716 1552 regsvr32.exe regsvr32.exe PID 1552 wrote to memory of 1716 1552 regsvr32.exe regsvr32.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b} = "1" e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe"C:\Users\Admin\AppData\Local\Temp\e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe"1⤵
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\SmartOnes\27kZNZxji3UbD7.x64.dll"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\SmartOnes\27kZNZxji3UbD7.x64.dll"3⤵
- Registers COM server for autorun
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies Internet Explorer settings
- Modifies registry class
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\SmartOnes\27kZNZxji3UbD7.datFilesize
3KB
MD5b3e1418d40f81306e6bdf62a7caaa42f
SHA105cfdfe6c2217e6af91422380295525b25d99e07
SHA2563609d5c6bbfed76e843ffac08c4a5c8851ee2435b717f7ce0aba307eebb76c87
SHA5122a2f93cc75ed8735e13c7fe8505d4ea340a84792b06f77017cc650ef7c40bb4f82736aba77662bc405d5b665f62018f195a56e4f243c0589da7030141beffd97
-
C:\Program Files (x86)\SmartOnes\27kZNZxji3UbD7.tlbFilesize
3KB
MD52fb1c1eb5048d6fd38f4012d609109e6
SHA163f5b13d95c02777173b0965636be74919203d9c
SHA256e3a8dc57eb1cda0375305b0619b248f96d4e72c6df558c33e77fb722614b3d9a
SHA51248f8acedd840ea26d0bf6a420cc4a04fb5dc4ebf015a9f229f09e25c4c19133d7526b2c92c9a48ce0d7a1c3441c039a6d07d0b8846f5adcf164b14cba73c0b7e
-
C:\Program Files (x86)\SmartOnes\27kZNZxji3UbD7.x64.dllFilesize
701KB
MD5e6a1f26110707cd5fbd0137aafeb6f0b
SHA1d87d543eb7a21b77b84038dfa8af7c475bacaf95
SHA256d6823b453891672bcecaf16037750aa3974ea53dc3f7f11c7f2206972bf3642b
SHA512775cd961ef763c53191bf7debe67e9d47fdf51cb22e6d651088966b9f2125ae837a355a1af431aacc0967ddf4c2fe0ec62f9b618d5b921ddf3fbf41e1a64127b
-
\Program Files (x86)\SmartOnes\27kZNZxji3UbD7.dllFilesize
621KB
MD5987d45a8cfdee8e3311d4a212a4babdb
SHA162281d5463d25e4155b84365713d18a8c5f06941
SHA25609faf6d30c6d3b29c585439e2b384ef78ecae32a98740148f79e6b9fed1cf3e0
SHA512330c19896a7dcc5361b9fb10d86d6d60cbe838f4f2bcca6dfdf5dba17c5e1b0bba19a0c7293776d25060da968ec32a64521432b267570cff0a65bcf61baaefd7
-
\Program Files (x86)\SmartOnes\27kZNZxji3UbD7.x64.dllFilesize
701KB
MD5e6a1f26110707cd5fbd0137aafeb6f0b
SHA1d87d543eb7a21b77b84038dfa8af7c475bacaf95
SHA256d6823b453891672bcecaf16037750aa3974ea53dc3f7f11c7f2206972bf3642b
SHA512775cd961ef763c53191bf7debe67e9d47fdf51cb22e6d651088966b9f2125ae837a355a1af431aacc0967ddf4c2fe0ec62f9b618d5b921ddf3fbf41e1a64127b
-
\Program Files (x86)\SmartOnes\27kZNZxji3UbD7.x64.dllFilesize
701KB
MD5e6a1f26110707cd5fbd0137aafeb6f0b
SHA1d87d543eb7a21b77b84038dfa8af7c475bacaf95
SHA256d6823b453891672bcecaf16037750aa3974ea53dc3f7f11c7f2206972bf3642b
SHA512775cd961ef763c53191bf7debe67e9d47fdf51cb22e6d651088966b9f2125ae837a355a1af431aacc0967ddf4c2fe0ec62f9b618d5b921ddf3fbf41e1a64127b
-
memory/960-54-0x0000000075141000-0x0000000075143000-memory.dmpFilesize
8KB
-
memory/960-55-0x0000000002770000-0x0000000002812000-memory.dmpFilesize
648KB
-
memory/1552-61-0x0000000000000000-mapping.dmp
-
memory/1716-65-0x0000000000000000-mapping.dmp
-
memory/1716-66-0x000007FEFB931000-0x000007FEFB933000-memory.dmpFilesize
8KB