Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 18:01
Static task
static1
Behavioral task
behavioral1
Sample
e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe
Resource
win10v2004-20220901-en
General
-
Target
e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe
-
Size
3.4MB
-
MD5
50e3facdd909602cd2302651c4659db3
-
SHA1
ad921886bd9333238624c2fdf51aa2827b83a1c6
-
SHA256
e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709
-
SHA512
9e3b5c11143c0f7586ccc088164b11fc4d8f6119fa7dd567a0f9d17dd0869a90fcee71c94e1b401fd070a85bbeb2a1c81d81772ee18323946368761058f67b48
-
SSDEEP
49152:Qgod0gwbgYXIq3Bdr1XHqbhwKL9zYH7pZIRShwwwsMeAxjgonFOPghMrqr:QRwYqTRKbhh9zJSmReAdPQPXrq
Malware Config
Signatures
-
Registers COM server for autorun 1 TTPs 4 IoCs
Processes:
regsvr32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b}\InprocServer32\ = "C:\\Program Files (x86)\\SmartOnes\\27kZNZxji3UbD7.x64.dll" regsvr32.exe -
Loads dropped DLL 3 IoCs
Processes:
e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exeregsvr32.exeregsvr32.exepid process 3548 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe 1240 regsvr32.exe 1972 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 5 IoCs
Processes:
e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exedescription ioc process File created C:\Users\WDAGUtilityAccount\AppData\Local\Google\Chrome\User Data\Default\Extensions\cnncjhkonlpnaggkipanpepldhkfgobg\4.0\manifest.json e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\cnncjhkonlpnaggkipanpepldhkfgobg\4.0\manifest.json e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\cnncjhkonlpnaggkipanpepldhkfgobg\4.0\manifest.json e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe File created C:\Users\DefaultAccount\AppData\Local\Google\Chrome\User Data\Default\Extensions\cnncjhkonlpnaggkipanpepldhkfgobg\4.0\manifest.json e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\cnncjhkonlpnaggkipanpepldhkfgobg\4.0\manifest.json e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe -
Installs/modifies Browser Helper Object 2 TTPs 8 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exeregsvr32.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b} e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b}\ = "SmartOnes" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b}\NoExplorer = "1" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b} e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b}\ = "SmartOnes" e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b}\NoExplorer = "1" e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe -
Drops file in System32 directory 4 IoCs
Processes:
e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exedescription ioc process File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe File opened for modification C:\Windows\System32\GroupPolicy e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe -
Drops file in Program Files directory 8 IoCs
Processes:
e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exedescription ioc process File opened for modification C:\Program Files (x86)\SmartOnes\27kZNZxji3UbD7.dat e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe File created C:\Program Files (x86)\SmartOnes\27kZNZxji3UbD7.x64.dll e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe File opened for modification C:\Program Files (x86)\SmartOnes\27kZNZxji3UbD7.x64.dll e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe File created C:\Program Files (x86)\SmartOnes\27kZNZxji3UbD7.dll e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe File opened for modification C:\Program Files (x86)\SmartOnes\27kZNZxji3UbD7.dll e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe File created C:\Program Files (x86)\SmartOnes\27kZNZxji3UbD7.tlb e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe File opened for modification C:\Program Files (x86)\SmartOnes\27kZNZxji3UbD7.tlb e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe File created C:\Program Files (x86)\SmartOnes\27kZNZxji3UbD7.dat e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe -
Processes:
regsvr32.exee0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exedescription ioc process Key deleted \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\APPROVEDEXTENSIONSMIGRATION\{DD7433A3-4CF2-4C2E-90C1-8E7426200A8B} regsvr32.exe Key deleted \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b} regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b} e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Key deleted \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\APPROVEDEXTENSIONSMIGRATION\{DD7433A3-4CF2-4C2E-90C1-8E7426200A8B} e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Key deleted \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe -
Modifies registry class 64 IoCs
Processes:
e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exeregsvr32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\TypeLib e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\..9\ = "SmartOnes" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD7433A3-4CF2-4C2E-90C1-8E7426200A8B}\Implemented Categories e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ProxyStubClsid32 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF} e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b}\ = "SmartOnes" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b}\ProgID\ = ".9" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b}\InprocServer32 regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b}\Programmable e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib\Version = "1.0" e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.\CurVer\ = ".9" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b}\InprocServer32\ = "C:\\Program Files (x86)\\SmartOnes\\27kZNZxji3UbD7.x64.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DD7433A3-4CF2-4C2E-90C1-8E7426200A8B}\Implemented Categories\{59FB2056-D625-48D0-A944-1A85B5AB2640} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b}\InprocServer32 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b}\ProgID e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b}\VersionIndependentProgID\ e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ = "IPlaghinMein" e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ProxyStubClsid32 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\..9\CLSID e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b}\ProgID e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0} e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.\CLSID\ = "{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b}\InprocServer32\ = "C:\\Program Files (x86)\\SmartOnes\\27kZNZxji3UbD7.dll" e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib\Version = "1.0" e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib\Version = "1.0" e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ = "IRegistry" e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b}\Programmable e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b}\VersionIndependentProgID e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD7433A3-4CF2-4C2E-90C1-8E7426200A8B}\Implemented Categories\{59FB2056-D625-48D0-A944-1A85B5AB2640} e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755} e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS\ = "0" e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\TypeLib\Version = "1.0" e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.\ = "SmartOnes" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\..9 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b}\ProgID regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b}\VersionIndependentProgID e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b} e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR\ = "C:\\Program Files (x86)\\SmartOnes" e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\ = "ILocalStorage" e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC} e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.\CLSID\ = "{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b}" e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ = "IPlaghinMein" e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b} e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b}\ = "SmartOnes" e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\TypeLib\Version = "1.0" e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ProxyStubClsid32 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.\ = "SmartOnes" e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\ProxyStubClsid32 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exepid process 3548 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe 3548 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe 3548 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe 3548 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe 3548 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe 3548 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe 3548 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe 3548 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe 3548 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe 3548 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe 3548 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe 3548 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe 3548 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe 3548 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe 3548 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe 3548 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe 3548 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe 3548 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exedescription pid process Token: SeDebugPrivilege 3548 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Token: SeDebugPrivilege 3548 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Token: SeDebugPrivilege 3548 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Token: SeDebugPrivilege 3548 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Token: SeDebugPrivilege 3548 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe Token: SeDebugPrivilege 3548 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exeregsvr32.exedescription pid process target process PID 3548 wrote to memory of 1240 3548 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe regsvr32.exe PID 3548 wrote to memory of 1240 3548 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe regsvr32.exe PID 3548 wrote to memory of 1240 3548 e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe regsvr32.exe PID 1240 wrote to memory of 1972 1240 regsvr32.exe regsvr32.exe PID 1240 wrote to memory of 1972 1240 regsvr32.exe regsvr32.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{dd7433a3-4cf2-4c2e-90c1-8e7426200a8b} = "1" e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe"C:\Users\Admin\AppData\Local\Temp\e0fe3222de5c84919c890c61ac5683e457fb81725e9d7a50374bb3ebaa01d709.exe"1⤵
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\SmartOnes\27kZNZxji3UbD7.x64.dll"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\SmartOnes\27kZNZxji3UbD7.x64.dll"3⤵
- Registers COM server for autorun
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies Internet Explorer settings
- Modifies registry class
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\SmartOnes\27kZNZxji3UbD7.datFilesize
3KB
MD5b3e1418d40f81306e6bdf62a7caaa42f
SHA105cfdfe6c2217e6af91422380295525b25d99e07
SHA2563609d5c6bbfed76e843ffac08c4a5c8851ee2435b717f7ce0aba307eebb76c87
SHA5122a2f93cc75ed8735e13c7fe8505d4ea340a84792b06f77017cc650ef7c40bb4f82736aba77662bc405d5b665f62018f195a56e4f243c0589da7030141beffd97
-
C:\Program Files (x86)\SmartOnes\27kZNZxji3UbD7.dllFilesize
621KB
MD5987d45a8cfdee8e3311d4a212a4babdb
SHA162281d5463d25e4155b84365713d18a8c5f06941
SHA25609faf6d30c6d3b29c585439e2b384ef78ecae32a98740148f79e6b9fed1cf3e0
SHA512330c19896a7dcc5361b9fb10d86d6d60cbe838f4f2bcca6dfdf5dba17c5e1b0bba19a0c7293776d25060da968ec32a64521432b267570cff0a65bcf61baaefd7
-
C:\Program Files (x86)\SmartOnes\27kZNZxji3UbD7.tlbFilesize
3KB
MD52fb1c1eb5048d6fd38f4012d609109e6
SHA163f5b13d95c02777173b0965636be74919203d9c
SHA256e3a8dc57eb1cda0375305b0619b248f96d4e72c6df558c33e77fb722614b3d9a
SHA51248f8acedd840ea26d0bf6a420cc4a04fb5dc4ebf015a9f229f09e25c4c19133d7526b2c92c9a48ce0d7a1c3441c039a6d07d0b8846f5adcf164b14cba73c0b7e
-
C:\Program Files (x86)\SmartOnes\27kZNZxji3UbD7.x64.dllFilesize
701KB
MD5e6a1f26110707cd5fbd0137aafeb6f0b
SHA1d87d543eb7a21b77b84038dfa8af7c475bacaf95
SHA256d6823b453891672bcecaf16037750aa3974ea53dc3f7f11c7f2206972bf3642b
SHA512775cd961ef763c53191bf7debe67e9d47fdf51cb22e6d651088966b9f2125ae837a355a1af431aacc0967ddf4c2fe0ec62f9b618d5b921ddf3fbf41e1a64127b
-
C:\Program Files (x86)\SmartOnes\27kZNZxji3UbD7.x64.dllFilesize
701KB
MD5e6a1f26110707cd5fbd0137aafeb6f0b
SHA1d87d543eb7a21b77b84038dfa8af7c475bacaf95
SHA256d6823b453891672bcecaf16037750aa3974ea53dc3f7f11c7f2206972bf3642b
SHA512775cd961ef763c53191bf7debe67e9d47fdf51cb22e6d651088966b9f2125ae837a355a1af431aacc0967ddf4c2fe0ec62f9b618d5b921ddf3fbf41e1a64127b
-
C:\Program Files (x86)\SmartOnes\27kZNZxji3UbD7.x64.dllFilesize
701KB
MD5e6a1f26110707cd5fbd0137aafeb6f0b
SHA1d87d543eb7a21b77b84038dfa8af7c475bacaf95
SHA256d6823b453891672bcecaf16037750aa3974ea53dc3f7f11c7f2206972bf3642b
SHA512775cd961ef763c53191bf7debe67e9d47fdf51cb22e6d651088966b9f2125ae837a355a1af431aacc0967ddf4c2fe0ec62f9b618d5b921ddf3fbf41e1a64127b
-
memory/1240-138-0x0000000000000000-mapping.dmp
-
memory/1972-141-0x0000000000000000-mapping.dmp
-
memory/3548-132-0x0000000003870000-0x0000000003912000-memory.dmpFilesize
648KB