Analysis
-
max time kernel
144s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 03:55
Static task
static1
Behavioral task
behavioral1
Sample
2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe
Resource
win10v2004-20221111-en
General
-
Target
2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe
-
Size
3.4MB
-
MD5
d5443dbf3e1ac5b710bf1db5c1c09b46
-
SHA1
1a7b1652022731681d0cc41dd53e259c2c2988cc
-
SHA256
2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317
-
SHA512
d234149a81e944252204c51aa59b252afd0cf889bdea96117a5a1cc8710febc19fbc77c5346a0130cecf1d26a97e2ac6a8184830769a9bd5e806c1aaaf18a219
-
SSDEEP
49152:hWo8bgwHzYXFABFdr1XHqbhwKL9zYH7p8lt7fTLSS+eJhwchuseCcTc:hzwiABRKbhh9zrTv+eJDhFe
Malware Config
Signatures
-
Registers COM server for autorun 1 TTPs 4 IoCs
Processes:
regsvr32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5099f434-0539-45de-a6f0-00904e059cd3}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5099f434-0539-45de-a6f0-00904e059cd3}\InprocServer32\ = "C:\\Program Files (x86)\\SmartOnes\\LiyIoKb3zGakT7.x64.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5099f434-0539-45de-a6f0-00904e059cd3}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5099f434-0539-45de-a6f0-00904e059cd3}\InprocServer32 regsvr32.exe -
Loads dropped DLL 3 IoCs
Processes:
2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exeregsvr32.exeregsvr32.exepid process 4696 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe 2244 regsvr32.exe 1540 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 5 IoCs
Processes:
2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exedescription ioc process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\pcifjdfddnomnjpgfjonamijjiefjjeo\4.0\manifest.json 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\pcifjdfddnomnjpgfjonamijjiefjjeo\4.0\manifest.json 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe File created C:\Users\DefaultAccount\AppData\Local\Google\Chrome\User Data\Default\Extensions\pcifjdfddnomnjpgfjonamijjiefjjeo\4.0\manifest.json 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\pcifjdfddnomnjpgfjonamijjiefjjeo\4.0\manifest.json 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe File created C:\Users\WDAGUtilityAccount\AppData\Local\Google\Chrome\User Data\Default\Extensions\pcifjdfddnomnjpgfjonamijjiefjjeo\4.0\manifest.json 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe -
Installs/modifies Browser Helper Object 2 TTPs 8 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
regsvr32.exe2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5099f434-0539-45de-a6f0-00904e059cd3} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5099f434-0539-45de-a6f0-00904e059cd3}\ = "SmartOnes" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5099f434-0539-45de-a6f0-00904e059cd3}\NoExplorer = "1" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5099f434-0539-45de-a6f0-00904e059cd3} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5099f434-0539-45de-a6f0-00904e059cd3} 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5099f434-0539-45de-a6f0-00904e059cd3}\ = "SmartOnes" 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5099f434-0539-45de-a6f0-00904e059cd3}\NoExplorer = "1" 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5099f434-0539-45de-a6f0-00904e059cd3} 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe -
Drops file in System32 directory 4 IoCs
Processes:
2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exedescription ioc process File opened for modification C:\Windows\System32\GroupPolicy 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe -
Drops file in Program Files directory 8 IoCs
Processes:
2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exedescription ioc process File opened for modification C:\Program Files (x86)\SmartOnes\LiyIoKb3zGakT7.dll 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe File created C:\Program Files (x86)\SmartOnes\LiyIoKb3zGakT7.tlb 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe File opened for modification C:\Program Files (x86)\SmartOnes\LiyIoKb3zGakT7.tlb 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe File created C:\Program Files (x86)\SmartOnes\LiyIoKb3zGakT7.dat 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe File opened for modification C:\Program Files (x86)\SmartOnes\LiyIoKb3zGakT7.dat 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe File created C:\Program Files (x86)\SmartOnes\LiyIoKb3zGakT7.x64.dll 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe File opened for modification C:\Program Files (x86)\SmartOnes\LiyIoKb3zGakT7.x64.dll 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe File created C:\Program Files (x86)\SmartOnes\LiyIoKb3zGakT7.dll 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe -
Processes:
regsvr32.exe2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{5099f434-0539-45de-a6f0-00904e059cd3} regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{5099f434-0539-45de-a6f0-00904e059cd3} 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Key deleted \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\APPROVEDEXTENSIONSMIGRATION\{5099F434-0539-45DE-A6F0-00904E059CD3} 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Key deleted \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Key deleted \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\APPROVEDEXTENSIONSMIGRATION\{5099F434-0539-45DE-A6F0-00904E059CD3} regsvr32.exe Key deleted \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration regsvr32.exe -
Modifies registry class 64 IoCs
Processes:
2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exeregsvr32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.\CurVer\ = ".9" 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF} 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\TypeLib 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ = "IRegistry" 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.\CLSID\ = "{5099f434-0539-45de-a6f0-00904e059cd3}" 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755} 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0} 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5099f434-0539-45de-a6f0-00904e059cd3}\ProgID\ = ".9" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5099f434-0539-45de-a6f0-00904e059cd3}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5099F434-0539-45DE-A6F0-00904E059CD3}\Implemented Categories\{59FB2056-D625-48D0-A944-1A85B5AB2640} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5099f434-0539-45de-a6f0-00904e059cd3}\InprocServer32\ThreadingModel = "Apartment" 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5099f434-0539-45de-a6f0-00904e059cd3}\VersionIndependentProgID\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5099f434-0539-45de-a6f0-00904e059cd3}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5099f434-0539-45de-a6f0-00904e059cd3}\VersionIndependentProgID\ 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5099f434-0539-45de-a6f0-00904e059cd3} 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0} 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\..9\CLSID\ = "{5099f434-0539-45de-a6f0-00904e059cd3}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5099f434-0539-45de-a6f0-00904e059cd3}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\..9 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32\ = "C:\\Program Files (x86)\\SmartOnes\\LiyIoKb3zGakT7.tlb" 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.\CurVer\ = ".9" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5099f434-0539-45de-a6f0-00904e059cd3} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5099f434-0539-45de-a6f0-00904e059cd3}\ = "SmartOnes" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5099f434-0539-45de-a6f0-00904e059cd3}\InprocServer32\ = "C:\\Program Files (x86)\\SmartOnes\\LiyIoKb3zGakT7.dll" 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5099F434-0539-45DE-A6F0-00904E059CD3}\Implemented Categories 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF} 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ProxyStubClsid32 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib\Version = "1.0" 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\ = "ILocalStorage" 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\ProxyStubClsid32 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\..9\ = "SmartOnes" 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC} 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5099f434-0539-45de-a6f0-00904e059cd3}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5099f434-0539-45de-a6f0-00904e059cd3}\VersionIndependentProgID 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5099F434-0539-45DE-A6F0-00904E059CD3} 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ = "IPlaghinMein" 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\ = "ILocalStorage" 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ProxyStubClsid32 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.\ = "SmartOnes" 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5099f434-0539-45de-a6f0-00904e059cd3}\Programmable 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5099F434-0539-45DE-A6F0-00904E059CD3}\Implemented Categories\{59FB2056-D625-48D0-A944-1A85B5AB2640} 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib\Version = "1.0" 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\TypeLib 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ProxyStubClsid32 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5099f434-0539-45de-a6f0-00904e059cd3}\InprocServer32\ = "C:\\Program Files (x86)\\SmartOnes\\LiyIoKb3zGakT7.x64.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.\CurVer 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib\Version = "1.0" 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5099f434-0539-45de-a6f0-00904e059cd3}\ProgID\ = ".9" 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5099f434-0539-45de-a6f0-00904e059cd3} 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ = "IPlaghinMein" 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\TypeLib\Version = "1.0" 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5099f434-0539-45de-a6f0-00904e059cd3}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\..9\CLSID 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exepid process 4696 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe 4696 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe 4696 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe 4696 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe 4696 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe 4696 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe 4696 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe 4696 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe 4696 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe 4696 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe 4696 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe 4696 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe 4696 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe 4696 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe 4696 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe 4696 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe 4696 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe 4696 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exedescription pid process Token: SeDebugPrivilege 4696 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Token: SeDebugPrivilege 4696 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Token: SeDebugPrivilege 4696 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Token: SeDebugPrivilege 4696 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Token: SeDebugPrivilege 4696 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe Token: SeDebugPrivilege 4696 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exeregsvr32.exedescription pid process target process PID 4696 wrote to memory of 2244 4696 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe regsvr32.exe PID 4696 wrote to memory of 2244 4696 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe regsvr32.exe PID 4696 wrote to memory of 2244 4696 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe regsvr32.exe PID 2244 wrote to memory of 1540 2244 regsvr32.exe regsvr32.exe PID 2244 wrote to memory of 1540 2244 regsvr32.exe regsvr32.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{5099f434-0539-45de-a6f0-00904e059cd3} = "1" 2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe"C:\Users\Admin\AppData\Local\Temp\2224435136997f7f9d821fa7782c845e1f0762c66ae91ce54c68ed0db8ab6317.exe"1⤵
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\SmartOnes\LiyIoKb3zGakT7.x64.dll"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\SmartOnes\LiyIoKb3zGakT7.x64.dll"3⤵
- Registers COM server for autorun
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies Internet Explorer settings
- Modifies registry class
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\SmartOnes\LiyIoKb3zGakT7.datFilesize
3KB
MD565f555c801dc677575860138a69a6cc6
SHA15222d4af4d0dacdd12ee70186284920f948d110c
SHA256ace8ce0625239869f0d5c86eac01871510d72807c0ed1b5c61773abdc5cc1c8d
SHA512d0a17fc481c818900065d1bcd937b215828ca0be82e3121415e5e8eb090dc346bd123efb8a1055a2b53ebe8e45f13bfdbf8d803f6de113a2d8006ea5351fccf1
-
C:\Program Files (x86)\SmartOnes\LiyIoKb3zGakT7.dllFilesize
621KB
MD5987d45a8cfdee8e3311d4a212a4babdb
SHA162281d5463d25e4155b84365713d18a8c5f06941
SHA25609faf6d30c6d3b29c585439e2b384ef78ecae32a98740148f79e6b9fed1cf3e0
SHA512330c19896a7dcc5361b9fb10d86d6d60cbe838f4f2bcca6dfdf5dba17c5e1b0bba19a0c7293776d25060da968ec32a64521432b267570cff0a65bcf61baaefd7
-
C:\Program Files (x86)\SmartOnes\LiyIoKb3zGakT7.tlbFilesize
3KB
MD52fb1c1eb5048d6fd38f4012d609109e6
SHA163f5b13d95c02777173b0965636be74919203d9c
SHA256e3a8dc57eb1cda0375305b0619b248f96d4e72c6df558c33e77fb722614b3d9a
SHA51248f8acedd840ea26d0bf6a420cc4a04fb5dc4ebf015a9f229f09e25c4c19133d7526b2c92c9a48ce0d7a1c3441c039a6d07d0b8846f5adcf164b14cba73c0b7e
-
C:\Program Files (x86)\SmartOnes\LiyIoKb3zGakT7.x64.dllFilesize
701KB
MD5e6a1f26110707cd5fbd0137aafeb6f0b
SHA1d87d543eb7a21b77b84038dfa8af7c475bacaf95
SHA256d6823b453891672bcecaf16037750aa3974ea53dc3f7f11c7f2206972bf3642b
SHA512775cd961ef763c53191bf7debe67e9d47fdf51cb22e6d651088966b9f2125ae837a355a1af431aacc0967ddf4c2fe0ec62f9b618d5b921ddf3fbf41e1a64127b
-
C:\Program Files (x86)\SmartOnes\LiyIoKb3zGakT7.x64.dllFilesize
701KB
MD5e6a1f26110707cd5fbd0137aafeb6f0b
SHA1d87d543eb7a21b77b84038dfa8af7c475bacaf95
SHA256d6823b453891672bcecaf16037750aa3974ea53dc3f7f11c7f2206972bf3642b
SHA512775cd961ef763c53191bf7debe67e9d47fdf51cb22e6d651088966b9f2125ae837a355a1af431aacc0967ddf4c2fe0ec62f9b618d5b921ddf3fbf41e1a64127b
-
C:\Program Files (x86)\SmartOnes\LiyIoKb3zGakT7.x64.dllFilesize
701KB
MD5e6a1f26110707cd5fbd0137aafeb6f0b
SHA1d87d543eb7a21b77b84038dfa8af7c475bacaf95
SHA256d6823b453891672bcecaf16037750aa3974ea53dc3f7f11c7f2206972bf3642b
SHA512775cd961ef763c53191bf7debe67e9d47fdf51cb22e6d651088966b9f2125ae837a355a1af431aacc0967ddf4c2fe0ec62f9b618d5b921ddf3fbf41e1a64127b
-
memory/1540-144-0x0000000000000000-mapping.dmp
-
memory/2244-141-0x0000000000000000-mapping.dmp
-
memory/4696-135-0x0000000002C80000-0x0000000002D22000-memory.dmpFilesize
648KB