Analysis
-
max time kernel
125s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 07:27
Static task
static1
Behavioral task
behavioral1
Sample
917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe
Resource
win10v2004-20220901-en
General
-
Target
917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe
-
Size
3.0MB
-
MD5
65f49288a70b3d7b69d82e1feeafb2f4
-
SHA1
0ffef7e980331930c45d341a87c20705ea8a3360
-
SHA256
917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3
-
SHA512
981707c177f294b9270f42d72151940708381087b6b0d2fbacc8bb4955e1e2996f9463c9b8378f2c83af4c83f324ed3e0de64434dd971125e07af323c715dd27
-
SSDEEP
49152:mjlv2h3YZUZeHDgzlcBwb9gs8cjdk2+AAi/TcWsNkLLfy/AHi6y:iv2FI+ecJcBwJgs8ca2aWZHy/A
Malware Config
Signatures
-
Registers COM server for autorun 1 TTPs 4 IoCs
Processes:
regsvr32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6A44B13C-7B36-2FD3-A8CB-5258C61E611D}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6A44B13C-7B36-2FD3-A8CB-5258C61E611D}\InprocServer32\ = "C:\\Program Files (x86)\\cosstminn\\04I.x64.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6A44B13C-7B36-2FD3-A8CB-5258C61E611D}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6A44B13C-7B36-2FD3-A8CB-5258C61E611D}\InprocServer32 regsvr32.exe -
Loads dropped DLL 3 IoCs
Processes:
917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exeregsvr32.exeregsvr32.exepid process 848 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe 3084 regsvr32.exe 376 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 5 IoCs
Processes:
917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exedescription ioc process File created C:\Users\WDAGUtilityAccount\AppData\Local\Google\Chrome\User Data\Default\Extensions\bappfjkacaiebfiimlkglfhadfajmgnh\2.0\manifest.json 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\bappfjkacaiebfiimlkglfhadfajmgnh\2.0\manifest.json 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\bappfjkacaiebfiimlkglfhadfajmgnh\2.0\manifest.json 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe File created C:\Users\DefaultAccount\AppData\Local\Google\Chrome\User Data\Default\Extensions\bappfjkacaiebfiimlkglfhadfajmgnh\2.0\manifest.json 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\bappfjkacaiebfiimlkglfhadfajmgnh\2.0\manifest.json 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe -
Installs/modifies Browser Helper Object 2 TTPs 8 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exeregsvr32.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6A44B13C-7B36-2FD3-A8CB-5258C61E611D}\NoExplorer = "1" 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6A44B13C-7B36-2FD3-A8CB-5258C61E611D} 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6A44B13C-7B36-2FD3-A8CB-5258C61E611D} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6A44B13C-7B36-2FD3-A8CB-5258C61E611D}\ = "cosstminn" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6A44B13C-7B36-2FD3-A8CB-5258C61E611D}\NoExplorer = "1" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6A44B13C-7B36-2FD3-A8CB-5258C61E611D} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6A44B13C-7B36-2FD3-A8CB-5258C61E611D} 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6A44B13C-7B36-2FD3-A8CB-5258C61E611D}\ = "cosstminn" 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe -
Drops file in System32 directory 4 IoCs
Processes:
917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exedescription ioc process File opened for modification C:\Windows\System32\GroupPolicy 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe -
Drops file in Program Files directory 8 IoCs
Processes:
917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exedescription ioc process File opened for modification C:\Program Files (x86)\cosstminn\04I.dll 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe File created C:\Program Files (x86)\cosstminn\04I.tlb 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe File opened for modification C:\Program Files (x86)\cosstminn\04I.tlb 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe File created C:\Program Files (x86)\cosstminn\04I.dat 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe File opened for modification C:\Program Files (x86)\cosstminn\04I.dat 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe File created C:\Program Files (x86)\cosstminn\04I.x64.dll 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe File opened for modification C:\Program Files (x86)\cosstminn\04I.x64.dll 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe File created C:\Program Files (x86)\cosstminn\04I.dll 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe -
Processes:
917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exeregsvr32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{6A44B13C-7B36-2FD3-A8CB-5258C61E611D} 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Key deleted \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\APPROVEDEXTENSIONSMIGRATION\{6A44B13C-7B36-2FD3-A8CB-5258C61E611D} 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Key deleted \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Key deleted \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\APPROVEDEXTENSIONSMIGRATION\{6A44B13C-7B36-2FD3-A8CB-5258C61E611D} regsvr32.exe Key deleted \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{6A44B13C-7B36-2FD3-A8CB-5258C61E611D} regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe -
Modifies registry class 64 IoCs
Processes:
917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exeregsvr32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6A44B13C-7B36-2FD3-A8CB-5258C61E611D}\ProgID 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6A44B13C-7B36-2FD3-A8CB-5258C61E611D}\VersionIndependentProgID 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR\ = "C:\\Program Files (x86)\\cosstminn" 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6A44B13C-7B36-2FD3-A8CB-5258C61E611D}\InprocServer32\ = "C:\\Program Files (x86)\\cosstminn\\04I.x64.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\cosstminn.cosstminn\CLSID 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ProxyStubClsid32 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ProxyStubClsid32 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\cosstminn.cosstminn\ = "cosstminn" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6A44B13C-7B36-2FD3-A8CB-5258C61E611D}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\cosstminn.cosstminn.2.0\ = "cosstminn" 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib\Version = "1.0" 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6A44B13C-7B36-2FD3-A8CB-5258C61E611D}\ = "cosstminn" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6A44B13C-7B36-2FD3-A8CB-5258C61E611D}\VersionIndependentProgID\ = "cosstminn" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6A44B13C-7B36-2FD3-A8CB-5258C61E611D}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6A44B13C-7B36-2FD3-A8CB-5258C61E611D}\ = "cosstminn" 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6A44B13C-7B36-2FD3-A8CB-5258C61E611D}\InprocServer32\ = "C:\\Program Files (x86)\\cosstminn\\04I.dll" 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6A44B13C-7B36-2FD3-A8CB-5258C61E611D}\Programmable 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32\ = "C:\\Program Files (x86)\\cosstminn\\04I.tlb" 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0} 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6A44B13C-7B36-2FD3-A8CB-5258C61E611D}\VersionIndependentProgID 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6A44B13C-7B36-2FD3-A8CB-5258C61E611D}\Implemented Categories\{59FB2056-D625-48D0-A944-1A85B5AB2640} 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ProxyStubClsid32 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\cosstminn.cosstminn\CurVer\ = "cosstminn.2.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6A44B13C-7B36-2FD3-A8CB-5258C61E611D}\ProgID\ = "cosstminn.2.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\ = "ILocalStorage" 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\TypeLib 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\TypeLib\Version = "1.0" 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ = "IRegistry" 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6A44B13C-7B36-2FD3-A8CB-5258C61E611D}\Implemented Categories regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\cosstminn.cosstminn\ = "cosstminn" 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6A44B13C-7B36-2FD3-A8CB-5258C61E611D}\InprocServer32 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib\Version = "1.0" 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF} 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\ProxyStubClsid32 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6A44B13C-7B36-2FD3-A8CB-5258C61E611D} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6A44B13C-7B36-2FD3-A8CB-5258C61E611D}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\cosstminn.cosstminn 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\cosstminn.cosstminn\CurVer 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755} 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\TypeLib 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6A44B13C-7B36-2FD3-A8CB-5258C61E611D}\ProgID\ = "cosstminn.2.0" 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6A44B13C-7B36-2FD3-A8CB-5258C61E611D}\InprocServer32\ThreadingModel = "Apartment" 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ = "IRegistry" 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\cosstminn.cosstminn\CLSID\ = "{6A44B13C-7B36-2FD3-A8CB-5258C61E611D}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6A44B13C-7B36-2FD3-A8CB-5258C61E611D}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6A44B13C-7B36-2FD3-A8CB-5258C61E611D}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6A44B13C-7B36-2FD3-A8CB-5258C61E611D}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\cosstminn.cosstminn\CLSID\ = "{6A44B13C-7B36-2FD3-A8CB-5258C61E611D}" 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6A44B13C-7B36-2FD3-A8CB-5258C61E611D}\ProgID 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS\ = "0" 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ = "IPlaghinMein" 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exepid process 848 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe 848 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe 848 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe 848 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe 848 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe 848 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe 848 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe 848 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe 848 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe 848 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe 848 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe 848 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe 848 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe 848 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe 848 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe 848 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exedescription pid process Token: SeDebugPrivilege 848 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Token: SeDebugPrivilege 848 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Token: SeDebugPrivilege 848 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Token: SeDebugPrivilege 848 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Token: SeDebugPrivilege 848 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe Token: SeDebugPrivilege 848 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exeregsvr32.exedescription pid process target process PID 848 wrote to memory of 3084 848 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe regsvr32.exe PID 848 wrote to memory of 3084 848 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe regsvr32.exe PID 848 wrote to memory of 3084 848 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe regsvr32.exe PID 3084 wrote to memory of 376 3084 regsvr32.exe regsvr32.exe PID 3084 wrote to memory of 376 3084 regsvr32.exe regsvr32.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{6A44B13C-7B36-2FD3-A8CB-5258C61E611D} = "1" 917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe"C:\Users\Admin\AppData\Local\Temp\917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe"1⤵
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:848 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\cosstminn\04I.x64.dll"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\cosstminn\04I.x64.dll"3⤵
- Registers COM server for autorun
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies Internet Explorer settings
- Modifies registry class
PID:376
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:3424
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:3584
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\cosstminn\04I.datFilesize
4KB
MD5de368bd34dc36ce41711a49001481fa7
SHA1b91011d79f7ab077941ea70374f725389c981a7e
SHA25648c1e087fb793d93a79d7e516aa9cdc6ff58d2fa393895a5c5f67820771c0d7f
SHA512528d7235f80b2f52d476fca1db30933b098f416080511e4c436b58fca2f112c5216d237ca9c605c5be53d258c5bcb75a888dfb0698519669e5c4e3d52cf920a6
-
C:\Program Files (x86)\cosstminn\04I.dllFilesize
606KB
MD5d0a9fd704266fb372807507df74c4101
SHA1ec68536756c4af9d1f272077641be746bcb45394
SHA256c4488056716132ddbc950f968acc358dc0b0973e6b5d3afd4fe5f7dc037dde2d
SHA512d78e6600a9711dc21a6e086b8db713eb12d671052e543c16a74f12daeb97e12ec7c5ed9d39813882bcba5c6131af943115bcc35e68b891d5f59349e085ef24f7
-
C:\Program Files (x86)\cosstminn\04I.tlbFilesize
3KB
MD5596b14afa3a4cf4a24f570f58c5bf9dc
SHA15283fef61f1129881eb5f49c8058381ef2205054
SHA256f91335a2720866f56454e5121b50ec26c88fb2b7545c07a1090119cdf79d2e17
SHA51281303f8baed9043e7a2cbeb891b9742e8db284e10a229fc6e46a99f4e239da616c5223f2d400b74c4bfd9b937a8c882b5cf98aa8b46943d8deb2a3e06b4c1c2d
-
C:\Program Files (x86)\cosstminn\04I.x64.dllFilesize
684KB
MD55b557ca9bc92357eb76a8c576df86e6d
SHA1a66eecc091839bd0b6617f8332c35924f75c768c
SHA25629cd1cde949335d2d55629992320462479188f220e973dbf844d8ac47aef4bb5
SHA512d5bea462fd63ccfe590713b591608a358f356539309194c215975b597e366ef42044f6481b7ca8cc748dc6552d63e1e838ac977e2c120851b20986c1115e0b2e
-
C:\Program Files (x86)\cosstminn\04I.x64.dllFilesize
684KB
MD55b557ca9bc92357eb76a8c576df86e6d
SHA1a66eecc091839bd0b6617f8332c35924f75c768c
SHA25629cd1cde949335d2d55629992320462479188f220e973dbf844d8ac47aef4bb5
SHA512d5bea462fd63ccfe590713b591608a358f356539309194c215975b597e366ef42044f6481b7ca8cc748dc6552d63e1e838ac977e2c120851b20986c1115e0b2e
-
C:\Program Files (x86)\cosstminn\04I.x64.dllFilesize
684KB
MD55b557ca9bc92357eb76a8c576df86e6d
SHA1a66eecc091839bd0b6617f8332c35924f75c768c
SHA25629cd1cde949335d2d55629992320462479188f220e973dbf844d8ac47aef4bb5
SHA512d5bea462fd63ccfe590713b591608a358f356539309194c215975b597e366ef42044f6481b7ca8cc748dc6552d63e1e838ac977e2c120851b20986c1115e0b2e
-
memory/376-156-0x0000000000000000-mapping.dmp
-
memory/848-143-0x0000000000DC0000-0x0000000000DC3000-memory.dmpFilesize
12KB
-
memory/848-137-0x0000000000DC0000-0x0000000000DC3000-memory.dmpFilesize
12KB
-
memory/848-145-0x0000000000DC0000-0x0000000000DC3000-memory.dmpFilesize
12KB
-
memory/848-150-0x0000000000DC0000-0x0000000000DC3000-memory.dmpFilesize
12KB
-
memory/848-149-0x0000000000DC0000-0x0000000000DC3000-memory.dmpFilesize
12KB
-
memory/848-148-0x0000000000DC0000-0x0000000000DC3000-memory.dmpFilesize
12KB
-
memory/848-147-0x0000000000DC0000-0x0000000000DC3000-memory.dmpFilesize
12KB
-
memory/848-146-0x0000000000DC0000-0x0000000000DC3000-memory.dmpFilesize
12KB
-
memory/848-151-0x0000000000DC0000-0x0000000000DC2000-memory.dmpFilesize
8KB
-
memory/848-144-0x0000000000DC0000-0x0000000000DC3000-memory.dmpFilesize
12KB
-
memory/848-142-0x0000000000DC0000-0x0000000000DC3000-memory.dmpFilesize
12KB
-
memory/848-132-0x0000000000400000-0x00000000004A1000-memory.dmpFilesize
644KB
-
memory/848-138-0x0000000000DC0000-0x0000000000DC3000-memory.dmpFilesize
12KB
-
memory/848-139-0x0000000000DC0000-0x0000000000DC3000-memory.dmpFilesize
12KB
-
memory/848-140-0x0000000000DC0000-0x0000000000DC3000-memory.dmpFilesize
12KB
-
memory/848-141-0x0000000000DC0000-0x0000000000DC3000-memory.dmpFilesize
12KB
-
memory/3084-153-0x0000000000000000-mapping.dmp