Analysis
-
max time kernel
143s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 08:00
Static task
static1
Behavioral task
behavioral1
Sample
3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe
Resource
win10v2004-20220812-en
General
-
Target
3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe
-
Size
3.1MB
-
MD5
b6372befbd19923949c9a7c09ce9a165
-
SHA1
bcb15557790f4a3824b149f79d397157baef7e1a
-
SHA256
3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6
-
SHA512
b5e700515a2f0d9e925d46323f650fb125fea8a0877f69eb6a30f72b7b6e5add88eb26827e4672a8397513a6f99f484a72f5accdf244cc8d99408c9dbf46cbb4
-
SSDEEP
49152:/0P1dPTfGFXbWydMmvDwAYIun1bdzRUhPXV48ntDQFIUDCGxw6ry/J6fj:cIdMm0IccvJnw9Zu/J6
Malware Config
Signatures
-
Registers COM server for autorun 1 TTPs 4 IoCs
Processes:
regsvr32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{458A18D4-0059-135B-5D0C-DE0A7D7071A8}\InprocServer32\ = "C:\\Program Files (x86)\\cosstminn\\tMQr.x64.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{458A18D4-0059-135B-5D0C-DE0A7D7071A8}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{458A18D4-0059-135B-5D0C-DE0A7D7071A8}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{458A18D4-0059-135B-5D0C-DE0A7D7071A8}\InprocServer32 regsvr32.exe -
Loads dropped DLL 3 IoCs
Processes:
3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exeregsvr32.exeregsvr32.exepid process 724 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe 2420 regsvr32.exe 1512 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 5 IoCs
Processes:
3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exedescription ioc process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\hgpmogmeodohbapafpbbkgfibppohobb\2.0\manifest.json 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\hgpmogmeodohbapafpbbkgfibppohobb\2.0\manifest.json 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe File created C:\Users\DefaultAccount\AppData\Local\Google\Chrome\User Data\Default\Extensions\hgpmogmeodohbapafpbbkgfibppohobb\2.0\manifest.json 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\hgpmogmeodohbapafpbbkgfibppohobb\2.0\manifest.json 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe File created C:\Users\WDAGUtilityAccount\AppData\Local\Google\Chrome\User Data\Default\Extensions\hgpmogmeodohbapafpbbkgfibppohobb\2.0\manifest.json 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe -
Installs/modifies Browser Helper Object 2 TTPs 8 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exeregsvr32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{458A18D4-0059-135B-5D0C-DE0A7D7071A8} 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{458A18D4-0059-135B-5D0C-DE0A7D7071A8}\ = "cosstminn" 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{458A18D4-0059-135B-5D0C-DE0A7D7071A8}\NoExplorer = "1" 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{458A18D4-0059-135B-5D0C-DE0A7D7071A8} 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{458A18D4-0059-135B-5D0C-DE0A7D7071A8} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{458A18D4-0059-135B-5D0C-DE0A7D7071A8}\ = "cosstminn" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{458A18D4-0059-135B-5D0C-DE0A7D7071A8}\NoExplorer = "1" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{458A18D4-0059-135B-5D0C-DE0A7D7071A8} regsvr32.exe -
Drops file in System32 directory 4 IoCs
Processes:
3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exedescription ioc process File opened for modification C:\Windows\System32\GroupPolicy 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe -
Drops file in Program Files directory 8 IoCs
Processes:
3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exedescription ioc process File opened for modification C:\Program Files (x86)\cosstminn\tMQr.dll 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe File created C:\Program Files (x86)\cosstminn\tMQr.tlb 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe File opened for modification C:\Program Files (x86)\cosstminn\tMQr.tlb 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe File created C:\Program Files (x86)\cosstminn\tMQr.dat 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe File opened for modification C:\Program Files (x86)\cosstminn\tMQr.dat 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe File created C:\Program Files (x86)\cosstminn\tMQr.x64.dll 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe File opened for modification C:\Program Files (x86)\cosstminn\tMQr.x64.dll 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe File created C:\Program Files (x86)\cosstminn\tMQr.dll 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe -
Processes:
regsvr32.exe3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{458A18D4-0059-135B-5D0C-DE0A7D7071A8} regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{458A18D4-0059-135B-5D0C-DE0A7D7071A8} 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Key deleted \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\APPROVEDEXTENSIONSMIGRATION\{458A18D4-0059-135B-5D0C-DE0A7D7071A8} 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Key deleted \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Key deleted \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\APPROVEDEXTENSIONSMIGRATION\{458A18D4-0059-135B-5D0C-DE0A7D7071A8} regsvr32.exe Key deleted \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration regsvr32.exe -
Modifies registry class 64 IoCs
Processes:
3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exeregsvr32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\cosstminn.cosstminn\ = "cosstminn" 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\cosstminn.cosstminn\CLSID 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF} 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib\Version = "1.0" 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\ProxyStubClsid32 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{458A18D4-0059-135B-5D0C-DE0A7D7071A8}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{458A18D4-0059-135B-5D0C-DE0A7D7071A8}\VersionIndependentProgID\ = "cosstminn" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755} 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC} 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ProxyStubClsid32 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{458A18D4-0059-135B-5D0C-DE0A7D7071A8}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{458A18D4-0059-135B-5D0C-DE0A7D7071A8}\InprocServer32\ = "C:\\Program Files (x86)\\cosstminn\\tMQr.x64.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ProxyStubClsid32 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\cosstminn.cosstminn\CLSID\ = "{458A18D4-0059-135B-5D0C-DE0A7D7071A8}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{458A18D4-0059-135B-5D0C-DE0A7D7071A8}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{458A18D4-0059-135B-5D0C-DE0A7D7071A8}\Implemented Categories regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\cosstminn.cosstminn\CurVer 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{458A18D4-0059-135B-5D0C-DE0A7D7071A8}\InprocServer32 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{458A18D4-0059-135B-5D0C-DE0A7D7071A8}\ProgID 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32\ = "C:\\Program Files (x86)\\cosstminn\\tMQr.tlb" 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0} 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{458A18D4-0059-135B-5D0C-DE0A7D7071A8} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\cosstminn.cosstminn.2.0\CLSID 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\cosstminn.cosstminn\CLSID\ = "{458A18D4-0059-135B-5D0C-DE0A7D7071A8}" 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{458A18D4-0059-135B-5D0C-DE0A7D7071A8}\InprocServer32\ThreadingModel = "Apartment" 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{458A18D4-0059-135B-5D0C-DE0A7D7071A8} 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ProxyStubClsid32 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\TypeLib\Version = "1.0" 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\TypeLib 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\cosstminn.cosstminn\CurVer\ = "cosstminn.2.0" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{458A18D4-0059-135B-5D0C-DE0A7D7071A8}\VersionIndependentProgID 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF} 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib\Version = "1.0" 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\ = "ILocalStorage" 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{458A18D4-0059-135B-5D0C-DE0A7D7071A8}\ProgID\ = "cosstminn.2.0" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{458A18D4-0059-135B-5D0C-DE0A7D7071A8}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\cosstminn.cosstminn.2.0 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{458A18D4-0059-135B-5D0C-DE0A7D7071A8}\ = "cosstminn" 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\TypeLib\Version = "1.0" 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC} 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ = "IRegistry" 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{458A18D4-0059-135B-5D0C-DE0A7D7071A8} 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{458A18D4-0059-135B-5D0C-DE0A7D7071A8}\VersionIndependentProgID\ = "cosstminn" 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{458A18D4-0059-135B-5D0C-DE0A7D7071A8}\Implemented Categories 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{458A18D4-0059-135B-5D0C-DE0A7D7071A8}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{458A18D4-0059-135B-5D0C-DE0A7D7071A8}\Programmable 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{458A18D4-0059-135B-5D0C-DE0A7D7071A8}\InprocServer32 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\ = "IEPluginLib" 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ = "IPlaghinMein" 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\ = "ILocalStorage" 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{458A18D4-0059-135B-5D0C-DE0A7D7071A8}\ProgID regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exepid process 724 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe 724 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe 724 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe 724 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe 724 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe 724 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe 724 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe 724 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe 724 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe 724 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe 724 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe 724 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe 724 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe 724 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe 724 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe 724 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exedescription pid process Token: SeDebugPrivilege 724 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Token: SeDebugPrivilege 724 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Token: SeDebugPrivilege 724 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Token: SeDebugPrivilege 724 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Token: SeDebugPrivilege 724 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe Token: SeDebugPrivilege 724 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exeregsvr32.exedescription pid process target process PID 724 wrote to memory of 2420 724 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe regsvr32.exe PID 724 wrote to memory of 2420 724 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe regsvr32.exe PID 724 wrote to memory of 2420 724 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe regsvr32.exe PID 2420 wrote to memory of 1512 2420 regsvr32.exe regsvr32.exe PID 2420 wrote to memory of 1512 2420 regsvr32.exe regsvr32.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{458A18D4-0059-135B-5D0C-DE0A7D7071A8} = "1" 3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe"C:\Users\Admin\AppData\Local\Temp\3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe"1⤵
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:724 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\cosstminn\tMQr.x64.dll"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\cosstminn\tMQr.x64.dll"3⤵
- Registers COM server for autorun
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies Internet Explorer settings
- Modifies registry class
PID:1512
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:400
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:4964
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\cosstminn\tMQr.datFilesize
4KB
MD5d33a0a2b64a2b81a72442b9515368901
SHA12ae32db6f565103e0443ed928caf5a3eaadb4751
SHA256211da92c5e7476e10790a1673ac1070f616776122213d3b54efe24f266e97e10
SHA5120f6c21abb9e2a9ad4c82e28b28a57858d69f269bed54aa64b3bcffd87dd1877c506bdfe7a6e4b775674604a4aebcb80d0456858f82f33450dcc5f9ec33171ee8
-
C:\Program Files (x86)\cosstminn\tMQr.dllFilesize
610KB
MD58630a0477e33bf7e401c82bb6f0bf9ef
SHA1d1933549c59d151aec77010e665d2e60eb16f24c
SHA25629d95c7d6c79159bbe46dc7c8dded2c2fc74d7a15d36c3ece2f8bbbc06718888
SHA512759b5148b829c44d81d8941a939b1bc17ddef7998cbc03f24e82c49378bbed57298242cf8178587636590d2965f4b45227f62fc95dae98ebffc39b5f0e503832
-
C:\Program Files (x86)\cosstminn\tMQr.tlbFilesize
3KB
MD58956d96d82e1ff91bc7500ec1408070e
SHA1fe73dbb0de2e727dd55073149490e7548826b42d
SHA2564e83e6b729f8dcd42d0e2d8bac469f7cd696e6fbcb6f5edca8b91c3925b9ae5a
SHA5129e8d87d5338d77f573787916500befbc49b93516713ac44fd8e98eb1698421c5ab536bc24071882c5179b6cd75df286c20306bde9bd59b5613f70ac53048ad15
-
C:\Program Files (x86)\cosstminn\tMQr.x64.dllFilesize
690KB
MD53abba853e3f56ca70c68e2b5df4dd7d2
SHA1c930ed364d473be5ea573dddee48d956e36e2c3a
SHA2563d6dd31f0c3decfbc21205b543a72b2bc4a9406323bdbb7c995a2db31709249d
SHA512615c75f083827a8a1117eae47debe00b411565550a9e35d58a35c83e739e822dafdc3c217a33429334547d0ced6e950c0336ac8224ffcf345fa56df10971c3c5
-
C:\Program Files (x86)\cosstminn\tMQr.x64.dllFilesize
690KB
MD53abba853e3f56ca70c68e2b5df4dd7d2
SHA1c930ed364d473be5ea573dddee48d956e36e2c3a
SHA2563d6dd31f0c3decfbc21205b543a72b2bc4a9406323bdbb7c995a2db31709249d
SHA512615c75f083827a8a1117eae47debe00b411565550a9e35d58a35c83e739e822dafdc3c217a33429334547d0ced6e950c0336ac8224ffcf345fa56df10971c3c5
-
C:\Program Files (x86)\cosstminn\tMQr.x64.dllFilesize
690KB
MD53abba853e3f56ca70c68e2b5df4dd7d2
SHA1c930ed364d473be5ea573dddee48d956e36e2c3a
SHA2563d6dd31f0c3decfbc21205b543a72b2bc4a9406323bdbb7c995a2db31709249d
SHA512615c75f083827a8a1117eae47debe00b411565550a9e35d58a35c83e739e822dafdc3c217a33429334547d0ced6e950c0336ac8224ffcf345fa56df10971c3c5
-
memory/724-144-0x0000000000F90000-0x0000000000F93000-memory.dmpFilesize
12KB
-
memory/724-143-0x0000000000F90000-0x0000000000F93000-memory.dmpFilesize
12KB
-
memory/724-132-0x0000000003200000-0x00000000032A3000-memory.dmpFilesize
652KB
-
memory/724-145-0x0000000000F90000-0x0000000000F93000-memory.dmpFilesize
12KB
-
memory/724-146-0x0000000000F90000-0x0000000000F93000-memory.dmpFilesize
12KB
-
memory/724-138-0x0000000000F90000-0x0000000000F93000-memory.dmpFilesize
12KB
-
memory/724-139-0x0000000000F90000-0x0000000000F93000-memory.dmpFilesize
12KB
-
memory/724-140-0x0000000000F90000-0x0000000000F93000-memory.dmpFilesize
12KB
-
memory/724-141-0x0000000000F90000-0x0000000000F93000-memory.dmpFilesize
12KB
-
memory/724-142-0x0000000000F90000-0x0000000000F93000-memory.dmpFilesize
12KB
-
memory/724-137-0x0000000000F90000-0x0000000000F93000-memory.dmpFilesize
12KB
-
memory/1512-151-0x0000000000000000-mapping.dmp
-
memory/2420-148-0x0000000000000000-mapping.dmp