Analysis
-
max time kernel
202s -
max time network
207s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 19:42
Static task
static1
Behavioral task
behavioral1
Sample
850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe
Resource
win10v2004-20220812-en
General
-
Target
850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe
-
Size
3.2MB
-
MD5
c18db26f1033e0e2e2f91f5509cdb87c
-
SHA1
de048ea07d348b2444cf13254ae24a7122dcb583
-
SHA256
850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102
-
SHA512
459a8042ec4ecc6fb5296edcaa3b18cf769d951af6c1e1cfc88c00554cc2d158998abf928fb4421edd07e5a06b31a59e61899ad7d83c0cd50e8d12fc27908169
-
SSDEEP
49152:K9nY1GLQBQDo56DWskgSGKjGRT8IIOuCltlgLOApVeNSij4cK9QT0apr7XstNfKI:KDQiEapKuT89Ou4frAuMse9Qrpr7u1V
Malware Config
Signatures
-
Registers COM server for autorun 1 TTPs 4 IoCs
Processes:
regsvr32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c4c159e2-9ce2-4666-adfa-b3349d5557aa}\InprocServer32\ = "C:\\Program Files (x86)\\TInnyWalleat\\A7rMZimR18fnPb.x64.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c4c159e2-9ce2-4666-adfa-b3349d5557aa}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c4c159e2-9ce2-4666-adfa-b3349d5557aa}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c4c159e2-9ce2-4666-adfa-b3349d5557aa}\InprocServer32 regsvr32.exe -
Loads dropped DLL 3 IoCs
Processes:
850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exeregsvr32.exeregsvr32.exepid process 4624 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe 1860 regsvr32.exe 2576 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 5 IoCs
Processes:
850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exedescription ioc process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\akmhpgdbeighgmnaidpnadpmlfcgopnb\1.0\manifest.json 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\akmhpgdbeighgmnaidpnadpmlfcgopnb\1.0\manifest.json 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe File created C:\Users\DefaultAccount\AppData\Local\Google\Chrome\User Data\Default\Extensions\akmhpgdbeighgmnaidpnadpmlfcgopnb\1.0\manifest.json 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\akmhpgdbeighgmnaidpnadpmlfcgopnb\1.0\manifest.json 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe File created C:\Users\WDAGUtilityAccount\AppData\Local\Google\Chrome\User Data\Default\Extensions\akmhpgdbeighgmnaidpnadpmlfcgopnb\1.0\manifest.json 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe -
Installs/modifies Browser Helper Object 2 TTPs 8 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
regsvr32.exe850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{c4c159e2-9ce2-4666-adfa-b3349d5557aa}\NoExplorer = "1" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{c4c159e2-9ce2-4666-adfa-b3349d5557aa} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{c4c159e2-9ce2-4666-adfa-b3349d5557aa} 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{c4c159e2-9ce2-4666-adfa-b3349d5557aa}\ = "TInnyWalleat" 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{c4c159e2-9ce2-4666-adfa-b3349d5557aa}\NoExplorer = "1" 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{c4c159e2-9ce2-4666-adfa-b3349d5557aa} 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{c4c159e2-9ce2-4666-adfa-b3349d5557aa} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{c4c159e2-9ce2-4666-adfa-b3349d5557aa}\ = "TInnyWalleat" regsvr32.exe -
Drops file in System32 directory 4 IoCs
Processes:
850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exedescription ioc process File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe File opened for modification C:\Windows\System32\GroupPolicy 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe -
Drops file in Program Files directory 8 IoCs
Processes:
850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exedescription ioc process File opened for modification C:\Program Files (x86)\TInnyWalleat\A7rMZimR18fnPb.dll 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe File created C:\Program Files (x86)\TInnyWalleat\A7rMZimR18fnPb.tlb 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe File opened for modification C:\Program Files (x86)\TInnyWalleat\A7rMZimR18fnPb.tlb 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe File created C:\Program Files (x86)\TInnyWalleat\A7rMZimR18fnPb.dat 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe File opened for modification C:\Program Files (x86)\TInnyWalleat\A7rMZimR18fnPb.dat 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe File created C:\Program Files (x86)\TInnyWalleat\A7rMZimR18fnPb.x64.dll 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe File opened for modification C:\Program Files (x86)\TInnyWalleat\A7rMZimR18fnPb.x64.dll 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe File created C:\Program Files (x86)\TInnyWalleat\A7rMZimR18fnPb.dll 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe -
Processes:
850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exeregsvr32.exedescription ioc process Key deleted \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\APPROVEDEXTENSIONSMIGRATION\{C4C159E2-9CE2-4666-ADFA-B3349D5557AA} 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Key deleted \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Key deleted \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\APPROVEDEXTENSIONSMIGRATION\{C4C159E2-9CE2-4666-ADFA-B3349D5557AA} regsvr32.exe Key deleted \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{c4c159e2-9ce2-4666-adfa-b3349d5557aa} regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{c4c159e2-9ce2-4666-adfa-b3349d5557aa} 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe -
Modifies registry class 64 IoCs
Processes:
850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exeregsvr32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c4c159e2-9ce2-4666-adfa-b3349d5557aa}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\..9\CLSID\ = "{c4c159e2-9ce2-4666-adfa-b3349d5557aa}" 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.\ = "TInnyWalleat" 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.\CLSID\ = "{c4c159e2-9ce2-4666-adfa-b3349d5557aa}" 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{c4c159e2-9ce2-4666-adfa-b3349d5557aa} 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{c4c159e2-9ce2-4666-adfa-b3349d5557aa}\VersionIndependentProgID 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c4c159e2-9ce2-4666-adfa-b3349d5557aa}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF} 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\ProxyStubClsid32 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\TypeLib\Version = "1.0" 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C4C159E2-9CE2-4666-ADFA-B3349D5557AA}\Implemented Categories 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib\Version = "1.0" 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c4c159e2-9ce2-4666-adfa-b3349d5557aa}\VersionIndependentProgID regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c4c159e2-9ce2-4666-adfa-b3349d5557aa}\VersionIndependentProgID regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c4c159e2-9ce2-4666-adfa-b3349d5557aa} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c4c159e2-9ce2-4666-adfa-b3349d5557aa}\InprocServer32 regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{c4c159e2-9ce2-4666-adfa-b3349d5557aa} 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32\ = "C:\\Program Files (x86)\\TInnyWalleat\\A7rMZimR18fnPb.tlb" 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ProxyStubClsid32 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ProxyStubClsid32 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ProxyStubClsid32 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC} 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{c4c159e2-9ce2-4666-adfa-b3349d5557aa}\VersionIndependentProgID\ 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{c4c159e2-9ce2-4666-adfa-b3349d5557aa}\InprocServer32\ThreadingModel = "Apartment" 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ = "IPlaghinMein" 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.\CLSID\ = "{c4c159e2-9ce2-4666-adfa-b3349d5557aa}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\. 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.\CurVer 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{c4c159e2-9ce2-4666-adfa-b3349d5557aa}\InprocServer32 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{c4c159e2-9ce2-4666-adfa-b3349d5557aa}\Programmable 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\ = "ILocalStorage" 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib\Version = "1.0" 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ = "IRegistry" 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\..9\ = "TInnyWalleat" 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{c4c159e2-9ce2-4666-adfa-b3349d5557aa}\ProgID\ = ".9" 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{c4c159e2-9ce2-4666-adfa-b3349d5557aa}\VersionIndependentProgID 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS\ = "0" 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF} 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c4c159e2-9ce2-4666-adfa-b3349d5557aa}\ProgID\ = ".9" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c4c159e2-9ce2-4666-adfa-b3349d5557aa}\InprocServer32\ = "C:\\Program Files (x86)\\TInnyWalleat\\A7rMZimR18fnPb.x64.dll" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c4c159e2-9ce2-4666-adfa-b3349d5557aa}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{c4c159e2-9ce2-4666-adfa-b3349d5557aa}\InprocServer32 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0} 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.\ = "TInnyWalleat" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.\CurVer\ = ".9" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\TypeLib 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib\Version = "1.0" 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c4c159e2-9ce2-4666-adfa-b3349d5557aa}\ = "TInnyWalleat" regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exepid process 4624 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe 4624 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe 4624 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe 4624 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe 4624 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe 4624 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe 4624 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe 4624 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe 4624 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe 4624 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe 4624 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe 4624 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe 4624 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe 4624 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe 4624 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe 4624 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exedescription pid process Token: SeDebugPrivilege 4624 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Token: SeDebugPrivilege 4624 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Token: SeDebugPrivilege 4624 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Token: SeDebugPrivilege 4624 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Token: SeDebugPrivilege 4624 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe Token: SeDebugPrivilege 4624 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exeregsvr32.exedescription pid process target process PID 4624 wrote to memory of 1860 4624 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe regsvr32.exe PID 4624 wrote to memory of 1860 4624 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe regsvr32.exe PID 4624 wrote to memory of 1860 4624 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe regsvr32.exe PID 1860 wrote to memory of 2576 1860 regsvr32.exe regsvr32.exe PID 1860 wrote to memory of 2576 1860 regsvr32.exe regsvr32.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{c4c159e2-9ce2-4666-adfa-b3349d5557aa} = "1" 850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe"C:\Users\Admin\AppData\Local\Temp\850af59d75ac773dcba81ae7d9493d3215dbed2d2b1b9d7a54a16c14a0b5b102.exe"1⤵
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4624 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\TInnyWalleat\A7rMZimR18fnPb.x64.dll"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\TInnyWalleat\A7rMZimR18fnPb.x64.dll"3⤵
- Registers COM server for autorun
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies Internet Explorer settings
- Modifies registry class
PID:2576
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:4792
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:4856
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\TInnyWalleat\A7rMZimR18fnPb.datFilesize
4KB
MD59926d938e72e5498598b672887f84654
SHA15b852f331742676140d06e48875ada9cd329c48b
SHA256b436dff5b839a88af06dad094a366332a5ec46583634e94f3c7d9348b7fc274a
SHA5129c68f36a5ccaf071db59f45c55c4c2f025ed6dba5d9857c4fa6a0591030d2e9eb5cc8ff20371105d55a4d05898427dd0f25eed2b8465d6b5e33bad4d7a74bff9
-
C:\Program Files (x86)\TInnyWalleat\A7rMZimR18fnPb.dllFilesize
626KB
MD5beba939961c578072accb50452711766
SHA18ee507a90e18619a7a1db38de6f0a829f8c56b56
SHA25612b325079015a5abefa21513fe4005ffddb8b16f89cd2d1f47f18049dd18b0aa
SHA512284c7ced668d71a87e22aa78f8e94eed401a53a7bf8c495afef48278edd6c9f6efceac9274aacf99a41d553cbd8d21956747e34ddc2b643c683a9e2a03451126
-
C:\Program Files (x86)\TInnyWalleat\A7rMZimR18fnPb.tlbFilesize
3KB
MD5689aab2940dfe7d83e43bd88e5ae00a1
SHA185b1c4e552cab55a5b363b54322ebe42fc03ea6d
SHA256ec02dfa1747e91b93c54b39a6aa491c69e056c5251cc52726d4fc637322d0a12
SHA5121077632dc084cb4d33914a1aecccd638da037f0e0e45bf8a41e07be410bcd87fea8713ea2451f5eb8edbdb04baf508088dfafee95d3747d38a3ccabbb221c1c9
-
C:\Program Files (x86)\TInnyWalleat\A7rMZimR18fnPb.x64.dllFilesize
702KB
MD550a859559413b0a88ea46c72c715e116
SHA1e3ecc6e5c886bc2d3f68bbd700a94cdee9e5814b
SHA2560da38857de4d56c7eb87b5a50e8ad3abf0b72fe31fcfd2cea4e398db12caf6a7
SHA512a406d0e6814b6f33b2002e4afead1fae83f39e19b0e42560bbc15b31516e430b1bfb39ba53867b882249715b7b4e9f37215381663284032efbf175b2c7e4fd24
-
C:\Program Files (x86)\TInnyWalleat\A7rMZimR18fnPb.x64.dllFilesize
702KB
MD550a859559413b0a88ea46c72c715e116
SHA1e3ecc6e5c886bc2d3f68bbd700a94cdee9e5814b
SHA2560da38857de4d56c7eb87b5a50e8ad3abf0b72fe31fcfd2cea4e398db12caf6a7
SHA512a406d0e6814b6f33b2002e4afead1fae83f39e19b0e42560bbc15b31516e430b1bfb39ba53867b882249715b7b4e9f37215381663284032efbf175b2c7e4fd24
-
C:\Program Files (x86)\TInnyWalleat\A7rMZimR18fnPb.x64.dllFilesize
702KB
MD550a859559413b0a88ea46c72c715e116
SHA1e3ecc6e5c886bc2d3f68bbd700a94cdee9e5814b
SHA2560da38857de4d56c7eb87b5a50e8ad3abf0b72fe31fcfd2cea4e398db12caf6a7
SHA512a406d0e6814b6f33b2002e4afead1fae83f39e19b0e42560bbc15b31516e430b1bfb39ba53867b882249715b7b4e9f37215381663284032efbf175b2c7e4fd24
-
memory/1860-149-0x0000000000000000-mapping.dmp
-
memory/2576-152-0x0000000000000000-mapping.dmp
-
memory/4624-141-0x0000000001251000-0x0000000001254000-memory.dmpFilesize
12KB
-
memory/4624-146-0x0000000001251000-0x0000000001254000-memory.dmpFilesize
12KB
-
memory/4624-145-0x0000000001251000-0x0000000001254000-memory.dmpFilesize
12KB
-
memory/4624-144-0x0000000001251000-0x0000000001254000-memory.dmpFilesize
12KB
-
memory/4624-147-0x0000000001251000-0x0000000001254000-memory.dmpFilesize
12KB
-
memory/4624-143-0x0000000001251000-0x0000000001254000-memory.dmpFilesize
12KB
-
memory/4624-142-0x0000000001251000-0x0000000001254000-memory.dmpFilesize
12KB
-
memory/4624-132-0x0000000003610000-0x00000000036B7000-memory.dmpFilesize
668KB
-
memory/4624-140-0x0000000001251000-0x0000000001254000-memory.dmpFilesize
12KB
-
memory/4624-139-0x0000000001251000-0x0000000001254000-memory.dmpFilesize
12KB
-
memory/4624-138-0x0000000001251000-0x0000000001254000-memory.dmpFilesize
12KB
-
memory/4624-137-0x0000000001251000-0x0000000001254000-memory.dmpFilesize
12KB