Analysis
-
max time kernel
154s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 22:54
Static task
static1
Behavioral task
behavioral1
Sample
e70c1a53008357fab3e236ff47f570cda3ee289199a72b799ab1ad3cb1044680.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e70c1a53008357fab3e236ff47f570cda3ee289199a72b799ab1ad3cb1044680.exe
Resource
win10v2004-20220812-en
General
-
Target
e70c1a53008357fab3e236ff47f570cda3ee289199a72b799ab1ad3cb1044680.exe
-
Size
689KB
-
MD5
4e8c12dd138ba44b76075a668578360d
-
SHA1
6e2cb4d2b422d6a70017b8e6f3f0c80b9844456b
-
SHA256
e70c1a53008357fab3e236ff47f570cda3ee289199a72b799ab1ad3cb1044680
-
SHA512
caacb35890bce8d51e549b92c1c7268c413ae26d73d4d04c9031130ffcb3b8184e7f74d17bccfed4bb60255450edd395d60f4141bc2d0143f887855f20db7b81
-
SSDEEP
12288:p17DgB2IjHVG4G4Y7jeKuVnvon+N83LwwiAn6KkM33nxDbjeKuV4vPD+N82Lwwim:p1QoO1G4G37tUnvone83Z76bMHxPtU4u
Malware Config
Signatures
-
Registers COM server for autorun 1 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9303365d-31fc-4ab9-a677-7bbc6c68e28c}\InprocServer32\ = "C:\\Program Files (x86)\\TrustMediaViewerV1\\TrustMediaViewerV1alpha5885\\ie\\TrustMediaViewerV1alpha5885x64.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9303365d-31fc-4ab9-a677-7bbc6c68e28c}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9303365d-31fc-4ab9-a677-7bbc6c68e28c}\InprocServer32 regsvr32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation e70c1a53008357fab3e236ff47f570cda3ee289199a72b799ab1ad3cb1044680.exe -
Loads dropped DLL 5 IoCs
pid Process 4856 e70c1a53008357fab3e236ff47f570cda3ee289199a72b799ab1ad3cb1044680.exe 1408 regsvr32.exe 4856 e70c1a53008357fab3e236ff47f570cda3ee289199a72b799ab1ad3cb1044680.exe 1292 regsvr32.exe 4424 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 6 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{9303365d-31fc-4ab9-a677-7bbc6c68e28c}\ = "TrustMediaViewerV1alpha5885" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{9303365d-31fc-4ab9-a677-7bbc6c68e28c}\NoExplorer = "1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{9303365d-31fc-4ab9-a677-7bbc6c68e28c} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{9303365d-31fc-4ab9-a677-7bbc6c68e28c}\ = "TrustMediaViewerV1alpha5885" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{9303365d-31fc-4ab9-a677-7bbc6c68e28c}\NoExplorer = "1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{9303365d-31fc-4ab9-a677-7bbc6c68e28c} regsvr32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol e70c1a53008357fab3e236ff47f570cda3ee289199a72b799ab1ad3cb1044680.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI e70c1a53008357fab3e236ff47f570cda3ee289199a72b799ab1ad3cb1044680.exe File opened for modification C:\Windows\System32\GroupPolicy e70c1a53008357fab3e236ff47f570cda3ee289199a72b799ab1ad3cb1044680.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini e70c1a53008357fab3e236ff47f570cda3ee289199a72b799ab1ad3cb1044680.exe -
Drops file in Program Files directory 23 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\TrustMediaViewerV1\TrustMediaViewerV1alpha5885\ff\chrome\content\icons\Thumbs.db e70c1a53008357fab3e236ff47f570cda3ee289199a72b799ab1ad3cb1044680.exe File opened for modification C:\Program Files (x86)\TrustMediaViewerV1\TrustMediaViewerV1alpha5885\ff\chrome\content\icons\default e70c1a53008357fab3e236ff47f570cda3ee289199a72b799ab1ad3cb1044680.exe File created C:\Program Files (x86)\TrustMediaViewerV1\TrustMediaViewerV1alpha5885\ff\chrome.manifest e70c1a53008357fab3e236ff47f570cda3ee289199a72b799ab1ad3cb1044680.exe File created C:\Program Files (x86)\TrustMediaViewerV1\TrustMediaViewerV1alpha5885\ff\chrome\content\ffTrustMediaViewerV1alpha5885.js e70c1a53008357fab3e236ff47f570cda3ee289199a72b799ab1ad3cb1044680.exe File opened for modification C:\Program Files (x86)\TrustMediaViewerV1\TrustMediaViewerV1alpha5885\ff\chrome\content\icons e70c1a53008357fab3e236ff47f570cda3ee289199a72b799ab1ad3cb1044680.exe File created C:\Program Files (x86)\TrustMediaViewerV1\TrustMediaViewerV1alpha5885\ff\chrome\content\icons\Thumbs.db e70c1a53008357fab3e236ff47f570cda3ee289199a72b799ab1ad3cb1044680.exe File created C:\Program Files (x86)\TrustMediaViewerV1\TrustMediaViewerV1alpha5885\ff\chrome\content\icons\default\TrustMediaViewerV1alpha5885_32.png e70c1a53008357fab3e236ff47f570cda3ee289199a72b799ab1ad3cb1044680.exe File created C:\Program Files (x86)\TrustMediaViewerV1\TrustMediaViewerV1alpha5885\ie\TrustMediaViewerV1alpha5885.dll e70c1a53008357fab3e236ff47f570cda3ee289199a72b799ab1ad3cb1044680.exe File opened for modification C:\Program Files (x86)\TrustMediaViewerV1\TrustMediaViewerV1alpha5885\ff\install.rdf e70c1a53008357fab3e236ff47f570cda3ee289199a72b799ab1ad3cb1044680.exe File opened for modification C:\Program Files (x86)\TrustMediaViewerV1\TrustMediaViewerV1alpha5885\ff\chrome\content\ffTrustMediaViewerV1alpha5885ffaction.js e70c1a53008357fab3e236ff47f570cda3ee289199a72b799ab1ad3cb1044680.exe File opened for modification C:\Program Files (x86)\TrustMediaViewerV1\TrustMediaViewerV1alpha5885\ff\chrome\content\overlay.xul e70c1a53008357fab3e236ff47f570cda3ee289199a72b799ab1ad3cb1044680.exe File created C:\Program Files (x86)\TrustMediaViewerV1\TrustMediaViewerV1alpha5885\uninstall.exe e70c1a53008357fab3e236ff47f570cda3ee289199a72b799ab1ad3cb1044680.exe File created C:\Program Files (x86)\TrustMediaViewerV1\TrustMediaViewerV1alpha5885\ie\TrustMediaViewerV1alpha5885x64.dll e70c1a53008357fab3e236ff47f570cda3ee289199a72b799ab1ad3cb1044680.exe File opened for modification C:\Program Files (x86)\TrustMediaViewerV1\TrustMediaViewerV1alpha5885\ff\chrome.manifest e70c1a53008357fab3e236ff47f570cda3ee289199a72b799ab1ad3cb1044680.exe File created C:\Program Files (x86)\TrustMediaViewerV1\TrustMediaViewerV1alpha5885\ff\install.rdf e70c1a53008357fab3e236ff47f570cda3ee289199a72b799ab1ad3cb1044680.exe File opened for modification C:\Program Files (x86)\TrustMediaViewerV1\TrustMediaViewerV1alpha5885\ff\chrome\content e70c1a53008357fab3e236ff47f570cda3ee289199a72b799ab1ad3cb1044680.exe File created C:\Program Files (x86)\TrustMediaViewerV1\TrustMediaViewerV1alpha5885\ff\chrome\content\ffTrustMediaViewerV1alpha5885ffaction.js e70c1a53008357fab3e236ff47f570cda3ee289199a72b799ab1ad3cb1044680.exe File created C:\Program Files (x86)\TrustMediaViewerV1\TrustMediaViewerV1alpha5885\ff\chrome\content\overlay.xul e70c1a53008357fab3e236ff47f570cda3ee289199a72b799ab1ad3cb1044680.exe File opened for modification C:\Program Files (x86)\TrustMediaViewerV1\TrustMediaViewerV1alpha5885\ff\chrome\content\icons\default\TrustMediaViewerV1alpha5885_32.png e70c1a53008357fab3e236ff47f570cda3ee289199a72b799ab1ad3cb1044680.exe File created C:\Program Files (x86)\TrustMediaViewerV1\TrustMediaViewerV1alpha5885\ch\TrustMediaViewerV1alpha5885.crx e70c1a53008357fab3e236ff47f570cda3ee289199a72b799ab1ad3cb1044680.exe File opened for modification C:\Program Files (x86)\TrustMediaViewerV1\TrustMediaViewerV1alpha5885\ch\TrustMediaViewerV1alpha5885.crx e70c1a53008357fab3e236ff47f570cda3ee289199a72b799ab1ad3cb1044680.exe File opened for modification C:\Program Files (x86)\TrustMediaViewerV1\TrustMediaViewerV1alpha5885\ff\chrome e70c1a53008357fab3e236ff47f570cda3ee289199a72b799ab1ad3cb1044680.exe File opened for modification C:\Program Files (x86)\TrustMediaViewerV1\TrustMediaViewerV1alpha5885\ff\chrome\content\ffTrustMediaViewerV1alpha5885.js e70c1a53008357fab3e236ff47f570cda3ee289199a72b799ab1ad3cb1044680.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Approved Extensions e70c1a53008357fab3e236ff47f570cda3ee289199a72b799ab1ad3cb1044680.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Approved Extensions\{9303365d-31fc-4ab9-a677-7bbc6c68e28c} = 51667a6c4c1d3b1b4d2a1788c26bd104bf7c38fc682ba697 e70c1a53008357fab3e236ff47f570cda3ee289199a72b799ab1ad3cb1044680.exe -
Modifies registry class 56 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9303365d-31fc-4ab9-a677-7bbc6c68e28c}\TypeLib\ = "{71b78e4f-e9db-4475-ae1a-ec62432a0f06}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9303365d-31fc-4ab9-a677-7bbc6c68e28c}\Implemented Categories\{59fb2056-d625-48d0-a944-1a85b5ab2640}\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9303365d-31fc-4ab9-a677-7bbc6c68e28c}\ = "TrustMediaViewerV1alpha5885" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{83A932AA-78BA-4A43-ABDC-0A08B81F8520}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{83A932AA-78BA-4A43-ABDC-0A08B81F8520}\ = "ITrustMediaViewerV1alpha5885BHO" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9303365d-31fc-4ab9-a677-7bbc6c68e28c}\Implemented Categories\{59fb2056-d625-48d0-a944-1a85b5ab2640} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9303365d-31fc-4ab9-a677-7bbc6c68e28c}\Implemented Categories regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{83A932AA-78BA-4A43-ABDC-0A08B81F8520}\TypeLib\Version = "1.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{83A932AA-78BA-4A43-ABDC-0A08B81F8520} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{83A932AA-78BA-4A43-ABDC-0A08B81F8520}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9303365d-31fc-4ab9-a677-7bbc6c68e28c}\InprocServer32\ = "C:\\Program Files (x86)\\TrustMediaViewerV1\\TrustMediaViewerV1alpha5885\\ie\\TrustMediaViewerV1alpha5885.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9303365d-31fc-4ab9-a677-7bbc6c68e28c}\Implemented Categories\{59fb2056-d625-48d0-a944-1a85b5ab2640} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{71B78E4F-E9DB-4475-AE1A-EC62432A0F06}\1.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{71B78E4F-E9DB-4475-AE1A-EC62432A0F06}\1.1\FLAGS\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{83A932AA-78BA-4A43-ABDC-0A08B81F8520}\TypeLib\ = "{71B78E4F-E9DB-4475-AE1A-EC62432A0F06}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9303365d-31fc-4ab9-a677-7bbc6c68e28c}\Implemented Categories\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9303365d-31fc-4ab9-a677-7bbc6c68e28c}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{71B78E4F-E9DB-4475-AE1A-EC62432A0F06}\1.1\HELPDIR\ = "C:\\Program Files (x86)\\TrustMediaViewerV1\\TrustMediaViewerV1alpha5885\\ie" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{83A932AA-78BA-4A43-ABDC-0A08B81F8520}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{83A932AA-78BA-4A43-ABDC-0A08B81F8520}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9303365d-31fc-4ab9-a677-7bbc6c68e28c} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9303365d-31fc-4ab9-a677-7bbc6c68e28c}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9303365d-31fc-4ab9-a677-7bbc6c68e28c} e70c1a53008357fab3e236ff47f570cda3ee289199a72b799ab1ad3cb1044680.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9303365d-31fc-4ab9-a677-7bbc6c68e28c}\Version\ = "1.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9303365d-31fc-4ab9-a677-7bbc6c68e28c}\Implemented Categories\{59fb2056-d625-48d0-a944-1a85b5ab2640}\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9303365d-31fc-4ab9-a677-7bbc6c68e28c}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{83A932AA-78BA-4A43-ABDC-0A08B81F8520}\TypeLib\Version = "1.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9303365d-31fc-4ab9-a677-7bbc6c68e28c}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9303365d-31fc-4ab9-a677-7bbc6c68e28c}\Implemented Categories regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9303365d-31fc-4ab9-a677-7bbc6c68e28c} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9303365d-31fc-4ab9-a677-7bbc6c68e28c}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{71B78E4F-E9DB-4475-AE1A-EC62432A0F06}\1.1\0\win32\ = "C:\\Program Files (x86)\\TrustMediaViewerV1\\TrustMediaViewerV1alpha5885\\ie\\TrustMediaViewerV1alpha5885.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{83A932AA-78BA-4A43-ABDC-0A08B81F8520}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{83A932AA-78BA-4A43-ABDC-0A08B81F8520}\TypeLib\ = "{71B78E4F-E9DB-4475-AE1A-EC62432A0F06}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9303365d-31fc-4ab9-a677-7bbc6c68e28c}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{71B78E4F-E9DB-4475-AE1A-EC62432A0F06}\1.1\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9303365d-31fc-4ab9-a677-7bbc6c68e28c}\TypeLib\ = "{71b78e4f-e9db-4475-ae1a-ec62432a0f06}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{71B78E4F-E9DB-4475-AE1A-EC62432A0F06} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{83A932AA-78BA-4A43-ABDC-0A08B81F8520}\ = "ITrustMediaViewerV1alpha5885BHO" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9303365d-31fc-4ab9-a677-7bbc6c68e28c}\Version regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{71B78E4F-E9DB-4475-AE1A-EC62432A0F06}\1.1\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{71B78E4F-E9DB-4475-AE1A-EC62432A0F06}\1.1\0\win64\ = "C:\\Program Files (x86)\\TrustMediaViewerV1\\TrustMediaViewerV1alpha5885\\ie\\TrustMediaViewerV1alpha5885x64.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{71B78E4F-E9DB-4475-AE1A-EC62432A0F06}\1.1\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{83A932AA-78BA-4A43-ABDC-0A08B81F8520}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9303365d-31fc-4ab9-a677-7bbc6c68e28c}\ = "Trust Media Viewer" e70c1a53008357fab3e236ff47f570cda3ee289199a72b799ab1ad3cb1044680.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{83A932AA-78BA-4A43-ABDC-0A08B81F8520} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9303365d-31fc-4ab9-a677-7bbc6c68e28c}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9303365d-31fc-4ab9-a677-7bbc6c68e28c}\InprocServer32\ = "C:\\Program Files (x86)\\TrustMediaViewerV1\\TrustMediaViewerV1alpha5885\\ie\\TrustMediaViewerV1alpha5885x64.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9303365d-31fc-4ab9-a677-7bbc6c68e28c}\Version regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{71B78E4F-E9DB-4475-AE1A-EC62432A0F06}\1.1\ = "TrustMediaViewerV1alpha5885Lib" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9303365d-31fc-4ab9-a677-7bbc6c68e28c}\ = "TrustMediaViewerV1alpha5885" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9303365d-31fc-4ab9-a677-7bbc6c68e28c}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9303365d-31fc-4ab9-a677-7bbc6c68e28c}\Version\ = "1.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9303365d-31fc-4ab9-a677-7bbc6c68e28c}\Implemented Categories\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{71B78E4F-E9DB-4475-AE1A-EC62432A0F06}\1.1\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{71B78E4F-E9DB-4475-AE1A-EC62432A0F06}\1.1\0\win64 regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4856 e70c1a53008357fab3e236ff47f570cda3ee289199a72b799ab1ad3cb1044680.exe 4856 e70c1a53008357fab3e236ff47f570cda3ee289199a72b799ab1ad3cb1044680.exe 4856 e70c1a53008357fab3e236ff47f570cda3ee289199a72b799ab1ad3cb1044680.exe 4856 e70c1a53008357fab3e236ff47f570cda3ee289199a72b799ab1ad3cb1044680.exe 4856 e70c1a53008357fab3e236ff47f570cda3ee289199a72b799ab1ad3cb1044680.exe 4856 e70c1a53008357fab3e236ff47f570cda3ee289199a72b799ab1ad3cb1044680.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4856 wrote to memory of 1408 4856 e70c1a53008357fab3e236ff47f570cda3ee289199a72b799ab1ad3cb1044680.exe 79 PID 4856 wrote to memory of 1408 4856 e70c1a53008357fab3e236ff47f570cda3ee289199a72b799ab1ad3cb1044680.exe 79 PID 4856 wrote to memory of 1408 4856 e70c1a53008357fab3e236ff47f570cda3ee289199a72b799ab1ad3cb1044680.exe 79 PID 4856 wrote to memory of 1292 4856 e70c1a53008357fab3e236ff47f570cda3ee289199a72b799ab1ad3cb1044680.exe 80 PID 4856 wrote to memory of 1292 4856 e70c1a53008357fab3e236ff47f570cda3ee289199a72b799ab1ad3cb1044680.exe 80 PID 4856 wrote to memory of 1292 4856 e70c1a53008357fab3e236ff47f570cda3ee289199a72b799ab1ad3cb1044680.exe 80 PID 1292 wrote to memory of 4424 1292 regsvr32.exe 81 PID 1292 wrote to memory of 4424 1292 regsvr32.exe 81 PID 4856 wrote to memory of 2348 4856 e70c1a53008357fab3e236ff47f570cda3ee289199a72b799ab1ad3cb1044680.exe 84 PID 4856 wrote to memory of 2348 4856 e70c1a53008357fab3e236ff47f570cda3ee289199a72b799ab1ad3cb1044680.exe 84 PID 4856 wrote to memory of 2348 4856 e70c1a53008357fab3e236ff47f570cda3ee289199a72b799ab1ad3cb1044680.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\e70c1a53008357fab3e236ff47f570cda3ee289199a72b799ab1ad3cb1044680.exe"C:\Users\Admin\AppData\Local\Temp\e70c1a53008357fab3e236ff47f570cda3ee289199a72b799ab1ad3cb1044680.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 "C:\Program Files (x86)\TrustMediaViewerV1\TrustMediaViewerV1alpha5885\ie\TrustMediaViewerV1alpha5885.dll" /s2⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:1408
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Program Files (x86)\TrustMediaViewerV1\TrustMediaViewerV1alpha5885\ie\TrustMediaViewerV1alpha5885x64.dll"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\TrustMediaViewerV1\TrustMediaViewerV1alpha5885\ie\TrustMediaViewerV1alpha5885x64.dll"3⤵
- Registers COM server for autorun
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:4424
-
-
-
C:\Windows\SysWOW64\gpupdate.exe"C:\Windows\System32\gpupdate.exe" /force2⤵PID:2348
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:4848
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:4824
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\TrustMediaViewerV1\TrustMediaViewerV1alpha5885\ie\TrustMediaViewerV1alpha5885.dll
Filesize85KB
MD54240ea02a10d0f19f3686279f9dd2d94
SHA1f848db8db3c4b9a83a39d59f6d7c785c0586ecd3
SHA256f7fd0d47777dfca9ec2071579a61bcb001c5cfd850405b06f133866cfd302581
SHA5129b93ed81088e13d7c79e174d429c6270b6d51c96f69d13d3e851e091f9fa515632d9f16a52dc1c63bb51bd6f932527d60a659625670a3128d69974eb1bd4642a
-
C:\Program Files (x86)\TrustMediaViewerV1\TrustMediaViewerV1alpha5885\ie\TrustMediaViewerV1alpha5885.dll
Filesize85KB
MD54240ea02a10d0f19f3686279f9dd2d94
SHA1f848db8db3c4b9a83a39d59f6d7c785c0586ecd3
SHA256f7fd0d47777dfca9ec2071579a61bcb001c5cfd850405b06f133866cfd302581
SHA5129b93ed81088e13d7c79e174d429c6270b6d51c96f69d13d3e851e091f9fa515632d9f16a52dc1c63bb51bd6f932527d60a659625670a3128d69974eb1bd4642a
-
C:\Program Files (x86)\TrustMediaViewerV1\TrustMediaViewerV1alpha5885\ie\TrustMediaViewerV1alpha5885x64.dll
Filesize100KB
MD5f04bea75fe81dff9f6d69703f4f9fa8f
SHA18c6a6b4f1446107582a03253a5106f6997d46ca0
SHA256d32013e0cc17a144878a096b0e2d815d3c9d297015bd85fab40b68e2c8f68a01
SHA51260e0df5031fed97326e1d1565f42c0d3a2ccfd419731385e539069c5cacf4ffad41d9f5c98b710e06cd0a165a0c7baf513ded7dba4a56de726b3a1a6957c5ee6
-
C:\Program Files (x86)\TrustMediaViewerV1\TrustMediaViewerV1alpha5885\ie\TrustMediaViewerV1alpha5885x64.dll
Filesize100KB
MD5f04bea75fe81dff9f6d69703f4f9fa8f
SHA18c6a6b4f1446107582a03253a5106f6997d46ca0
SHA256d32013e0cc17a144878a096b0e2d815d3c9d297015bd85fab40b68e2c8f68a01
SHA51260e0df5031fed97326e1d1565f42c0d3a2ccfd419731385e539069c5cacf4ffad41d9f5c98b710e06cd0a165a0c7baf513ded7dba4a56de726b3a1a6957c5ee6
-
C:\Program Files (x86)\TrustMediaViewerV1\TrustMediaViewerV1alpha5885\ie\TrustMediaViewerV1alpha5885x64.dll
Filesize100KB
MD5f04bea75fe81dff9f6d69703f4f9fa8f
SHA18c6a6b4f1446107582a03253a5106f6997d46ca0
SHA256d32013e0cc17a144878a096b0e2d815d3c9d297015bd85fab40b68e2c8f68a01
SHA51260e0df5031fed97326e1d1565f42c0d3a2ccfd419731385e539069c5cacf4ffad41d9f5c98b710e06cd0a165a0c7baf513ded7dba4a56de726b3a1a6957c5ee6
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
567KB
MD5f346047b13f37f79c462e59a6319faa1
SHA1ce9e7cb9719000a69b463fe024c81229e322279f
SHA256e78e0e61707cabec8383f1e74da9db8e0fa123a3a7b36f0080d70fbaed6f7453
SHA512429209cc489ba9ac2d62055b128efb3cded3e31f966c7cdb1aee592ec7a54ab090526705fa2519498d92eb4bc2efa141cd83adc6c251b793388ad1208b172167