Analysis
-
max time kernel
134s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 20:08
Static task
static1
Behavioral task
behavioral1
Sample
7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe
Resource
win10v2004-20220812-en
General
-
Target
7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe
-
Size
4.8MB
-
MD5
56c9d8c19834e72c22912d4605c0a94d
-
SHA1
69f90506f9658867800fe159b0aa5723ccd57326
-
SHA256
7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8
-
SHA512
0ff080770aadc32a7c8fd9a1d0de81ac489de379ff174f464851e4ae92bcad60b35db1fb9e11af3eab86839cef4af22e0c41dd91494b4806488755657018c252
-
SSDEEP
49152:+HE2e4xYhsbm61Lcdpu/QnjNGzK5SynTVMgQZHEPEQW/ZVG2nnjEo4flgKCFJRI:+kz4CcLNYJ1SynTVMgQZHhvGGE5
Malware Config
Signatures
-
Registers COM server for autorun 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{b51b4d6a-79c0-4686-94b2-fecf1c66a14b}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{b51b4d6a-79c0-4686-94b2-fecf1c66a14b}\InprocServer32\ = "C:\\Program Files (x86)\\SmartOnes\\cZAEejhKamz2HW.x64.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{b51b4d6a-79c0-4686-94b2-fecf1c66a14b}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{b51b4d6a-79c0-4686-94b2-fecf1c66a14b}\InprocServer32 regsvr32.exe -
Loads dropped DLL 3 IoCs
pid Process 1752 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe 2636 regsvr32.exe 4232 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 5 IoCs
description ioc Process File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\fikpgihkkjefhmnldplbhihjlannfbhb\4.0\manifest.json 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe File created C:\Users\WDAGUtilityAccount\AppData\Local\Google\Chrome\User Data\Default\Extensions\fikpgihkkjefhmnldplbhihjlannfbhb\4.0\manifest.json 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\fikpgihkkjefhmnldplbhihjlannfbhb\4.0\manifest.json 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\fikpgihkkjefhmnldplbhihjlannfbhb\4.0\manifest.json 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe File created C:\Users\DefaultAccount\AppData\Local\Google\Chrome\User Data\Default\Extensions\fikpgihkkjefhmnldplbhihjlannfbhb\4.0\manifest.json 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe -
Installs/modifies Browser Helper Object 2 TTPs 8 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{b51b4d6a-79c0-4686-94b2-fecf1c66a14b}\NoExplorer = "1" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{b51b4d6a-79c0-4686-94b2-fecf1c66a14b} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{b51b4d6a-79c0-4686-94b2-fecf1c66a14b} 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{b51b4d6a-79c0-4686-94b2-fecf1c66a14b}\ = "SmartOnes" 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{b51b4d6a-79c0-4686-94b2-fecf1c66a14b}\NoExplorer = "1" 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{b51b4d6a-79c0-4686-94b2-fecf1c66a14b} 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{b51b4d6a-79c0-4686-94b2-fecf1c66a14b} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{b51b4d6a-79c0-4686-94b2-fecf1c66a14b}\ = "SmartOnes" regsvr32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\GroupPolicy 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\SmartOnes\cZAEejhKamz2HW.dll 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe File created C:\Program Files (x86)\SmartOnes\cZAEejhKamz2HW.tlb 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe File opened for modification C:\Program Files (x86)\SmartOnes\cZAEejhKamz2HW.tlb 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe File created C:\Program Files (x86)\SmartOnes\cZAEejhKamz2HW.dat 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe File opened for modification C:\Program Files (x86)\SmartOnes\cZAEejhKamz2HW.dat 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe File created C:\Program Files (x86)\SmartOnes\cZAEejhKamz2HW.x64.dll 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe File opened for modification C:\Program Files (x86)\SmartOnes\cZAEejhKamz2HW.x64.dll 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe File created C:\Program Files (x86)\SmartOnes\cZAEejhKamz2HW.dll 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{b51b4d6a-79c0-4686-94b2-fecf1c66a14b} regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{b51b4d6a-79c0-4686-94b2-fecf1c66a14b} 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Key deleted \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\APPROVEDEXTENSIONSMIGRATION\{B51B4D6A-79C0-4686-94B2-FECF1C66A14B} 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Key deleted \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Key deleted \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\APPROVEDEXTENSIONSMIGRATION\{B51B4D6A-79C0-4686-94B2-FECF1C66A14B} regsvr32.exe Key deleted \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration regsvr32.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0} 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\..9\CLSID\ = "{b51b4d6a-79c0-4686-94b2-fecf1c66a14b}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{b51b4d6a-79c0-4686-94b2-fecf1c66a14b}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{b51b4d6a-79c0-4686-94b2-fecf1c66a14b}\InprocServer32 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{b51b4d6a-79c0-4686-94b2-fecf1c66a14b}\InprocServer32\ = "C:\\Program Files (x86)\\SmartOnes\\cZAEejhKamz2HW.dll" 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{b51b4d6a-79c0-4686-94b2-fecf1c66a14b}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ = "IRegistry" 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ProxyStubClsid32 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\..9\ = "SmartOnes" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{b51b4d6a-79c0-4686-94b2-fecf1c66a14b}\InprocServer32 regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{b51b4d6a-79c0-4686-94b2-fecf1c66a14b}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B51B4D6A-79C0-4686-94B2-FECF1C66A14B}\Implemented Categories 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32\ = "C:\\Program Files (x86)\\SmartOnes\\cZAEejhKamz2HW.tlb" 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{b51b4d6a-79c0-4686-94b2-fecf1c66a14b}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ProxyStubClsid32 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\ProxyStubClsid32 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib\Version = "1.0" 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{b51b4d6a-79c0-4686-94b2-fecf1c66a14b}\ProgID 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS\ = "0" 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{b51b4d6a-79c0-4686-94b2-fecf1c66a14b}\InprocServer32 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{b51b4d6a-79c0-4686-94b2-fecf1c66a14b}\ProgID 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\ = "ILocalStorage" 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\..9 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{b51b4d6a-79c0-4686-94b2-fecf1c66a14b} 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{b51b4d6a-79c0-4686-94b2-fecf1c66a14b}\ = "SmartOnes" 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib\Version = "1.0" 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib\Version = "1.0" 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.\CurVer\ = ".9" 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ProxyStubClsid32 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\ = "IPlaghinMein" 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\ = "ILocalStorage" 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7041156A-0D2B-4DCD-A8EE-D0608BFCB2D0}\TypeLib 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ = "IRegistry" 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{b51b4d6a-79c0-4686-94b2-fecf1c66a14b} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.\ = "SmartOnes" 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{b51b4d6a-79c0-4686-94b2-fecf1c66a14b} 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.\CLSID\ = "{b51b4d6a-79c0-4686-94b2-fecf1c66a14b}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{b51b4d6a-79c0-4686-94b2-fecf1c66a14b}\ = "SmartOnes" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{b51b4d6a-79c0-4686-94b2-fecf1c66a14b}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{b51b4d6a-79c0-4686-94b2-fecf1c66a14b}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\..9\ = "SmartOnes" 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{b51b4d6a-79c0-4686-94b2-fecf1c66a14b}\VersionIndependentProgID 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9B41579A-1996-42F9-8F84-7B7786818CEF}\TypeLib\Version = "1.0" 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC} 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{b51b4d6a-79c0-4686-94b2-fecf1c66a14b}\ProgID\ = ".9" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{b51b4d6a-79c0-4686-94b2-fecf1c66a14b}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B51B4D6A-79C0-4686-94B2-FECF1C66A14B}\Implemented Categories regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.\CLSID 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{b51b4d6a-79c0-4686-94b2-fecf1c66a14b}\VersionIndependentProgID 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1752 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe 1752 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe 1752 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe 1752 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe 1752 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe 1752 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe 1752 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe 1752 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe 1752 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe 1752 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe 1752 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe 1752 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe 1752 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe 1752 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe 1752 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe 1752 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe 1752 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe 1752 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe 1752 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe 1752 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1752 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Token: SeDebugPrivilege 1752 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Token: SeDebugPrivilege 1752 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Token: SeDebugPrivilege 1752 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Token: SeDebugPrivilege 1752 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe Token: SeDebugPrivilege 1752 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1752 wrote to memory of 2636 1752 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe 81 PID 1752 wrote to memory of 2636 1752 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe 81 PID 1752 wrote to memory of 2636 1752 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe 81 PID 2636 wrote to memory of 4232 2636 regsvr32.exe 82 PID 2636 wrote to memory of 4232 2636 regsvr32.exe 82 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{b51b4d6a-79c0-4686-94b2-fecf1c66a14b} = "1" 7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe"C:\Users\Admin\AppData\Local\Temp\7550f960aea7eba2fc1a2654e18d6bfe6e9434dbdccd9adb75bea16c0cc8cfe8.exe"1⤵
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1752 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\SmartOnes\cZAEejhKamz2HW.x64.dll"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\SmartOnes\cZAEejhKamz2HW.x64.dll"3⤵
- Registers COM server for autorun
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies Internet Explorer settings
- Modifies registry class
PID:4232
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:5116
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:4504
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5aa8083671da98dc9b77c547321b6c3b4
SHA101e117c98f72c85ad1bb81d288a42b961afd0dc7
SHA256b1e1e05eca9d5f9ca7a979c70ade2b65dfb4d03da501b9bbc99de8b4926be7ec
SHA5123389ffd0c706ed34194b60d2330a3bddaf0989d6015f3cb0be911fed6f206ad2b7e3ef57daa60f2ed80f6eb915b7e2579d24fa36acd2f47ecea4df895ef5b759
-
Filesize
747KB
MD5cbe2eb6d404c744ac667727d74bb0ceb
SHA1cb11134bc9376a6a47016fe09583a49bf314269e
SHA2569801a200612cf4a29a95943fb41f480b1a8a29ab0a86d168dd83d72e10685f5d
SHA512b3ac699dc63d181ae46158f907f67054e0c52045144813284eeb8523ee088cb8ec9d08a3494f8a22032b0790c35736d6ec8a80f377a29bf42c2a9173e52f7ae3
-
Filesize
3KB
MD5f3fa1e536e1bdf324ab61e2abc2c1872
SHA1f11424bc0be229ef235a64fb2b2ea028efdf0612
SHA256491f3107ad4d2f4d1c436b98f96b41d7b1f1cbf9beb34b0706e985f47450e694
SHA5129b8350742e11e179d191e9269f09e4dfba9629f53494095fba84f98ddf7bba21fbb0cf03280405f1bc02ad2559919f74d026ad83a131e3d3ab2c07f546ee4c57
-
Filesize
879KB
MD56e4bca2ab153ee64f562288099da9fae
SHA17f49983b76fbaf390943336bb5980e415ef4335e
SHA2563d965ccaf20c53373ff1de612a51b410a6126e47a8c045a56c33db8820da2c39
SHA512d522e0106a5a96375407957196d998c516a3ad930a47dac233f6dc2eb38408735ce7eb6f1c9625c554f57c856e38609271e5362eb4473e1833611c0916d9cfe4
-
Filesize
879KB
MD56e4bca2ab153ee64f562288099da9fae
SHA17f49983b76fbaf390943336bb5980e415ef4335e
SHA2563d965ccaf20c53373ff1de612a51b410a6126e47a8c045a56c33db8820da2c39
SHA512d522e0106a5a96375407957196d998c516a3ad930a47dac233f6dc2eb38408735ce7eb6f1c9625c554f57c856e38609271e5362eb4473e1833611c0916d9cfe4
-
Filesize
879KB
MD56e4bca2ab153ee64f562288099da9fae
SHA17f49983b76fbaf390943336bb5980e415ef4335e
SHA2563d965ccaf20c53373ff1de612a51b410a6126e47a8c045a56c33db8820da2c39
SHA512d522e0106a5a96375407957196d998c516a3ad930a47dac233f6dc2eb38408735ce7eb6f1c9625c554f57c856e38609271e5362eb4473e1833611c0916d9cfe4