Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 05:20
Static task
static1
Behavioral task
behavioral1
Sample
c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe
Resource
win10v2004-20220812-en
General
-
Target
c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe
-
Size
132KB
-
MD5
3f9d4275b81d0784575d59943b9346d1
-
SHA1
04a47b3c144a86eb6c89d121d7e2712df632c3f1
-
SHA256
c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9
-
SHA512
3318171cad9022c5e7c7124df9df849bbc7ce268afcc491f4e9b78b4bb1e8b2e8d979afc81ae9330fbd10a722d5f83495060a1d03fb240f0c032f1021f13d75e
-
SSDEEP
3072:vpBCRdma8JVU4je3+/xdzMLCBuTmJwR9VaQs5dEEnyAS4:xBw7keIBl6ns5dEmys
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 1956 c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe 1956 c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe 1568 regsvr32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\NaviSearch = "C:\\Program Files (x86)\\NaviSearch\\bin\\nls.exe" c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 6 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{AEECBFDA-12FA-4881-BDCE-8C3E1CE4B344} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{AEECBFDA-12FA-4881-BDCE-8C3E1CE4B344} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{AEECBFDA-12FA-4881-BDCE-8C3E1CE4B344}\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{AEECBFDA-12FA-4881-BDCE-8C3E1CE4B344} c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{AEECBFDA-12FA-4881-BDCE-8C3E1CE4B344}\ c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{AEECBFDA-12FA-4881-BDCE-8C3E1CE4B344} c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\nvms.dll c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe -
Drops file in Program Files directory 9 IoCs
description ioc Process File created C:\Program Files (x86)\NaviSearch\nvms.dll c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe File created C:\Program Files (x86)\NaviSearch\nls.exe c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe File created C:\Program Files (x86)\NaviSearch\ad.dat c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe File created C:\Program Files (x86)\NaviSearch\Uninstall.exe c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe File opened for modification C:\Program Files (x86)\NaviSearch\nvms.dll c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe File opened for modification C:\Program Files (x86)\NaviSearch\nls.exe c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe File opened for modification C:\Program Files (x86)\NaviSearch\ad-nls.dat c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe File created C:\Program Files (x86)\NaviSearch\ad-nls.dat c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe File created C:\Program Files (x86)\NaviSearch\bin\nls.exe c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Use Search Asst = "no" c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Search c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Search\SearchAssistant = "http://www.exactsearch.net/sidesearch" c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\SearchUrl c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\SearchUrl\provider c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4EB7BBE8-2E15-424B-9DDB-2CDB9516C2E3}\1.0\0\win32 c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C6906A23-4717-4E1F-B6FD-F06EBED11357}\TypeLib c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4EB7BBE8-2E15-424B-9DDB-2CDB9516C2E3}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\nvms.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\NLS.UrlCatcher c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AEECBFDA-12FA-4881-BDCE-8C3E1CE4B344}\ProgID\ = "NLS.UrlCatcher.1" c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AEECBFDA-12FA-4881-BDCE-8C3E1CE4B344}\InprocServer32\ = "C:\\Windows\\SysWow64\\nvms.dll" c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4EB7BBE8-2E15-424B-9DDB-2CDB9516C2E3}\1.0\HELPDIR c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C6906A23-4717-4E1F-B6FD-F06EBED11357}\TypeLib\ = "{4EB7BBE8-2E15-424B-9DDB-2CDB9516C2E3}" c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\NLS.UrlCatcher.1\ = "NLS UrlCatcher Class" c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AEECBFDA-12FA-4881-BDCE-8C3E1CE4B344}\Programmable c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4EB7BBE8-2E15-424B-9DDB-2CDB9516C2E3}\1.0\ = "NLS 1.0 Type Library" c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AEECBFDA-12FA-4881-BDCE-8C3E1CE4B344}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AEECBFDA-12FA-4881-BDCE-8C3E1CE4B344}\ = "NLS UrlCatcher Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AEECBFDA-12FA-4881-BDCE-8C3E1CE4B344}\VersionIndependentProgID c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AEECBFDA-12FA-4881-BDCE-8C3E1CE4B344}\InprocServer32\ThreadingModel = "Apartment" c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C6906A23-4717-4E1F-B6FD-F06EBED11357}\TypeLib\Version = "1.0" c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AEECBFDA-12FA-4881-BDCE-8C3E1CE4B344}\VersionIndependentProgID c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\NLS.UrlCatcher\CLSID\ = "{AEECBFDA-12FA-4881-BDCE-8C3E1CE4B344}" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AEECBFDA-12FA-4881-BDCE-8C3E1CE4B344}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AEECBFDA-12FA-4881-BDCE-8C3E1CE4B344} c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C6906A23-4717-4E1F-B6FD-F06EBED11357}\ = "IUrlCatcher" c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C6906A23-4717-4E1F-B6FD-F06EBED11357}\TypeLib\Version = "1.0" c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\NLS.UrlCatcher\ = "NLS UrlCatcher Class" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AEECBFDA-12FA-4881-BDCE-8C3E1CE4B344}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AEECBFDA-12FA-4881-BDCE-8C3E1CE4B344}\VersionIndependentProgID\ = "NLS.UrlCatcher" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8EEE58D5-130E-4CBD-9C83-35A0564E1357}\TypeLib c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AEECBFDA-12FA-4881-BDCE-8C3E1CE4B344}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4EB7BBE8-2E15-424B-9DDB-2CDB9516C2E3}\1.0\HELPDIR\ = "C:\\Windows\\SysWow64\\" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\NLS.UrlCatcher\CLSID\ = "{AEECBFDA-12FA-4881-BDCE-8C3E1CE4B344}" c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8EEE58D5-130E-4CBD-9C83-35A0564E1357}\ = "IXYZ" c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8EEE58D5-130E-4CBD-9C83-35A0564E1357} c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C6906A23-4717-4E1F-B6FD-F06EBED11357}\TypeLib c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C6906A23-4717-4E1F-B6FD-F06EBED11357}\ProxyStubClsid32 c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8EEE58D5-130E-4CBD-9C83-35A0564E1357}\TypeLib\Version = "1.0" c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AEECBFDA-12FA-4881-BDCE-8C3E1CE4B344}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\NLS.UrlCatcher.1\CLSID\ = " {AEECBFDA-12FA-4881-BDCE-8C3E1CE4B344}" c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4EB7BBE8-2E15-424B-9DDB-2CDB9516C2E3}\1.0 c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4EB7BBE8-2E15-424B-9DDB-2CDB9516C2E3}\1.0\FLAGS c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\NLS.UrlCatcher.1\CLSID\ = " {AEECBFDA-12FA-4881-BDCE-8C3E1CE4B344}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AEECBFDA-12FA-4881-BDCE-8C3E1CE4B344} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AEECBFDA-12FA-4881-BDCE-8C3E1CE4B344}\ProgID\ = "NLS.UrlCatcher.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4EB7BBE8-2E15-424B-9DDB-2CDB9516C2E3}\1.0\HELPDIR\ = "C:\\Windows\\SysWow64\\" c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C6906A23-4717-4E1F-B6FD-F06EBED11357}\ProxyStubClsid32 c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8EEE58D5-130E-4CBD-9C83-35A0564E1357}\TypeLib c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\NLS.UrlCatcher\CLSID c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C6906A23-4717-4E1F-B6FD-F06EBED11357}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8EEE58D5-130E-4CBD-9C83-35A0564E1357}\ProxyStubClsid32 c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8EEE58D5-130E-4CBD-9C83-35A0564E1357}\ProxyStubClsid32 c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AEECBFDA-12FA-4881-BDCE-8C3E1CE4B344}\ProgID c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AEECBFDA-12FA-4881-BDCE-8C3E1CE4B344}\InprocServer32\ = "C:\\Windows\\SysWow64\\nvms.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AEECBFDA-12FA-4881-BDCE-8C3E1CE4B344}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C6906A23-4717-4E1F-B6FD-F06EBED11357} c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C6906A23-4717-4E1F-B6FD-F06EBED11357}\TypeLib\ = "{4EB7BBE8-2E15-424B-9DDB-2CDB9516C2E3}" c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8EEE58D5-130E-4CBD-9C83-35A0564E1357}\ = "IXYZ" c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AEECBFDA-12FA-4881-BDCE-8C3E1CE4B344} c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\NLS.UrlCatcher.1\ = "NLS UrlCatcher Class" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AEECBFDA-12FA-4881-BDCE-8C3E1CE4B344} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AEECBFDA-12FA-4881-BDCE-8C3E1CE4B344}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4EB7BBE8-2E15-424B-9DDB-2CDB9516C2E3}\1.0\0 c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C6906A23-4717-4E1F-B6FD-F06EBED11357}\ = "IUrlCatcher" c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8EEE58D5-130E-4CBD-9C83-35A0564E1357} c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AEECBFDA-12FA-4881-BDCE-8C3E1CE4B344}\VersionIndependentProgID\ = "NLS.UrlCatcher" c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AEECBFDA-12FA-4881-BDCE-8C3E1CE4B344}\InprocServer32 c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8EEE58D5-130E-4CBD-9C83-35A0564E1357}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1956 c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe 1956 c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1956 wrote to memory of 1568 1956 c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe 27 PID 1956 wrote to memory of 1568 1956 c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe 27 PID 1956 wrote to memory of 1568 1956 c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe 27 PID 1956 wrote to memory of 1568 1956 c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe 27 PID 1956 wrote to memory of 1568 1956 c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe 27 PID 1956 wrote to memory of 1568 1956 c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe 27 PID 1956 wrote to memory of 1568 1956 c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe"C:\Users\Admin\AppData\Local\Temp\c08829d453e55483dec0e85c750200da984bf678562d144f7014041c43b15eb9.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s C:\Windows\system32\nvms.dll2⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:1568
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5f4eaa09d78b46f943f8b093606866301
SHA187a1a3cbf775501f4285d949c42a3b8b52fa79af
SHA2562e37739c20b29bae5f558a8f5463f7aec6090a97cb5adca6e8b6fb50ba7559de
SHA5127b1720684348dee4b4f3549d8dbbc2272c9cc2f364b26085401c4c861d52f3a820aa99aa2dabd99be1df38797ff2360093ea6fb03e0a62f7821b1416e2f3eb4f
-
Filesize
80KB
MD5f4eaa09d78b46f943f8b093606866301
SHA187a1a3cbf775501f4285d949c42a3b8b52fa79af
SHA2562e37739c20b29bae5f558a8f5463f7aec6090a97cb5adca6e8b6fb50ba7559de
SHA5127b1720684348dee4b4f3549d8dbbc2272c9cc2f364b26085401c4c861d52f3a820aa99aa2dabd99be1df38797ff2360093ea6fb03e0a62f7821b1416e2f3eb4f
-
Filesize
80KB
MD5f4eaa09d78b46f943f8b093606866301
SHA187a1a3cbf775501f4285d949c42a3b8b52fa79af
SHA2562e37739c20b29bae5f558a8f5463f7aec6090a97cb5adca6e8b6fb50ba7559de
SHA5127b1720684348dee4b4f3549d8dbbc2272c9cc2f364b26085401c4c861d52f3a820aa99aa2dabd99be1df38797ff2360093ea6fb03e0a62f7821b1416e2f3eb4f
-
Filesize
80KB
MD5f4eaa09d78b46f943f8b093606866301
SHA187a1a3cbf775501f4285d949c42a3b8b52fa79af
SHA2562e37739c20b29bae5f558a8f5463f7aec6090a97cb5adca6e8b6fb50ba7559de
SHA5127b1720684348dee4b4f3549d8dbbc2272c9cc2f364b26085401c4c861d52f3a820aa99aa2dabd99be1df38797ff2360093ea6fb03e0a62f7821b1416e2f3eb4f