Analysis
-
max time kernel
30s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 17:28
Behavioral task
behavioral1
Sample
867a1d49b49cb6f3a7435ec0d25b51b09d05e86f00e9334d5787a99a7303dbcc.dll
Resource
win7-20221111-en
3 signatures
150 seconds
General
-
Target
867a1d49b49cb6f3a7435ec0d25b51b09d05e86f00e9334d5787a99a7303dbcc.dll
-
Size
424KB
-
MD5
72a6bda26cf11f35461a4c2f2f272da6
-
SHA1
b480d256b6b72077112cbcbd263d70adee166e75
-
SHA256
867a1d49b49cb6f3a7435ec0d25b51b09d05e86f00e9334d5787a99a7303dbcc
-
SHA512
0c33e49502d1a1e6429a7be3eabe4c5a19636368d65085705aeb9de3b8ed63ae72b7c0abe71fe4242fbfc2599bb71cf81d5d893b1c36ce690a233c10c7ac969f
-
SSDEEP
12288:ZDeemMqlgSCVuq6xGJOpqMNnVqs6PT214:Me7pHZ0GkpHNYhk4
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{E14BC640-4070-47C6-94E4-24E70D1A1800} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{E14BC640-4070-47C6-94E4-24E70D1A1800}\NoExplorer = "\"\"" regsvr32.exe -
Modifies registry class 46 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{5BDE9EEA-C375-4672-9EFB-493DA9E57B0A}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5BDE9EEA-C375-4672-9EFB-493DA9E57B0A}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\adzgalore.optimizer\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E14BC640-4070-47C6-94E4-24E70D1A1800}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E14BC640-4070-47C6-94E4-24E70D1A1800}\TypeLib\ = "{184EDB27-8591-465B-9EBB-4F64129A381C}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{184EDB27-8591-465B-9EBB-4F64129A381C}\1.0\FLAGS\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{5BDE9EEA-C375-4672-9EFB-493DA9E57B0A}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5BDE9EEA-C375-4672-9EFB-493DA9E57B0A}\TypeLib\ = "{184EDB27-8591-465B-9EBB-4F64129A381C}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\adzgalore.optimizer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E14BC640-4070-47C6-94E4-24E70D1A1800}\VersionIndependentProgID\ = "adzgalore.optimizer" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E14BC640-4070-47C6-94E4-24E70D1A1800}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\867a1d49b49cb6f3a7435ec0d25b51b09d05e86f00e9334d5787a99a7303dbcc.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{184EDB27-8591-465B-9EBB-4F64129A381C}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{5BDE9EEA-C375-4672-9EFB-493DA9E57B0A}\TypeLib\ = "{184EDB27-8591-465B-9EBB-4F64129A381C}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\adzgalore.optimizer\CurVer\ = "adzgalore.optimizer.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E14BC640-4070-47C6-94E4-24E70D1A1800}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E14BC640-4070-47C6-94E4-24E70D1A1800}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E14BC640-4070-47C6-94E4-24E70D1A1800}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{184EDB27-8591-465B-9EBB-4F64129A381C}\1.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{5BDE9EEA-C375-4672-9EFB-493DA9E57B0A}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5BDE9EEA-C375-4672-9EFB-493DA9E57B0A}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\adzgalore.optimizer.1\ = "adzgalore" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\adzgalore.optimizer.1\CLSID\ = "{E14BC640-4070-47C6-94E4-24E70D1A1800}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{5BDE9EEA-C375-4672-9EFB-493DA9E57B0A}\ = "ILefty" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5BDE9EEA-C375-4672-9EFB-493DA9E57B0A}\ = "ILefty" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5BDE9EEA-C375-4672-9EFB-493DA9E57B0A}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E14BC640-4070-47C6-94E4-24E70D1A1800}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{184EDB27-8591-465B-9EBB-4F64129A381C}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E14BC640-4070-47C6-94E4-24E70D1A1800}\ = "adzgalore" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E14BC640-4070-47C6-94E4-24E70D1A1800}\ProgID\ = "adzgalore.optimizer.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{184EDB27-8591-465B-9EBB-4F64129A381C} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{184EDB27-8591-465B-9EBB-4F64129A381C}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{184EDB27-8591-465B-9EBB-4F64129A381C}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{184EDB27-8591-465B-9EBB-4F64129A381C}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\adzgalore.optimizer\ = "adzgalore" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\adzgalore.optimizer\CLSID\ = "{E14BC640-4070-47C6-94E4-24E70D1A1800}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5BDE9EEA-C375-4672-9EFB-493DA9E57B0A} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5BDE9EEA-C375-4672-9EFB-493DA9E57B0A}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{184EDB27-8591-465B-9EBB-4F64129A381C}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\867a1d49b49cb6f3a7435ec0d25b51b09d05e86f00e9334d5787a99a7303dbcc.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\adzgalore.optimizer.1\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{184EDB27-8591-465B-9EBB-4F64129A381C}\1.0\ = "FOTOMOTOLib" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E14BC640-4070-47C6-94E4-24E70D1A1800} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E14BC640-4070-47C6-94E4-24E70D1A1800}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{5BDE9EEA-C375-4672-9EFB-493DA9E57B0A} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{5BDE9EEA-C375-4672-9EFB-493DA9E57B0A}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\adzgalore.optimizer.1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\adzgalore.optimizer\CurVer regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1128 wrote to memory of 828 1128 regsvr32.exe 28 PID 1128 wrote to memory of 828 1128 regsvr32.exe 28 PID 1128 wrote to memory of 828 1128 regsvr32.exe 28 PID 1128 wrote to memory of 828 1128 regsvr32.exe 28 PID 1128 wrote to memory of 828 1128 regsvr32.exe 28 PID 1128 wrote to memory of 828 1128 regsvr32.exe 28 PID 1128 wrote to memory of 828 1128 regsvr32.exe 28
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\867a1d49b49cb6f3a7435ec0d25b51b09d05e86f00e9334d5787a99a7303dbcc.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\867a1d49b49cb6f3a7435ec0d25b51b09d05e86f00e9334d5787a99a7303dbcc.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:828
-