Analysis
-
max time kernel
133s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
02-07-2023 19:20
Static task
static1
Behavioral task
behavioral1
Sample
Malicious_91c9164bfd8c713f4c8fba7e88f8d0aca0b51f717cc7c4691c868f5783088045.dll
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
Malicious_91c9164bfd8c713f4c8fba7e88f8d0aca0b51f717cc7c4691c868f5783088045.dll
Resource
win10v2004-20230621-en
General
-
Target
Malicious_91c9164bfd8c713f4c8fba7e88f8d0aca0b51f717cc7c4691c868f5783088045.dll
-
Size
92KB
-
MD5
f5fb96b6c7470634944e03a4b59199f4
-
SHA1
4860413541639d4ffaab1e533d64ccef62184484
-
SHA256
91c9164bfd8c713f4c8fba7e88f8d0aca0b51f717cc7c4691c868f5783088045
-
SHA512
62bf54b134997016d25f6ffc765b197e84fe7eb8a331ec41076223678b74bae21bfd6835e48b51b5c9599a6288ed66a9b4b22a1ce2bd0a8463fe5523fa47fb03
-
SSDEEP
1536:DONx3L4A01nkldK+gXavCg57J/up+ptdC90:DOX4nnAthd5w+pto
Malware Config
Signatures
-
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ece99fad-4ad5-4bb5-93e5-95e61133fdfb}\ProgID\ = "RetrogamerIE_30.FeedManager.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ece99fad-4ad5-4bb5-93e5-95e61133fdfb}\MiscStatus\1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{79EEFD21-B48B-4D04-BEAA-6721F2A0C5D3}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3DFEE374-4A93-44F5-9F11-27D79C9752C8}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\RetrogamerIE_30.FeedManager.1\CLSID\ = "{ece99fad-4ad5-4bb5-93e5-95e61133fdfb}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ece99fad-4ad5-4bb5-93e5-95e61133fdfb}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{79EEFD21-B48B-4D04-BEAA-6721F2A0C5D3}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Malicious_91c9164bfd8c713f4c8fba7e88f8d0aca0b51f717cc7c4691c868f5783088045.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{04DE2B77-686B-41A1-8DE6-A803A7988818} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ece99fad-4ad5-4bb5-93e5-95e61133fdfb}\MiscStatus\1\ = "131473" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3DFEE374-4A93-44F5-9F11-27D79C9752C8}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{79EEFD21-B48B-4D04-BEAA-6721F2A0C5D3}\1.0\ = "TEMPLATEBARFEEDTYPELib" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{04DE2B77-686B-41A1-8DE6-A803A7988818}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3DFEE374-4A93-44F5-9F11-27D79C9752C8}\TypeLib\ = "{79EEFD21-B48B-4D04-BEAA-6721F2A0C5D3}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3DFEE374-4A93-44F5-9F11-27D79C9752C8}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3DFEE374-4A93-44F5-9F11-27D79C9752C8}\ = "ITemplateBarFeedManager" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3DFEE374-4A93-44F5-9F11-27D79C9752C8}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3DFEE374-4A93-44F5-9F11-27D79C9752C8}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RetrogamerIE_30.FeedManager.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\RetrogamerIE_30.FeedManager.1\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ece99fad-4ad5-4bb5-93e5-95e61133fdfb}\VersionIndependentProgID\ = "RetrogamerIE_30.FeedManager" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{79EEFD21-B48B-4D04-BEAA-6721F2A0C5D3}\1.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{04DE2B77-686B-41A1-8DE6-A803A7988818}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\RetrogamerIE_30.FeedManager\CurVer\ = "RetrogamerIE_30.FeedManager.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ece99fad-4ad5-4bb5-93e5-95e61133fdfb}\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{79EEFD21-B48B-4D04-BEAA-6721F2A0C5D3}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{04DE2B77-686B-41A1-8DE6-A803A7988818}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3DFEE374-4A93-44F5-9F11-27D79C9752C8} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ece99fad-4ad5-4bb5-93e5-95e61133fdfb}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ece99fad-4ad5-4bb5-93e5-95e61133fdfb}\Version regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{04DE2B77-686B-41A1-8DE6-A803A7988818}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{04DE2B77-686B-41A1-8DE6-A803A7988818}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{04DE2B77-686B-41A1-8DE6-A803A7988818} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RetrogamerIE_30.FeedManager regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RetrogamerIE_30.FeedManager\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ece99fad-4ad5-4bb5-93e5-95e61133fdfb}\MiscStatus\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{04DE2B77-686B-41A1-8DE6-A803A7988818}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3DFEE374-4A93-44F5-9F11-27D79C9752C8}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ece99fad-4ad5-4bb5-93e5-95e61133fdfb} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ece99fad-4ad5-4bb5-93e5-95e61133fdfb}\Control regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{79EEFD21-B48B-4D04-BEAA-6721F2A0C5D3}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3DFEE374-4A93-44F5-9F11-27D79C9752C8} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3DFEE374-4A93-44F5-9F11-27D79C9752C8}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\RetrogamerIE_30.FeedManager\CLSID\ = "{ece99fad-4ad5-4bb5-93e5-95e61133fdfb}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3DFEE374-4A93-44F5-9F11-27D79C9752C8}\TypeLib\ = "{79EEFD21-B48B-4D04-BEAA-6721F2A0C5D3}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RetrogamerIE_30.FeedManager.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ece99fad-4ad5-4bb5-93e5-95e61133fdfb}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ece99fad-4ad5-4bb5-93e5-95e61133fdfb}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Malicious_91c9164bfd8c713f4c8fba7e88f8d0aca0b51f717cc7c4691c868f5783088045.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{04DE2B77-686B-41A1-8DE6-A803A7988818}\TypeLib\ = "{79EEFD21-B48B-4D04-BEAA-6721F2A0C5D3}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{04DE2B77-686B-41A1-8DE6-A803A7988818}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\RetrogamerIE_30.FeedManager\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ece99fad-4ad5-4bb5-93e5-95e61133fdfb}\Version\ = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{79EEFD21-B48B-4D04-BEAA-6721F2A0C5D3}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ece99fad-4ad5-4bb5-93e5-95e61133fdfb}\MiscStatus regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ece99fad-4ad5-4bb5-93e5-95e61133fdfb}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{79EEFD21-B48B-4D04-BEAA-6721F2A0C5D3}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{04DE2B77-686B-41A1-8DE6-A803A7988818}\ = "ITemplateBarFeed" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3DFEE374-4A93-44F5-9F11-27D79C9752C8}\ = "ITemplateBarFeedManager" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ece99fad-4ad5-4bb5-93e5-95e61133fdfb}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ece99fad-4ad5-4bb5-93e5-95e61133fdfb}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ece99fad-4ad5-4bb5-93e5-95e61133fdfb}\TypeLib\ = "{79eefd21-b48b-4d04-beaa-6721f2a0c5d3}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{04DE2B77-686B-41A1-8DE6-A803A7988818}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RetrogamerIE_30.FeedManager\CurVer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{79EEFD21-B48B-4D04-BEAA-6721F2A0C5D3} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{04DE2B77-686B-41A1-8DE6-A803A7988818}\ = "ITemplateBarFeed" regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4396 wrote to memory of 4180 4396 regsvr32.exe 86 PID 4396 wrote to memory of 4180 4396 regsvr32.exe 86 PID 4396 wrote to memory of 4180 4396 regsvr32.exe 86
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\Malicious_91c9164bfd8c713f4c8fba7e88f8d0aca0b51f717cc7c4691c868f5783088045.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\Malicious_91c9164bfd8c713f4c8fba7e88f8d0aca0b51f717cc7c4691c868f5783088045.dll2⤵
- Modifies registry class
PID:4180
-