Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 18:44
Behavioral task
behavioral1
Sample
35675b0b76869f60fa5e003f937d5f5d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
35675b0b76869f60fa5e003f937d5f5d.exe
Resource
win10v2004-20231215-en
General
-
Target
35675b0b76869f60fa5e003f937d5f5d.exe
-
Size
55KB
-
MD5
35675b0b76869f60fa5e003f937d5f5d
-
SHA1
29835a7c2aa46103ca326c20358ccc2a466077df
-
SHA256
29f1c15cba3e8f8657d6ff4babdf6da15cd3fa6dcb8b8c80b671620431b70dc2
-
SHA512
b62d37df67721d886c45b09be1474a1158f530a3bf5da26a32ce7728c9b3c8a836e4c80d57bf6d2086be64fe8504f98753acb8317bd7ce23382ba3393e8ace4e
-
SSDEEP
768:4ZPRAqcIvdy2wTh4o+uUqe1J0Sw1IR0Q8aIA7O/HNipFgkRZETTHOWgZVl01LCEi:4ZPRPcSk3eFJxQA0QPoNhTLCEaa2
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Utility\Parameters\ServiceDll = "%SystemRoot%\\system32\\toaksie.dll" 35675b0b76869f60fa5e003f937d5f5d.exe -
Deletes itself 1 IoCs
pid Process 2004 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 2528 regsvr32.exe 1700 svchost.exe -
resource yara_rule behavioral1/memory/1712-3-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral1/memory/1712-8-0x0000000000400000-0x0000000000436000-memory.dmp upx -
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{FFFFFCF1-4B15-11D1-ABED-709549C10000} regsvr32.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\lshell.ini 35675b0b76869f60fa5e003f937d5f5d.exe File created C:\Windows\SysWOW64\toaksie.dll 35675b0b76869f60fa5e003f937d5f5d.exe File created C:\Windows\SysWOW64\devtlde.dll 35675b0b76869f60fa5e003f937d5f5d.exe -
Modifies registry class 42 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{CE7C3CEF-4B15-11D1-ABED-709549C10000}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IEHlprObj.IEHlprObj\CurVer\ = "Microsoft.Microsoft.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CE7C3CE2-4B15-11D1-ABED-709549C10000}\1.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CE7C3CE2-4B15-11D1-ABED-709549C10000}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CE7C3CE2-4B15-11D1-ABED-709549C10000}\1.0\HELPDIR\ = "C:\\Windows\\SysWow64\\" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{CE7C3CEF-4B15-11D1-ABED-709549C10000} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{CE7C3CEF-4B15-11D1-ABED-709549C10000}\ = "IIEHlprObj" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{CE7C3CEF-4B15-11D1-ABED-709549C10000}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CE7C3CEF-4B15-11D1-ABED-709549C10000}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IEHlprObj.IEHlprObj.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IEHlprObj.IEHlprObj.1\CLSID\ = "{FFFFFCF1-4B15-11D1-ABED-709549C10000}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IEHlprObj.IEHlprObj\CurVer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FFFFFCF1-4B15-11D1-ABED-709549C10000} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FFFFFCF1-4B15-11D1-ABED-709549C10000}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CE7C3CE2-4B15-11D1-ABED-709549C10000}\1.0\ = "Microsoft 2.0 Type Library" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CE7C3CEF-4B15-11D1-ABED-709549C10000}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FFFFFCF1-4B15-11D1-ABED-709549C10000}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FFFFFCF1-4B15-11D1-ABED-709549C10000}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CE7C3CE2-4B15-11D1-ABED-709549C10000} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CE7C3CE2-4B15-11D1-ABED-709549C10000}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CE7C3CE2-4B15-11D1-ABED-709549C10000}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IEHlprObj.IEHlprObj.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FFFFFCF1-4B15-11D1-ABED-709549C10000}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FFFFFCF1-4B15-11D1-ABED-709549C10000}\ProgID\ = "Microsoft.Microsoft.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CE7C3CEF-4B15-11D1-ABED-709549C10000}\ = "IIEHlprObj" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IEHlprObj.IEHlprObj\ = "Microsoft Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FFFFFCF1-4B15-11D1-ABED-709549C10000}\VersionIndependentProgID\ = "Microsoft.Microsoft" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FFFFFCF1-4B15-11D1-ABED-709549C10000}\InprocServer32\ = "C:\\Windows\\SysWow64\\devtlde.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FFFFFCF1-4B15-11D1-ABED-709549C10000}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CE7C3CEF-4B15-11D1-ABED-709549C10000} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CE7C3CEF-4B15-11D1-ABED-709549C10000}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IEHlprObj.IEHlprObj.1\ = "Microsoft Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CE7C3CE2-4B15-11D1-ABED-709549C10000}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{CE7C3CEF-4B15-11D1-ABED-709549C10000}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{CE7C3CEF-4B15-11D1-ABED-709549C10000}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IEHlprObj.IEHlprObj regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FFFFFCF1-4B15-11D1-ABED-709549C10000}\ = "Microsoft Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CE7C3CE2-4B15-11D1-ABED-709549C10000}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{CE7C3CEF-4B15-11D1-ABED-709549C10000}\TypeLib\ = "{CE7C3CE2-4B15-11D1-ABED-709549C10000}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CE7C3CEF-4B15-11D1-ABED-709549C10000}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CE7C3CEF-4B15-11D1-ABED-709549C10000}\TypeLib\ = "{CE7C3CE2-4B15-11D1-ABED-709549C10000}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CE7C3CE2-4B15-11D1-ABED-709549C10000}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\devtlde.dll" regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1712 35675b0b76869f60fa5e003f937d5f5d.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1712 wrote to memory of 2528 1712 35675b0b76869f60fa5e003f937d5f5d.exe 16 PID 1712 wrote to memory of 2528 1712 35675b0b76869f60fa5e003f937d5f5d.exe 16 PID 1712 wrote to memory of 2528 1712 35675b0b76869f60fa5e003f937d5f5d.exe 16 PID 1712 wrote to memory of 2528 1712 35675b0b76869f60fa5e003f937d5f5d.exe 16 PID 1712 wrote to memory of 2528 1712 35675b0b76869f60fa5e003f937d5f5d.exe 16 PID 1712 wrote to memory of 2528 1712 35675b0b76869f60fa5e003f937d5f5d.exe 16 PID 1712 wrote to memory of 2528 1712 35675b0b76869f60fa5e003f937d5f5d.exe 16 PID 1712 wrote to memory of 2004 1712 35675b0b76869f60fa5e003f937d5f5d.exe 14 PID 1712 wrote to memory of 2004 1712 35675b0b76869f60fa5e003f937d5f5d.exe 14 PID 1712 wrote to memory of 2004 1712 35675b0b76869f60fa5e003f937d5f5d.exe 14 PID 1712 wrote to memory of 2004 1712 35675b0b76869f60fa5e003f937d5f5d.exe 14
Processes
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\35675B~1.EXE > nul1⤵
- Deletes itself
PID:2004
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:1700
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\devtlde.dll1⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:2528
-
C:\Users\Admin\AppData\Local\Temp\35675b0b76869f60fa5e003f937d5f5d.exe"C:\Users\Admin\AppData\Local\Temp\35675b0b76869f60fa5e003f937d5f5d.exe"1⤵
- Sets DLL path for service in the registry
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1712
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD52d67d7fda0cb65767386a710b370b4b7
SHA19976fef55e4e5b2c477f60cfcd454d22971fb372
SHA256e7addb0465c31afb0fa4e28f6528d056abcf7728e249c958200a024c95fa4aab
SHA51220ba9684fcfec568ef91ca37198310f7306131fe4779bf366f3392d09892387e9f91480c795e5b585c7b24ad715476592492325dc031507d8d6713bd2759c3c1
-
Filesize
22B
MD5b25414aa8fcdf0f91a00becd6f0afd88
SHA12ac907528512271c458bd9d4db7280a9981c2753
SHA2562861775306f09ecd288a200d6fd020e587b003875bfd983a58fb56bee3691ccd
SHA51237e5829debd24482bf66b327fc80e212c31557016fdbf64168dd3f5a7fc218389ce7924faa3e99589f62edc281209fc5ff094f93220aa4b824cd4249164a7afe