Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 18:44
Behavioral task
behavioral1
Sample
35675b0b76869f60fa5e003f937d5f5d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
35675b0b76869f60fa5e003f937d5f5d.exe
Resource
win10v2004-20231215-en
General
-
Target
35675b0b76869f60fa5e003f937d5f5d.exe
-
Size
55KB
-
MD5
35675b0b76869f60fa5e003f937d5f5d
-
SHA1
29835a7c2aa46103ca326c20358ccc2a466077df
-
SHA256
29f1c15cba3e8f8657d6ff4babdf6da15cd3fa6dcb8b8c80b671620431b70dc2
-
SHA512
b62d37df67721d886c45b09be1474a1158f530a3bf5da26a32ce7728c9b3c8a836e4c80d57bf6d2086be64fe8504f98753acb8317bd7ce23382ba3393e8ace4e
-
SSDEEP
768:4ZPRAqcIvdy2wTh4o+uUqe1J0Sw1IR0Q8aIA7O/HNipFgkRZETTHOWgZVl01LCEi:4ZPRPcSk3eFJxQA0QPoNhTLCEaa2
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Utility\Parameters\ServiceDll = "%SystemRoot%\\system32\\toaksie.dll" 35675b0b76869f60fa5e003f937d5f5d.exe -
Loads dropped DLL 2 IoCs
pid Process 2228 svchost.exe 3672 regsvr32.exe -
resource yara_rule behavioral2/memory/1268-6-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral2/memory/1268-0-0x0000000000400000-0x0000000000436000-memory.dmp upx -
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{FFFFFCF1-4B15-11D1-ABED-709549C10000} regsvr32.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\lshell.ini 35675b0b76869f60fa5e003f937d5f5d.exe File created C:\Windows\SysWOW64\toaksie.dll 35675b0b76869f60fa5e003f937d5f5d.exe File created C:\Windows\SysWOW64\devtlde.dll 35675b0b76869f60fa5e003f937d5f5d.exe -
Modifies registry class 42 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CE7C3CEF-4B15-11D1-ABED-709549C10000}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CE7C3CEF-4B15-11D1-ABED-709549C10000}\TypeLib\ = "{CE7C3CE2-4B15-11D1-ABED-709549C10000}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FFFFFCF1-4B15-11D1-ABED-709549C10000}\ = "Microsoft Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CE7C3CE2-4B15-11D1-ABED-709549C10000} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FFFFFCF1-4B15-11D1-ABED-709549C10000}\InprocServer32\ = "C:\\Windows\\SysWow64\\devtlde.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CE7C3CE2-4B15-11D1-ABED-709549C10000}\1.0\FLAGS\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CE7C3CEF-4B15-11D1-ABED-709549C10000}\TypeLib\ = "{CE7C3CE2-4B15-11D1-ABED-709549C10000}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CE7C3CEF-4B15-11D1-ABED-709549C10000}\ = "IIEHlprObj" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IEHlprObj.IEHlprObj.1\CLSID\ = "{FFFFFCF1-4B15-11D1-ABED-709549C10000}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FFFFFCF1-4B15-11D1-ABED-709549C10000}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CE7C3CE2-4B15-11D1-ABED-709549C10000}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CE7C3CE2-4B15-11D1-ABED-709549C10000}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CE7C3CE2-4B15-11D1-ABED-709549C10000}\1.0\HELPDIR regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CE7C3CEF-4B15-11D1-ABED-709549C10000} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IEHlprObj.IEHlprObj regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IEHlprObj.IEHlprObj\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CE7C3CE2-4B15-11D1-ABED-709549C10000}\1.0\ = "Microsoft 2.0 Type Library" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CE7C3CE2-4B15-11D1-ABED-709549C10000}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\devtlde.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CE7C3CEF-4B15-11D1-ABED-709549C10000}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CE7C3CEF-4B15-11D1-ABED-709549C10000} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IEHlprObj.IEHlprObj.1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FFFFFCF1-4B15-11D1-ABED-709549C10000} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CE7C3CE2-4B15-11D1-ABED-709549C10000}\1.0\HELPDIR\ = "C:\\Windows\\SysWow64\\" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CE7C3CEF-4B15-11D1-ABED-709549C10000}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CE7C3CEF-4B15-11D1-ABED-709549C10000}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CE7C3CEF-4B15-11D1-ABED-709549C10000}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FFFFFCF1-4B15-11D1-ABED-709549C10000}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FFFFFCF1-4B15-11D1-ABED-709549C10000}\VersionIndependentProgID\ = "Microsoft.Microsoft" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FFFFFCF1-4B15-11D1-ABED-709549C10000}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FFFFFCF1-4B15-11D1-ABED-709549C10000}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CE7C3CE2-4B15-11D1-ABED-709549C10000}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CE7C3CEF-4B15-11D1-ABED-709549C10000}\ = "IIEHlprObj" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CE7C3CEF-4B15-11D1-ABED-709549C10000}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IEHlprObj.IEHlprObj.1\ = "Microsoft Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IEHlprObj.IEHlprObj\CurVer\ = "Microsoft.Microsoft.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CE7C3CEF-4B15-11D1-ABED-709549C10000}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IEHlprObj.IEHlprObj\ = "Microsoft Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FFFFFCF1-4B15-11D1-ABED-709549C10000}\ProgID\ = "Microsoft.Microsoft.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CE7C3CE2-4B15-11D1-ABED-709549C10000}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CE7C3CEF-4B15-11D1-ABED-709549C10000}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IEHlprObj.IEHlprObj.1\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FFFFFCF1-4B15-11D1-ABED-709549C10000}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1268 35675b0b76869f60fa5e003f937d5f5d.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1268 wrote to memory of 3672 1268 35675b0b76869f60fa5e003f937d5f5d.exe 20 PID 1268 wrote to memory of 3672 1268 35675b0b76869f60fa5e003f937d5f5d.exe 20 PID 1268 wrote to memory of 3672 1268 35675b0b76869f60fa5e003f937d5f5d.exe 20 PID 1268 wrote to memory of 1740 1268 35675b0b76869f60fa5e003f937d5f5d.exe 19 PID 1268 wrote to memory of 1740 1268 35675b0b76869f60fa5e003f937d5f5d.exe 19 PID 1268 wrote to memory of 1740 1268 35675b0b76869f60fa5e003f937d5f5d.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\35675b0b76869f60fa5e003f937d5f5d.exe"C:\Users\Admin\AppData\Local\Temp\35675b0b76869f60fa5e003f937d5f5d.exe"1⤵
- Sets DLL path for service in the registry
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\35675B~1.EXE > nul2⤵PID:1740
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\devtlde.dll2⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:3672
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:2228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22B
MD5b25414aa8fcdf0f91a00becd6f0afd88
SHA12ac907528512271c458bd9d4db7280a9981c2753
SHA2562861775306f09ecd288a200d6fd020e587b003875bfd983a58fb56bee3691ccd
SHA51237e5829debd24482bf66b327fc80e212c31557016fdbf64168dd3f5a7fc218389ce7924faa3e99589f62edc281209fc5ff094f93220aa4b824cd4249164a7afe
-
Filesize
76KB
MD5362c6e19f8bb56abcca61f97520ba4cf
SHA10766358ffed15dd44b6b9cf08fc35cb3a9226ad4
SHA25643c486b2686a19bf2f9d8f625b9b70b4e80dc81252de6c59c10f9842d1feb0d0
SHA51297d5163c2d8e6e04f7ca1c013f038e77748c835f7ef5c03f70fffa7412cb0f6103fc6d0c2f3c79be11bcc44ef9f62ca005ebbd0f027386c0d780a40f2364e714