Overview
overview
7Static
static
7Comdlg32.dll
windows7-x64
1Comdlg32.dll
windows10-2004-x64
1Driver Magician.exe
windows7-x64
1Driver Magician.exe
windows10-2004-x64
1Help.chm
windows7-x64
1Help.chm
windows10-2004-x64
1Homepage.url
windows7-x64
6Homepage.url
windows10-2004-x64
3Mscomctl.dll
windows7-x64
1Mscomctl.dll
windows10-2004-x64
1Msinet.dll
windows7-x64
1Msinet.dll
windows10-2004-x64
1Tabctl32.dll
windows7-x64
1Tabctl32.dll
windows10-2004-x64
1XCEEDZIP.dll
windows7-x64
1XCEEDZIP.dll
windows10-2004-x64
1XceedCry.dll
windows7-x64
1XceedCry.dll
windows10-2004-x64
1run.exe
windows7-x64
7run.exe
windows10-2004-x64
7stdole2.dll
windows7-x64
1stdole2.dll
windows10-2004-x64
1xcdsfx32.exe
windows7-x64
1xcdsfx32.exe
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 19:46
Behavioral task
behavioral1
Sample
Comdlg32.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Comdlg32.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
Driver Magician.exe
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
Driver Magician.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
Help.chm
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
Help.chm
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
Homepage.url
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
Homepage.url
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
Mscomctl.dll
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
Mscomctl.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
Msinet.dll
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
Msinet.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral13
Sample
Tabctl32.dll
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
Tabctl32.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
XCEEDZIP.dll
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
XCEEDZIP.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral17
Sample
XceedCry.dll
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
XceedCry.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
run.exe
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
run.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
stdole2.dll
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
stdole2.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
xcdsfx32.exe
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
xcdsfx32.exe
Resource
win10v2004-20231222-en
General
-
Target
run.exe
-
Size
15KB
-
MD5
eb18a2c0796877e4965407f89be51285
-
SHA1
ee07ba313a81ba8d82b75c880d5d07ba8c229343
-
SHA256
54c59ff7d8c1b87102fd2c6346eba2d14fa432ad3bb6898395fc01f499453cb5
-
SHA512
2f9e452e2e81bd2437a8c8b4f95f9e0a8c5f61cc5f6957883955083dbd00c5a009b16edd1e49222bac60584a57ff9a134aab8ea027eeff6c70eda10e163c3404
-
SSDEEP
384:d9Rm2X4m8xjIuzifUmSaNJawcudoD7Ut41tXWJQBKG:dnom81IuefDznbcuyD7U5K
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation 4268.tmp -
Executes dropped EXE 1 IoCs
pid Process 4908 4268.tmp -
resource yara_rule behavioral20/memory/2868-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral20/memory/2868-8-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 36 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key security queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK Driver Magician.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 Driver Magician.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID Driver Magician.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Driver Driver Magician.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK Driver Magician.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\control Driver Magician.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 Driver Magician.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Driver Magician.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM Driver Magician.exe Key security queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM Driver Magician.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM Driver Magician.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 Driver Magician.exe Key security queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM Driver Magician.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM Driver Magician.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\control Driver Magician.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK Driver Magician.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 Driver Magician.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\control Driver Magician.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Driver Driver Magician.exe Key security queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Driver Magician.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM Driver Magician.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Driver Driver Magician.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM Driver Magician.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID Driver Magician.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Driver Driver Magician.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 Driver Magician.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\control Driver Magician.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID Driver Magician.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM Driver Magician.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 Driver Magician.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK Driver Magician.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID Driver Magician.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Driver Magician.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Driver Magician.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 Driver Magician.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 Driver Magician.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C74190B6-8589-11D1-B16A-00C0F0283628}\Programmable Driver Magician.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSComctlLib.ProgCtrl.2\CLSID Driver Magician.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C74190B8-8589-11D1-B16A-00C0F0283628}\TypeLib\ = "{831FDD16-0C5C-11D2-A9FC-0000F8754DA1}" Driver Magician.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2C247F21-8591-11D1-B16A-00C0F0283628}\ = "IImageList" Driver Magician.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7629CFA4-3FE5-101B-A3C9-08002B2F49FB} Driver Magician.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4C836512-BB70-11D2-A5A7-00105A9C91C6}\Verb Driver Magician.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8E3867A3-8586-11D1-B16A-00C0F0283628}\Control Driver Magician.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F08DF954-8592-11D1-B16A-00C0F0283628}\Implemented Categories Driver Magician.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{831FDD16-0C5C-11D2-A9FC-0000F8754DA1}\2.0\0 Driver Magician.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2C247F24-8591-11D1-B16A-00C0F0283628}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" Driver Magician.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F9043C85-F6F2-101A-A3C9-08002B2F49FB}\Control Driver Magician.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3C4F3BE7-47EB-101B-A3C9-08002B2F49FB}\ = "Common Dialog Help Property Page Object" Driver Magician.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{083039C2-13F4-11D1-8B7E-0000F8754DA1}\ProxyStubClsid32 Driver Magician.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66833FE6-8583-11D1-B16A-00C0F0283628}\Implemented Categories\{0DE86A52-2BAA-11CF-A229-00AA003D7352} Driver Magician.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F08DF954-8592-11D1-B16A-00C0F0283628}\ToolboxBitmap32 Driver Magician.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C74190B4-8589-11D1-B16A-00C0F0283628}\TypeLib Driver Magician.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSComctlLib.ListViewCtrl\CLSID\ = "{BDD1F04B-858B-11D1-B16A-00C0F0283628}" Driver Magician.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66833FE6-8583-11D1-B16A-00C0F0283628}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Mscomctl.ocx" Driver Magician.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1EFB6594-857C-11D1-B16A-00C0F0283628}\TypeLib\ = "{831FDD16-0C5C-11D2-A9FC-0000F8754DA1}" Driver Magician.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{66833FE5-8583-11D1-B16A-00C0F0283628}\TypeLib\Version = "2.0" Driver Magician.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{66833FE7-8583-11D1-B16A-00C0F0283628}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" Driver Magician.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BDD1F04A-858B-11D1-B16A-00C0F0283628}\ProxyStubClsid32 Driver Magician.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{99C11080-CD22-11D4-BFFA-0060082AE372}\TypeLib\ = "{DB797681-40E0-11D2-9BD5-0060082AE372}" Driver Magician.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSComctlLib.SBarCtrl\CLSID Driver Magician.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C27CCE37-8596-11D1-B16A-00C0F0283628}\InprocServer32 Driver Magician.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{66833FE5-8583-11D1-B16A-00C0F0283628}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" Driver Magician.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{35053A20-8589-11D1-B16A-00C0F0283628}\TypeLib\Version = "2.0" Driver Magician.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2C247F21-8591-11D1-B16A-00C0F0283628}\ProxyStubClsid32 Driver Magician.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BAA1401E-3F5F-47A4-870B-431D602D2488}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" Driver Magician.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1EFB6599-857C-11D1-B16A-00C0F0283628}\ProxyStubClsid32 Driver Magician.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{35053A22-8589-11D1-B16A-00C0F0283628}\InprocServer32\ThreadingModel = "Apartment" Driver Magician.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C74190B4-8589-11D1-B16A-00C0F0283628}\TypeLib\ = "{831FDD16-0C5C-11D2-A9FC-0000F8754DA1}" Driver Magician.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BDD1F049-858B-11D1-B16A-00C0F0283628}\TypeLib\ = "{831FDD16-0C5C-11D2-A9FC-0000F8754DA1}" Driver Magician.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2C247F22-8591-11D1-B16A-00C0F0283628}\TypeLib\ = "{831FDD16-0C5C-11D2-A9FC-0000F8754DA1}" Driver Magician.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2C247F23-8591-11D1-B16A-00C0F0283628}\Implemented Categories\{40FC6ED4-2438-11CF-A3DB-080036F12502} Driver Magician.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8E3867A3-8586-11D1-B16A-00C0F0283628}\InprocServer32 Driver Magician.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C27CCE38-8596-11D1-B16A-00C0F0283628}\ = "Button Property Page Object" Driver Magician.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66833FED-8583-11D1-B16A-00C0F0283628}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" Driver Magician.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8E3867A4-8586-11D1-B16A-00C0F0283628} Driver Magician.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2C247F21-8591-11D1-B16A-00C0F0283628}\TypeLib Driver Magician.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2C247F22-8591-11D1-B16A-00C0F0283628} Driver Magician.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31C2DDD0-B692-11D4-BFE3-0060082AE372}\TypeLib\ = "{DB797681-40E0-11D2-9BD5-0060082AE372}" Driver Magician.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{07189400-00F2-11D5-802D-0060082AE372}\ProxyStubClsid32 Driver Magician.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{77243A10-00F3-11D5-802D-0060082AE372}\TypeLib\ = "{DB797681-40E0-11D2-9BD5-0060082AE372}" Driver Magician.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSComctlLib.ImageComboCtl.2\ = "Microsoft ImageComboBox Control 6.0 (SP6)" Driver Magician.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8E3867A1-8586-11D1-B16A-00C0F0283628}\ProxyStubClsid32 Driver Magician.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BDD1F050-858B-11D1-B16A-00C0F0283628}\TypeLib Driver Magician.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSComctlLib.TabStrip\CLSID Driver Magician.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BDD1F053-858B-11D1-B16A-00C0F0283628}\TypeLib Driver Magician.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31C2DDD2-B692-11D4-BFE3-0060082AE372}\TypeLib Driver Magician.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F08DF952-8592-11D1-B16A-00C0F0283628}\TypeLib\ = "{831FDD16-0C5C-11D2-A9FC-0000F8754DA1}" Driver Magician.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1EFB6596-857C-11D1-B16A-00C0F0283628}\InprocServer32 Driver Magician.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F08DF954-8592-11D1-B16A-00C0F0283628}\Version Driver Magician.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C27CCE37-8596-11D1-B16A-00C0F0283628}\ = "Toolbar General Property Page Object" Driver Magician.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1EFB6594-857C-11D1-B16A-00C0F0283628}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" Driver Magician.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66833FEB-8583-11D1-B16A-00C0F0283628}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" Driver Magician.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BDD1F050-858B-11D1-B16A-00C0F0283628} Driver Magician.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2C247F22-8591-11D1-B16A-00C0F0283628} Driver Magician.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BAA1401E-3F5F-47A4-870B-431D602D2488}\ProxyStubClsid32 Driver Magician.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{99C11080-CD22-11D4-BFFA-0060082AE372} Driver Magician.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2C247F23-8591-11D1-B16A-00C0F0283628}\Version\ = "2.0" Driver Magician.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2C247F23-8591-11D1-B16A-00C0F0283628}\MiscStatus\ = "0" Driver Magician.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSComctlLib.Slider.2\ = "Microsoft Slider Control 6.0 (SP6)" Driver Magician.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{35053A22-8589-11D1-B16A-00C0F0283628}\ = "Microsoft ProgressBar Control 6.0 (SP6)" Driver Magician.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeBackupPrivilege 5052 Driver Magician.exe Token: SeRestorePrivilege 5052 Driver Magician.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5052 Driver Magician.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2868 wrote to memory of 4908 2868 run.exe 12 PID 2868 wrote to memory of 4908 2868 run.exe 12 PID 2868 wrote to memory of 4908 2868 run.exe 12 PID 4908 wrote to memory of 3448 4908 4268.tmp 17 PID 4908 wrote to memory of 3448 4908 4268.tmp 17 PID 4908 wrote to memory of 3448 4908 4268.tmp 17 PID 3448 wrote to memory of 4480 3448 cmd.exe 22 PID 3448 wrote to memory of 4480 3448 cmd.exe 22 PID 3448 wrote to memory of 4480 3448 cmd.exe 22 PID 3448 wrote to memory of 2380 3448 cmd.exe 21 PID 3448 wrote to memory of 2380 3448 cmd.exe 21 PID 3448 wrote to memory of 2380 3448 cmd.exe 21 PID 3448 wrote to memory of 3484 3448 cmd.exe 20 PID 3448 wrote to memory of 3484 3448 cmd.exe 20 PID 3448 wrote to memory of 3484 3448 cmd.exe 20 PID 3448 wrote to memory of 1576 3448 cmd.exe 19 PID 3448 wrote to memory of 1576 3448 cmd.exe 19 PID 3448 wrote to memory of 1576 3448 cmd.exe 19 PID 3448 wrote to memory of 5052 3448 cmd.exe 18 PID 3448 wrote to memory of 5052 3448 cmd.exe 18 PID 3448 wrote to memory of 5052 3448 cmd.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\4268.tmpC:\Users\Admin\AppData\Local\Temp\4268.tmp C:\Users\Admin\AppData\Local\Temp1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpfile0.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\Driver Magician.exe"Driver Magician.exe"3⤵
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5052
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Driver Magician" /v "Backup option" /t REG_SZ /d "BckFolder" /f3⤵PID:1576
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Driver Magician" /v Version /t REG_SZ /d "3.27" /f3⤵PID:3484
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Driver Magician" /v serialnumber /t REG_SZ /d "DBP-L&32ADE7" /f3⤵PID:2380
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Driver Magician" /v username /t REG_SZ /d "Your User Name" /f3⤵PID:4480
-
-
-
C:\Users\Admin\AppData\Local\Temp\run.exe"C:\Users\Admin\AppData\Local\Temp\run.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD508a6fab23d6fc66941c579379edc00f0
SHA1d261b462620724b546a572a3120908c3bec0e787
SHA2561bfac0efe484142486a7de1c720f0d8be2e6f3703c275eb7f7fcb40377c7f55a
SHA5121d2691b0f209b41ffee3a868f654088da90e4ebc966595f54b0dc8f5288495cba34c92272c73733d43040a319f195d7de87bf89d8a276545e29a71eab5949291
-
Filesize
470B
MD57c89b688eeaab4ecc116970f88067a11
SHA119953d26883237b85865e80b309ca7bb305ab55e
SHA25690a79cf4dcd02beba86b29cd7e59452917d4eb780a3f5853ff090edfa894f0ce
SHA5122b928dd916ba2b64e65d53fbeaf39459073184ed9b23f325a5ea8e459a9d99b115077ecc5cd72e3dc5e5eb66a58bfa1eea1e2e693106921af715f9f753205b81