Analysis
-
max time kernel
147s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 01:22
Static task
static1
Behavioral task
behavioral1
Sample
48fad24a6419341ce64b063be81e402a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
48fad24a6419341ce64b063be81e402a.exe
Resource
win10v2004-20231215-en
General
-
Target
48fad24a6419341ce64b063be81e402a.exe
-
Size
484KB
-
MD5
48fad24a6419341ce64b063be81e402a
-
SHA1
aaab00c61a68acaea1f687d3291df88db3092754
-
SHA256
e1a5b2392f673f9d652727956690a6f135f5c2d129729a23729bda78f18e32d0
-
SHA512
680d13e3cb49bb3a5712f5f9dff27b9800bdff1287eac9219e5f97061cb99465ff0518c17d268ff31560e089e56525a56c43537d8c06b91738fb343a51e0cd40
-
SSDEEP
12288:SLdIQpe9G51q7UeRtFB/4zRbqQeg1GNGNrUr8Jyn:SB/sG6waFBARl1mjr8wn
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts bffd.exe -
Executes dropped EXE 3 IoCs
pid Process 2600 bffd.exe 2448 bffd.exe 2972 bffd.exe -
Loads dropped DLL 42 IoCs
pid Process 2720 regsvr32.exe 2928 48fad24a6419341ce64b063be81e402a.exe 2928 48fad24a6419341ce64b063be81e402a.exe 2928 48fad24a6419341ce64b063be81e402a.exe 2928 48fad24a6419341ce64b063be81e402a.exe 2972 bffd.exe 768 rundll32.exe 1704 rundll32.exe 768 rundll32.exe 768 rundll32.exe 1704 rundll32.exe 1704 rundll32.exe 768 rundll32.exe 1704 rundll32.exe 2972 bffd.exe 2972 bffd.exe 2972 bffd.exe 2972 bffd.exe 2972 bffd.exe 2972 bffd.exe 2972 bffd.exe 2972 bffd.exe 2972 bffd.exe 2972 bffd.exe 2972 bffd.exe 2972 bffd.exe 2972 bffd.exe 2972 bffd.exe 2972 bffd.exe 2972 bffd.exe 2972 bffd.exe 2972 bffd.exe 2972 bffd.exe 2972 bffd.exe 2972 bffd.exe 2972 bffd.exe 2972 bffd.exe 2972 bffd.exe 2972 bffd.exe 2972 bffd.exe 2972 bffd.exe 2972 bffd.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{84C4A916-2F38-41C4-99BD-C4E8FA05EA54} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{84C4A916-2F38-41C4-99BD-C4E8FA05EA54}\ = "winhome" regsvr32.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 48fad24a6419341ce64b063be81e402a.exe File opened for modification \??\PhysicalDrive0 bffd.exe File opened for modification \??\PhysicalDrive0 rundll32.exe -
Drops file in System32 directory 19 IoCs
description ioc Process File created C:\Windows\SysWOW64\-128017121 rundll32.exe File opened for modification C:\Windows\SysWOW64\34ua.exe 48fad24a6419341ce64b063be81e402a.exe File opened for modification C:\Windows\SysWOW64\b4cb.dlltmp 48fad24a6419341ce64b063be81e402a.exe File opened for modification C:\Windows\SysWOW64\4f3r.dlltmp 48fad24a6419341ce64b063be81e402a.exe File opened for modification C:\Windows\SysWOW64\bffd.exe 48fad24a6419341ce64b063be81e402a.exe File opened for modification C:\Windows\SysWOW64\a1l8.dlltmp 48fad24a6419341ce64b063be81e402a.exe File opened for modification C:\Windows\SysWOW64\144d.exe 48fad24a6419341ce64b063be81e402a.exe File opened for modification C:\Windows\SysWOW64\8b4o.dll 48fad24a6419341ce64b063be81e402a.exe File created C:\Windows\SysWOW64\069 rundll32.exe File opened for modification C:\Windows\SysWOW64\3bef.dll 48fad24a6419341ce64b063be81e402a.exe File opened for modification C:\Windows\SysWOW64\1ba4.dll 48fad24a6419341ce64b063be81e402a.exe File opened for modification C:\Windows\SysWOW64\841e.dll 48fad24a6419341ce64b063be81e402a.exe File opened for modification C:\Windows\SysWOW64\4f3r.dll 48fad24a6419341ce64b063be81e402a.exe File opened for modification C:\Windows\SysWOW64\8b4o.dlltmp 48fad24a6419341ce64b063be81e402a.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat rundll32.exe File opened for modification C:\Windows\SysWOW64\a1l8.dll 48fad24a6419341ce64b063be81e402a.exe File opened for modification C:\Windows\SysWOW64\14rb.exe 48fad24a6419341ce64b063be81e402a.exe File opened for modification C:\Windows\SysWOW64\b4cb.dll 48fad24a6419341ce64b063be81e402a.exe File opened for modification C:\Windows\SysWOW64\b3fs.dll 48fad24a6419341ce64b063be81e402a.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File opened for modification C:\Windows\14ba.exe 48fad24a6419341ce64b063be81e402a.exe File opened for modification C:\Windows\a8f.flv 48fad24a6419341ce64b063be81e402a.exe File opened for modification C:\Windows\f6f.bmp 48fad24a6419341ce64b063be81e402a.exe File opened for modification C:\Windows\8f6.exe 48fad24a6419341ce64b063be81e402a.exe File opened for modification C:\Windows\a8fd.exe 48fad24a6419341ce64b063be81e402a.exe File opened for modification C:\Windows\8f6d.exe 48fad24a6419341ce64b063be81e402a.exe File created C:\Windows\Tasks\ms.job 48fad24a6419341ce64b063be81e402a.exe File opened for modification C:\Windows\bf14.bmp 48fad24a6419341ce64b063be81e402a.exe File opened for modification C:\Windows\a34b.flv 48fad24a6419341ce64b063be81e402a.exe File opened for modification C:\Windows\f6fu.bmp 48fad24a6419341ce64b063be81e402a.exe File opened for modification C:\Windows\a8fd.flv 48fad24a6419341ce64b063be81e402a.exe File opened for modification C:\Windows\6f1u.bmp 48fad24a6419341ce64b063be81e402a.exe File opened for modification C:\Windows\4bad.flv 48fad24a6419341ce64b063be81e402a.exe -
Modifies registry class 47 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer.1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{84C4A916-2F38-41C4-99BD-C4E8FA05EA54}\VersionIndependentProgID\ = "BHO.FunPlayer" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9A5E127F-4EB8-4E6C-92EA-5C8631054C7D}\1.0\FLAGS\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7D8644A6-61C5-4641-A655-31C637BD560C}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer.1\CLSID\ = "{84C4A916-2F38-41C4-99BD-C4E8FA05EA54}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{84C4A916-2F38-41C4-99BD-C4E8FA05EA54}\InprocServer32\ = "C:\\Windows\\SysWow64\\8b4o.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9A5E127F-4EB8-4E6C-92EA-5C8631054C7D}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\8b4o.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{84C4A916-2F38-41C4-99BD-C4E8FA05EA54}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{84C4A916-2F38-41C4-99BD-C4E8FA05EA54}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{84C4A916-2F38-41C4-99BD-C4E8FA05EA54}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9A5E127F-4EB8-4E6C-92EA-5C8631054C7D}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7D8644A6-61C5-4641-A655-31C637BD560C}\TypeLib\ = "{9A5E127F-4EB8-4E6C-92EA-5C8631054C7D}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7D8644A6-61C5-4641-A655-31C637BD560C}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer.1\ = "CFunPlayer Object" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer\CLSID\ = "{84C4A916-2F38-41C4-99BD-C4E8FA05EA54}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{84C4A916-2F38-41C4-99BD-C4E8FA05EA54}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{84C4A916-2F38-41C4-99BD-C4E8FA05EA54}\AppID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7D8644A6-61C5-4641-A655-31C637BD560C}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7D8644A6-61C5-4641-A655-31C637BD560C}\ = "IFunPlayer" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{84C4A916-2F38-41C4-99BD-C4E8FA05EA54}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9A5E127F-4EB8-4E6C-92EA-5C8631054C7D}\1.0\HELPDIR\ = "C:\\Windows\\SysWow64\\" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7D8644A6-61C5-4641-A655-31C637BD560C} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7D8644A6-61C5-4641-A655-31C637BD560C} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7D8644A6-61C5-4641-A655-31C637BD560C}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9A5E127F-4EB8-4E6C-92EA-5C8631054C7D}\1.0\HELPDIR regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer\CurVer\ = "BHO.FunPlayer.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{84C4A916-2F38-41C4-99BD-C4E8FA05EA54}\ = "CFunPlayer Object" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9A5E127F-4EB8-4E6C-92EA-5C8631054C7D}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9A5E127F-4EB8-4E6C-92EA-5C8631054C7D}\1.0\ = "BHO 1.0 Type Library" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9A5E127F-4EB8-4E6C-92EA-5C8631054C7D}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7D8644A6-61C5-4641-A655-31C637BD560C}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer\ = "CFunPlayer Object" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{84C4A916-2F38-41C4-99BD-C4E8FA05EA54}\TypeLib\ = "{9A5E127F-4EB8-4E6C-92EA-5C8631054C7D}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9A5E127F-4EB8-4E6C-92EA-5C8631054C7D} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9A5E127F-4EB8-4E6C-92EA-5C8631054C7D}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7D8644A6-61C5-4641-A655-31C637BD560C}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{84C4A916-2F38-41C4-99BD-C4E8FA05EA54} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{84C4A916-2F38-41C4-99BD-C4E8FA05EA54}\ProgID\ = "BHO.FunPlayer.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{84C4A916-2F38-41C4-99BD-C4E8FA05EA54}\InprocServer32\ThreadingModel = "apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7D8644A6-61C5-4641-A655-31C637BD560C}\ = "IFunPlayer" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7D8644A6-61C5-4641-A655-31C637BD560C}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7D8644A6-61C5-4641-A655-31C637BD560C}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7D8644A6-61C5-4641-A655-31C637BD560C}\TypeLib\ = "{9A5E127F-4EB8-4E6C-92EA-5C8631054C7D}" regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2972 bffd.exe -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 2928 wrote to memory of 2548 2928 48fad24a6419341ce64b063be81e402a.exe 23 PID 2928 wrote to memory of 2548 2928 48fad24a6419341ce64b063be81e402a.exe 23 PID 2928 wrote to memory of 2548 2928 48fad24a6419341ce64b063be81e402a.exe 23 PID 2928 wrote to memory of 2548 2928 48fad24a6419341ce64b063be81e402a.exe 23 PID 2928 wrote to memory of 2548 2928 48fad24a6419341ce64b063be81e402a.exe 23 PID 2928 wrote to memory of 2548 2928 48fad24a6419341ce64b063be81e402a.exe 23 PID 2928 wrote to memory of 2548 2928 48fad24a6419341ce64b063be81e402a.exe 23 PID 2928 wrote to memory of 2588 2928 48fad24a6419341ce64b063be81e402a.exe 14 PID 2928 wrote to memory of 2588 2928 48fad24a6419341ce64b063be81e402a.exe 14 PID 2928 wrote to memory of 2588 2928 48fad24a6419341ce64b063be81e402a.exe 14 PID 2928 wrote to memory of 2588 2928 48fad24a6419341ce64b063be81e402a.exe 14 PID 2928 wrote to memory of 2588 2928 48fad24a6419341ce64b063be81e402a.exe 14 PID 2928 wrote to memory of 2588 2928 48fad24a6419341ce64b063be81e402a.exe 14 PID 2928 wrote to memory of 2588 2928 48fad24a6419341ce64b063be81e402a.exe 14 PID 2928 wrote to memory of 2632 2928 48fad24a6419341ce64b063be81e402a.exe 22 PID 2928 wrote to memory of 2632 2928 48fad24a6419341ce64b063be81e402a.exe 22 PID 2928 wrote to memory of 2632 2928 48fad24a6419341ce64b063be81e402a.exe 22 PID 2928 wrote to memory of 2632 2928 48fad24a6419341ce64b063be81e402a.exe 22 PID 2928 wrote to memory of 2632 2928 48fad24a6419341ce64b063be81e402a.exe 22 PID 2928 wrote to memory of 2632 2928 48fad24a6419341ce64b063be81e402a.exe 22 PID 2928 wrote to memory of 2632 2928 48fad24a6419341ce64b063be81e402a.exe 22 PID 2928 wrote to memory of 2648 2928 48fad24a6419341ce64b063be81e402a.exe 15 PID 2928 wrote to memory of 2648 2928 48fad24a6419341ce64b063be81e402a.exe 15 PID 2928 wrote to memory of 2648 2928 48fad24a6419341ce64b063be81e402a.exe 15 PID 2928 wrote to memory of 2648 2928 48fad24a6419341ce64b063be81e402a.exe 15 PID 2928 wrote to memory of 2648 2928 48fad24a6419341ce64b063be81e402a.exe 15 PID 2928 wrote to memory of 2648 2928 48fad24a6419341ce64b063be81e402a.exe 15 PID 2928 wrote to memory of 2648 2928 48fad24a6419341ce64b063be81e402a.exe 15 PID 2928 wrote to memory of 2720 2928 48fad24a6419341ce64b063be81e402a.exe 21 PID 2928 wrote to memory of 2720 2928 48fad24a6419341ce64b063be81e402a.exe 21 PID 2928 wrote to memory of 2720 2928 48fad24a6419341ce64b063be81e402a.exe 21 PID 2928 wrote to memory of 2720 2928 48fad24a6419341ce64b063be81e402a.exe 21 PID 2928 wrote to memory of 2720 2928 48fad24a6419341ce64b063be81e402a.exe 21 PID 2928 wrote to memory of 2720 2928 48fad24a6419341ce64b063be81e402a.exe 21 PID 2928 wrote to memory of 2720 2928 48fad24a6419341ce64b063be81e402a.exe 21 PID 2928 wrote to memory of 2600 2928 48fad24a6419341ce64b063be81e402a.exe 20 PID 2928 wrote to memory of 2600 2928 48fad24a6419341ce64b063be81e402a.exe 20 PID 2928 wrote to memory of 2600 2928 48fad24a6419341ce64b063be81e402a.exe 20 PID 2928 wrote to memory of 2600 2928 48fad24a6419341ce64b063be81e402a.exe 20 PID 2928 wrote to memory of 2448 2928 48fad24a6419341ce64b063be81e402a.exe 18 PID 2928 wrote to memory of 2448 2928 48fad24a6419341ce64b063be81e402a.exe 18 PID 2928 wrote to memory of 2448 2928 48fad24a6419341ce64b063be81e402a.exe 18 PID 2928 wrote to memory of 2448 2928 48fad24a6419341ce64b063be81e402a.exe 18 PID 2928 wrote to memory of 768 2928 48fad24a6419341ce64b063be81e402a.exe 25 PID 2928 wrote to memory of 768 2928 48fad24a6419341ce64b063be81e402a.exe 25 PID 2928 wrote to memory of 768 2928 48fad24a6419341ce64b063be81e402a.exe 25 PID 2928 wrote to memory of 768 2928 48fad24a6419341ce64b063be81e402a.exe 25 PID 2928 wrote to memory of 768 2928 48fad24a6419341ce64b063be81e402a.exe 25 PID 2928 wrote to memory of 768 2928 48fad24a6419341ce64b063be81e402a.exe 25 PID 2928 wrote to memory of 768 2928 48fad24a6419341ce64b063be81e402a.exe 25 PID 2972 wrote to memory of 1704 2972 bffd.exe 24 PID 2972 wrote to memory of 1704 2972 bffd.exe 24 PID 2972 wrote to memory of 1704 2972 bffd.exe 24 PID 2972 wrote to memory of 1704 2972 bffd.exe 24 PID 2972 wrote to memory of 1704 2972 bffd.exe 24 PID 2972 wrote to memory of 1704 2972 bffd.exe 24 PID 2972 wrote to memory of 1704 2972 bffd.exe 24
Processes
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\b4cb.dll"1⤵PID:2588
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\8b4o.dll"1⤵PID:2648
-
C:\Windows\SysWOW64\bffd.exeC:\Windows\SysWOW64\bffd.exe1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32 C:\Windows\system32\841e.dll,Always2⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:1704
-
-
C:\Windows\SysWOW64\bffd.exeC:\Windows\system32\bffd.exe -s1⤵
- Executes dropped EXE
PID:2448
-
C:\Windows\SysWOW64\bffd.exeC:\Windows\system32\bffd.exe -i1⤵
- Executes dropped EXE
PID:2600
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /s "C:\Windows\system32\8b4o.dll"1⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:2720
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\4f3r.dll"1⤵PID:2632
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\a1l8.dll"1⤵PID:2548
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32 C:\Windows\system32\841e.dll, Always1⤵
- Loads dropped DLL
PID:768
-
C:\Users\Admin\AppData\Local\Temp\48fad24a6419341ce64b063be81e402a.exe"C:\Users\Admin\AppData\Local\Temp\48fad24a6419341ce64b063be81e402a.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD539c4557f2a95d55889039e4cc5232b6b
SHA13d552e9e1a2ab1d22fac34a6bd5fc30617b1d547
SHA256c6383b87aa337866e7690d164e69394743fb87cfb9a4b57d961cf5d26f34b92f
SHA512677e90fa08776c58ddcb0b30c30bcdc2af4899237f1ffda6f7468eedaa94c3840dc20d0e9e557874897127298e183d49b6f6eee0dd958ddbc96b3cb552e627f4
-
Filesize
78KB
MD53e420b527dd763583f27979ab5446976
SHA1ed60be48d6b5b58d17c5a020f21f9a28a3050267
SHA256916a6fa8c4ad0026a6a24066848b964be1e69e93be893f3a4975fca3b6164f5c
SHA512ae39db45a712ee8ab4247d72e7436279b653b2ba5648e8f1484b35c029972e5c16ed669d313d46a6850e116c3d3dc343f5d8d127ccea2ae0ae33ee4d70db8b47
-
Filesize
144KB
MD5d8697ac2aa20599dbc9aae3b8d1a0a03
SHA1a65d142d8225608c3290aa7ca7ffaf831895f2b6
SHA2562a3ec8cb7b172e15dab26e63d4f24324f704e02d1306df7c754fda0c34e35a40
SHA512fbe9dde8360ec70c62ee44b1233f69f65f31e3e9777c6ec9a490a6a945f3a58825c12b833718d62529c77fbc21e99e5c8495d59856f677398155d313cafdf6be