Analysis
-
max time kernel
146s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 13:24
Static task
static1
Behavioral task
behavioral1
Sample
7238919053a402f5be4531891041417c.exe
Resource
win7-20231215-en
General
-
Target
7238919053a402f5be4531891041417c.exe
-
Size
121KB
-
MD5
7238919053a402f5be4531891041417c
-
SHA1
09c38e204df82ed2b2a75ff3c479c49ec3af6ea9
-
SHA256
ca8a93c5292a120e78fdc681b00714554904a574eeb4bceff9f9f2ea8e6e8d0b
-
SHA512
1bb6c34bd0cf7d22eee54f60fad49e1f5ac880769f1a98309b840b2eec91a0aff09d34bcad6c6d6c93ffb9baba6d247093f5f625920a8b9c84e1f555ba938ecc
-
SSDEEP
3072:1KQXtg/sDHmJ945yBjDJT8TREntp0U2BupCv/bX//FObti:1NpujT8dYH0UIuc3h4Y
Malware Config
Signatures
-
Loads dropped DLL 5 IoCs
pid Process 2536 7238919053a402f5be4531891041417c.exe 2536 7238919053a402f5be4531891041417c.exe 2536 7238919053a402f5be4531891041417c.exe 2536 7238919053a402f5be4531891041417c.exe 4884 regsvr32.exe -
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{296AB1C6-FB22-4D17-8834-064E2BA0A6F0} 7238919053a402f5be4531891041417c.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\system.ini regsvr32.exe File opened for modification C:\Windows\AMD\google.dll regsvr32.exe File opened for modification C:\Windows\AMD\google.dll 7238919053a402f5be4531891041417c.exe File created C:\Windows\AMD\google.dll 7238919053a402f5be4531891041417c.exe File opened for modification C:\Windows\system.ini 7238919053a402f5be4531891041417c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 41 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{296AB1C6-FB22-4D17-8834-064E2BA0A6F0}\InprocServer32 7238919053a402f5be4531891041417c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{296AB1C6-FB22-4D17-8834-064E2BA0A6F0}\TypeLib\ = "{285AB8C5-FB22-4D17-8834-064E2BA0A6F0}" 7238919053a402f5be4531891041417c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{385AB8C5-FB22-4D17-8834-064E2BA0A6F0}\1.0\FLAGS 7238919053a402f5be4531891041417c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{385AB8C5-FB22-4D17-8834-064E2BA0A6F0}\1.0\FLAGS\ = "0" 7238919053a402f5be4531891041417c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{385AB8C5-FB22-4D17-8834-064E2BA0A6F0}\1.0\0\win32\ = "C:\\Windows\\AMD\\google.dll" 7238919053a402f5be4531891041417c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{385AB8C4-FB22-4D17-8834-064E2BA0A6F0}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 7238919053a402f5be4531891041417c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{385AB8C4-FB22-4D17-8834-064E2BA0A6F0}\TypeLib\ = "{385AB8C5-FB22-4D17-8834-064E2BA0A6F0}" 7238919053a402f5be4531891041417c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{385AB8C4-FB22-4D17-8834-064E2BA0A6F0} 7238919053a402f5be4531891041417c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{296AB1C6-FB22-4D17-8834-064E2BA0A6F0}\InprocServer32\ = "C:\\Windows\\AMD\\google.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{296AB1C6-FB22-4D17-8834-064E2BA0A6F0}\TypeLib\ = "{285AB8C5-FB22-4D17-8834-064E2BA0A6F0}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{296AB1C6-FB22-4D17-8834-064E2BA0A6F0}\TypeLib 7238919053a402f5be4531891041417c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{385AB8C4-FB22-4D17-8834-064E2BA0A6F0}\ProxyStubClsid32 7238919053a402f5be4531891041417c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{385AB8C4-FB22-4D17-8834-064E2BA0A6F0}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 7238919053a402f5be4531891041417c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{385AB8C4-FB22-4D17-8834-064E2BA0A6F0}\TypeLib\ = "{385AB8C5-FB22-4D17-8834-064E2BA0A6F0}" 7238919053a402f5be4531891041417c.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{296AB1C6-FB22-4D17-8834-064E2BA0A6F0}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{296AB1C6-FB22-4D17-8834-064E2BA0A6F0}\ = "Info cache" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{296AB1C6-FB22-4D17-8834-064E2BA0A6F0}\ = "Info cache" 7238919053a402f5be4531891041417c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{385AB8C4-FB22-4D17-8834-064E2BA0A6F0}\TypeLib 7238919053a402f5be4531891041417c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{385AB8C4-FB22-4D17-8834-064E2BA0A6F0}\TypeLib\Version = "1.0" 7238919053a402f5be4531891041417c.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{296AB1C6-FB22-4D17-8834-064E2BA0A6F0}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{296AB1C6-FB22-4D17-8834-064E2BA0A6F0}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{296AB1C6-FB22-4D17-8834-064E2BA0A6F0}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{385AB8C5-FB22-4D17-8834-064E2BA0A6F0}\1.0\ = "Pbtoo2s 1.0 Type Library" 7238919053a402f5be4531891041417c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{385AB8C4-FB22-4D17-8834-064E2BA0A6F0}\ = "IIEHelperObj2" 7238919053a402f5be4531891041417c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{296AB1C6-FB22-4D17-8834-064E2BA0A6F0}\InprocServer32\ThreadingModel = "Apartment" 7238919053a402f5be4531891041417c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{385AB8C5-FB22-4D17-8834-064E2BA0A6F0}\1.0 7238919053a402f5be4531891041417c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{385AB8C5-FB22-4D17-8834-064E2BA0A6F0}\1.0\0 7238919053a402f5be4531891041417c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{385AB8C4-FB22-4D17-8834-064E2BA0A6F0} 7238919053a402f5be4531891041417c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{385AB8C4-FB22-4D17-8834-064E2BA0A6F0}\TypeLib\Version = "1.0" 7238919053a402f5be4531891041417c.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{296AB1C6-FB22-4D17-8834-064E2BA0A6F0} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{296AB1C6-FB22-4D17-8834-064E2BA0A6F0}\InprocServer32\ = "C:\\Windows\\AMD\\google.dll" 7238919053a402f5be4531891041417c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{385AB8C5-FB22-4D17-8834-064E2BA0A6F0} 7238919053a402f5be4531891041417c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{385AB8C5-FB22-4D17-8834-064E2BA0A6F0}\1.0\0\win32 7238919053a402f5be4531891041417c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{296AB1C6-FB22-4D17-8834-064E2BA0A6F0}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{385AB8C5-FB22-4D17-8834-064E2BA0A6F0}\1.0\HELPDIR\ = "C:\\Windows\\AMD" 7238919053a402f5be4531891041417c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{385AB8C4-FB22-4D17-8834-064E2BA0A6F0}\ = "IIEHelperObj2" 7238919053a402f5be4531891041417c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{385AB8C4-FB22-4D17-8834-064E2BA0A6F0}\ProxyStubClsid32 7238919053a402f5be4531891041417c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{296AB1C6-FB22-4D17-8834-064E2BA0A6F0} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{296AB1C6-FB22-4D17-8834-064E2BA0A6F0} 7238919053a402f5be4531891041417c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{385AB8C5-FB22-4D17-8834-064E2BA0A6F0}\1.0\HELPDIR 7238919053a402f5be4531891041417c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{385AB8C4-FB22-4D17-8834-064E2BA0A6F0}\TypeLib 7238919053a402f5be4531891041417c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2536 wrote to memory of 4884 2536 7238919053a402f5be4531891041417c.exe 90 PID 2536 wrote to memory of 4884 2536 7238919053a402f5be4531891041417c.exe 90 PID 2536 wrote to memory of 4884 2536 7238919053a402f5be4531891041417c.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\7238919053a402f5be4531891041417c.exe"C:\Users\Admin\AppData\Local\Temp\7238919053a402f5be4531891041417c.exe"1⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\regsvr32.exe"regsvr32.exe" "C:\Windows\AMD\google.dll" /s2⤵
- Loads dropped DLL
- Drops file in Windows directory
- Modifies registry class
PID:4884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5bf01b2d04e8fad306ba2f364cfc4edfa
SHA158f42b45ca9fc1818c4498ecd8bac088d20f2b18
SHA256d3f9c99e0c1c9acd81a1b33bc3dbd305140def90d10485c253cf1d455f0dc903
SHA51230ca1663d659c5efac7fed3d1aaba81c47d5d5fda77f30f021124c882b858732e17f917bfd0aa3ee7b269fad86e75b1b9388d8f916e7a4e2c9961669f2c772e7
-
Filesize
156KB
MD5167a3de239998ea3de7cc8021da62cd8
SHA139e15fcafeb14a193df175ac28af9ce09664c4aa
SHA2566a8de3ea76e3ca2e1d88d7c8544535454968f618d30a47a939d56c414fdec4d9
SHA512dfdc7a5e3e9320164fcc4fe9936ee81cab5efc88ecf2fc686dd52d8d03394f90e7edd3491018b98b24f88bf1bb34490e22fc7e649a68ea0fcfc2bfb04627c104
-
Filesize
92KB
MD5713f7c09c9e6ba3649ed3bce5d72b716
SHA1a5b852c136ba5624fffa4fcfaac43f1ac3aa512a
SHA25613ed17c09fa56fe5af1762e0c387790a09543ac461fe2c01d39da2efbfa7674f
SHA51234d2744f2d175bdf0abc61fbe172105a610ea7c5d039e6b3f5af5792d0adf38213f797fadcc9dbf225782598466c37f21bf98e4478cbc42c552c7d514e101bb0