Analysis
-
max time kernel
144s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
28-12-2023 22:58
Static task
static1
Behavioral task
behavioral1
Sample
fe5bef461729b918e129791db3d6aa05.exe
Resource
win7-20231215-en
General
-
Target
fe5bef461729b918e129791db3d6aa05.exe
-
Size
245KB
-
MD5
fe5bef461729b918e129791db3d6aa05
-
SHA1
337ae4b596dbbd468bc7941ede2c355a8cc13c14
-
SHA256
38f7cb528dbd82b11c5baece671de76ba91c7c0cf3f7302800d17c782f9ab9b6
-
SHA512
362c493ef89ebe4699a87f3e30a2e35c0bbfa4397bf3a6d22edbeeecf8aaedc8ba1ebbf8339966665efe8a21732722c1dad9b344a67f5e7b4bb9e4fab8d6b4cb
-
SSDEEP
6144:h1OgDPdkBAFZWjadD4s5DB4ztxQ6sx5TBpiI80:h1OgLdaOOztSrBBR80
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5016 507ff55a86954.exe -
Loads dropped DLL 2 IoCs
pid Process 5016 507ff55a86954.exe 5016 507ff55a86954.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 4 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DA93AAE1-22D5-5B6D-7F82-48217B6DDCA7} 507ff55a86954.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DA93AAE1-22D5-5B6D-7F82-48217B6DDCA7}\ = "Vaudix" 507ff55a86954.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DA93AAE1-22D5-5B6D-7F82-48217B6DDCA7}\NoExplorer = "1" 507ff55a86954.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DA93AAE1-22D5-5B6D-7F82-48217B6DDCA7} 507ff55a86954.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 4 IoCs
resource yara_rule behavioral2/files/0x0006000000023218-24.dat nsis_installer_1 behavioral2/files/0x0006000000023218-24.dat nsis_installer_2 behavioral2/files/0x0006000000023218-23.dat nsis_installer_1 behavioral2/files/0x0006000000023218-23.dat nsis_installer_2 -
Modifies registry class 63 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DA93AAE1-22D5-5B6D-7F82-48217B6DDCA7}\Programmable 507ff55a86954.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DA93AAE1-22D5-5B6D-7F82-48217B6DDCA7}\InprocServer32 507ff55a86954.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 507ff55a86954.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS 507ff55a86954.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DA93AAE1-22D5-5B6D-7F82-48217B6DDCA7}\VersionIndependentProgID\ = "507ff55a86975.ocx" 507ff55a86954.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\Version = "1.0" 507ff55a86954.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DA93AAE1-22D5-5B6D-7F82-48217B6DDCA7}\ProgID 507ff55a86954.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0 507ff55a86954.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DA93AAE1-22D5-5B6D-7F82-48217B6DDCA7} 507ff55a86954.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F} 507ff55a86954.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "IIEPluginStorage" 507ff55a86954.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 507ff55a86954.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\507ff55a86975.ocx.507ff55a86975.ocx.1.3\CLSID\ = "{DA93AAE1-22D5-5B6D-7F82-48217B6DDCA7}" 507ff55a86954.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 507ff55a86954.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 507ff55a86954.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib 507ff55a86954.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 507ff55a86954.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} 507ff55a86954.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\507ff55a86975.ocx.507ff55a86975.ocx\CLSID\ = "{DA93AAE1-22D5-5B6D-7F82-48217B6DDCA7}" 507ff55a86954.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DA93AAE1-22D5-5B6D-7F82-48217B6DDCA7}\InprocServer32\ThreadingModel = "Apartment" 507ff55a86954.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755} 507ff55a86954.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} 507ff55a86954.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\507ff55a86975.ocx.507ff55a86975.ocx.1.3 507ff55a86954.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\507ff55a86975.ocx.507ff55a86975.ocx\CurVer\ = "507ff55a86975.ocx.1.3" 507ff55a86954.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS\ = "0" 507ff55a86954.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32\ = "C:\\ProgramData\\Vaudix\\507ff55a86975.ocx" 507ff55a86954.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DA93AAE1-22D5-5B6D-7F82-48217B6DDCA7}\Programmable 507ff55a86954.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ = "IIEPluginBHO" 507ff55a86954.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 507ff55a86954.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DA93AAE1-22D5-5B6D-7F82-48217B6DDCA7} 507ff55a86954.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ = "IIEPluginBHO" 507ff55a86954.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib 507ff55a86954.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\507ff55a86975.ocx.507ff55a86975.ocx.1.3\ = "Vaudix" 507ff55a86954.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR 507ff55a86954.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "IIEPluginStorage" 507ff55a86954.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\507ff55a86975.ocx.507ff55a86975.ocx\ = "Vaudix" 507ff55a86954.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\507ff55a86975.ocx.507ff55a86975.ocx\CurVer 507ff55a86954.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DA93AAE1-22D5-5B6D-7F82-48217B6DDCA7}\ = "Vaudix Class" 507ff55a86954.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DA93AAE1-22D5-5B6D-7F82-48217B6DDCA7}\ProgID 507ff55a86954.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DA93AAE1-22D5-5B6D-7F82-48217B6DDCA7}\InprocServer32\ = "C:\\ProgramData\\Vaudix\\507ff55a86975.ocx" 507ff55a86954.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib 507ff55a86954.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\507ff55a86975.ocx.507ff55a86975.ocx 507ff55a86954.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DA93AAE1-22D5-5B6D-7F82-48217B6DDCA7}\VersionIndependentProgID 507ff55a86954.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DA93AAE1-22D5-5B6D-7F82-48217B6DDCA7}\VersionIndependentProgID 507ff55a86954.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\Version = "1.0" 507ff55a86954.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0 507ff55a86954.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\Version = "1.0" 507ff55a86954.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F} 507ff55a86954.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 507ff55a86954.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 507ff55a86954.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 507ff55a86954.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32 507ff55a86954.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32 507ff55a86954.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\507ff55a86975.ocx.507ff55a86975.ocx.1.3\CLSID 507ff55a86954.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\507ff55a86975.ocx.507ff55a86975.ocx\CLSID 507ff55a86954.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DA93AAE1-22D5-5B6D-7F82-48217B6DDCA7}\ProgID\ = "507ff55a86975.ocx.1.3" 507ff55a86954.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\ = "IEPluginLib" 507ff55a86954.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32 507ff55a86954.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR\ = "C:\\ProgramData\\Vaudix" 507ff55a86954.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib 507ff55a86954.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 507ff55a86954.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DA93AAE1-22D5-5B6D-7F82-48217B6DDCA7}\InprocServer32 507ff55a86954.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\Version = "1.0" 507ff55a86954.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4124 wrote to memory of 5016 4124 fe5bef461729b918e129791db3d6aa05.exe 17 PID 4124 wrote to memory of 5016 4124 fe5bef461729b918e129791db3d6aa05.exe 17 PID 4124 wrote to memory of 5016 4124 fe5bef461729b918e129791db3d6aa05.exe 17 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID 507ff55a86954.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{DA93AAE1-22D5-5B6D-7F82-48217B6DDCA7} = "1" 507ff55a86954.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe5bef461729b918e129791db3d6aa05.exe"C:\Users\Admin\AppData\Local\Temp\fe5bef461729b918e129791db3d6aa05.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\7zS4863.tmp\507ff55a86954.exe.\507ff55a86954.exe /s2⤵
- Executes dropped EXE
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
- System policy modification
PID:5016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD56fce522ef2543f1cd8812f45c8718ba6
SHA1270c89c05963c0f24f976f6b75aa4d12ade4c837
SHA256d75c34545066eb787ed671c6d4ce4f4c6267637518ca683dfefb79f95f14226b
SHA512a0a486b95aeb9c059f23e639e16abdbfe94b041f33309b44e95743bf5a82f92d3c444c025b6c36a0dc296add3c2bc4f6affcf130014f16968be0afa8e0007880