Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 03:10
Static task
static1
Behavioral task
behavioral1
Sample
0c92b16777b67840d3dd2311c0317617.exe
Resource
win7-20231215-en
General
-
Target
0c92b16777b67840d3dd2311c0317617.exe
-
Size
3.8MB
-
MD5
0c92b16777b67840d3dd2311c0317617
-
SHA1
f4d5931eaa5a06a92ae6d2898dc92f0b5413a314
-
SHA256
d3a06ae244259f14c5e3ce210497b69503a0dcac2df5b1078e51422c5275b781
-
SHA512
02f7b6e5ff1f6ec2ea83ef5b9a543cec88a355e03bfc66e6b0c6cde3783917ad46eff1a1d88b91537d0672f63f33c0e9adaa73dd6392a57804d29b5335eb407b
-
SSDEEP
49152:qLzYGW6VMZwbGLepAZneRzVRbzDzqlzZ:SLaT
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2284 mdm.exe 2384 0c92b16777b67840d3dd2311c0317617.LOG -
Loads dropped DLL 8 IoCs
pid Process 2104 0c92b16777b67840d3dd2311c0317617.exe 2104 0c92b16777b67840d3dd2311c0317617.exe 2104 0c92b16777b67840d3dd2311c0317617.exe 2284 mdm.exe 2284 mdm.exe 2284 mdm.exe 2284 mdm.exe 2764 regsvr32.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: 0c92b16777b67840d3dd2311c0317617.LOG -
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{3E422F49-1566-40D3-B43D-077EF739AC32} regsvr32.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\~GLH0000.TMP mdm.exe File opened for modification C:\Windows\SysWOW64\NaviHelper.dll mdm.exe File created C:\Windows\SysWOW64\temp.000 mdm.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\win.ini regsvr32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 51 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3E422F49-1566-40D3-B43D-077EF739AC32}\ = "NaviHelperObj Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3E422F49-1566-40D3-B43D-077EF739AC32}\TypeLib\ = "{CB3EDF87-CDFC-4C4A-B24F-18E4ED3F6958}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CB3EDF87-CDFC-4C4A-B24F-18E4ED3F6958}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{A648A952-0963-4CCA-9343-82D794E5A86F}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\NaviHelper.NaviHelperObj\ = "NaviHelperObj Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\NaviHelper.NaviHelperObj\CurVer\ = "NaviHelper.NaviHelperObj.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{A648A952-0963-4CCA-9343-82D794E5A86F} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A648A952-0963-4CCA-9343-82D794E5A86F} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3E422F49-1566-40D3-B43D-077EF739AC32}\AppID = "{13FACA62-5FC4-4817-9175-9C8D00975916}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CB3EDF87-CDFC-4C4A-B24F-18E4ED3F6958}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\NaviHelper.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{A648A952-0963-4CCA-9343-82D794E5A86F}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{13FACA62-5FC4-4817-9175-9C8D00975916} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\NaviHelper.NaviHelperObj\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CB3EDF87-CDFC-4C4A-B24F-18E4ED3F6958}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{A648A952-0963-4CCA-9343-82D794E5A86F}\ = "INaviHelperObj" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{A648A952-0963-4CCA-9343-82D794E5A86F}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{13FACA62-5FC4-4817-9175-9C8D00975916}\ = "NaviHelper" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\NaviHelper.NaviHelperObj.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CB3EDF87-CDFC-4C4A-B24F-18E4ED3F6958}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CB3EDF87-CDFC-4C4A-B24F-18E4ED3F6958}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\NaviHelper.NaviHelperObj.1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\NaviHelper.NaviHelperObj\CurVer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CB3EDF87-CDFC-4C4A-B24F-18E4ED3F6958}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A648A952-0963-4CCA-9343-82D794E5A86F}\TypeLib\ = "{CB3EDF87-CDFC-4C4A-B24F-18E4ED3F6958}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3E422F49-1566-40D3-B43D-077EF739AC32}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{A648A952-0963-4CCA-9343-82D794E5A86F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A648A952-0963-4CCA-9343-82D794E5A86F}\ = "INaviHelperObj" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3E422F49-1566-40D3-B43D-077EF739AC32}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3E422F49-1566-40D3-B43D-077EF739AC32}\VersionIndependentProgID\ = "NaviHelper.NaviHelperObj" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A648A952-0963-4CCA-9343-82D794E5A86F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\NaviHelper.NaviHelperObj regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3E422F49-1566-40D3-B43D-077EF739AC32}\InprocServer32\ = "C:\\Windows\\SysWow64\\NaviHelper.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CB3EDF87-CDFC-4C4A-B24F-18E4ED3F6958}\1.0\ = "NaviHelper 1.0 ÀàÐÍ¿â" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3E422F49-1566-40D3-B43D-077EF739AC32} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\NaviHelper.NaviHelperObj.1\CLSID\ = "{3E422F49-1566-40D3-B43D-077EF739AC32}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3E422F49-1566-40D3-B43D-077EF739AC32}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A648A952-0963-4CCA-9343-82D794E5A86F}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A648A952-0963-4CCA-9343-82D794E5A86F}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\NaviHelper.NaviHelperObj\CLSID\ = "{3E422F49-1566-40D3-B43D-077EF739AC32}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3E422F49-1566-40D3-B43D-077EF739AC32}\ProgID\ = "NaviHelper.NaviHelperObj.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\NaviHelper.NaviHelperObj.1\ = "NaviHelperObj Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3E422F49-1566-40D3-B43D-077EF739AC32}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3E422F49-1566-40D3-B43D-077EF739AC32}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\NaviHelper.DLL\AppID = "{13FACA62-5FC4-4817-9175-9C8D00975916}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{A648A952-0963-4CCA-9343-82D794E5A86F}\TypeLib\ = "{CB3EDF87-CDFC-4C4A-B24F-18E4ED3F6958}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CB3EDF87-CDFC-4C4A-B24F-18E4ED3F6958}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A648A952-0963-4CCA-9343-82D794E5A86F}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3E422F49-1566-40D3-B43D-077EF739AC32}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CB3EDF87-CDFC-4C4A-B24F-18E4ED3F6958} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CB3EDF87-CDFC-4C4A-B24F-18E4ED3F6958}\1.0\HELPDIR\ = "C:\\Windows\\SysWow64\\" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\NaviHelper.DLL regsvr32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2384 0c92b16777b67840d3dd2311c0317617.LOG -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2284 2104 0c92b16777b67840d3dd2311c0317617.exe 16 PID 2104 wrote to memory of 2284 2104 0c92b16777b67840d3dd2311c0317617.exe 16 PID 2104 wrote to memory of 2284 2104 0c92b16777b67840d3dd2311c0317617.exe 16 PID 2104 wrote to memory of 2284 2104 0c92b16777b67840d3dd2311c0317617.exe 16 PID 2104 wrote to memory of 2284 2104 0c92b16777b67840d3dd2311c0317617.exe 16 PID 2104 wrote to memory of 2284 2104 0c92b16777b67840d3dd2311c0317617.exe 16 PID 2104 wrote to memory of 2284 2104 0c92b16777b67840d3dd2311c0317617.exe 16 PID 2104 wrote to memory of 2384 2104 0c92b16777b67840d3dd2311c0317617.exe 17 PID 2104 wrote to memory of 2384 2104 0c92b16777b67840d3dd2311c0317617.exe 17 PID 2104 wrote to memory of 2384 2104 0c92b16777b67840d3dd2311c0317617.exe 17 PID 2104 wrote to memory of 2384 2104 0c92b16777b67840d3dd2311c0317617.exe 17 PID 2284 wrote to memory of 2764 2284 mdm.exe 18 PID 2284 wrote to memory of 2764 2284 mdm.exe 18 PID 2284 wrote to memory of 2764 2284 mdm.exe 18 PID 2284 wrote to memory of 2764 2284 mdm.exe 18 PID 2284 wrote to memory of 2764 2284 mdm.exe 18 PID 2284 wrote to memory of 2764 2284 mdm.exe 18 PID 2284 wrote to memory of 2764 2284 mdm.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\mdm.exe"C:\Users\Admin\AppData\Local\Temp\mdm.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" C:\Windows\system32\NaviHelper.dll /s2⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Drops file in Windows directory
- Modifies registry class
PID:2764
-
-
C:\Users\Admin\AppData\Local\Temp\0c92b16777b67840d3dd2311c0317617.LOG"C:\Users\Admin\AppData\Local\Temp\0c92b16777b67840d3dd2311c0317617.LOG"1⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of SetWindowsHookEx
PID:2384
-
C:\Users\Admin\AppData\Local\Temp\0c92b16777b67840d3dd2311c0317617.exe"C:\Users\Admin\AppData\Local\Temp\0c92b16777b67840d3dd2311c0317617.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2104
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
350KB
MD5d931631000819120f032e7f8c5d5d130
SHA153c1c01e138b9e25529476914e456f8b4b26d511
SHA2560c0082c58b104c32fa67d5fb4d5e9b0192bcb2fcf8bc341dc170021566176b10
SHA5125f3de530ec95c9b28ac67321bfd78fe7ec515d8e1d20cca672a66f8e1d433b44fccee62b801917ccc7d8574fd4770184e4461a3be4cc50b55aa7c8171260f92b