Analysis
-
max time kernel
138s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 03:27
Static task
static1
Behavioral task
behavioral1
Sample
0cf132a29410b5ee656a610f920b4ba7.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0cf132a29410b5ee656a610f920b4ba7.dll
Resource
win10v2004-20231215-en
General
-
Target
0cf132a29410b5ee656a610f920b4ba7.dll
-
Size
174KB
-
MD5
0cf132a29410b5ee656a610f920b4ba7
-
SHA1
76539c39e62d18e5ee7cc2fe20b59faf325a1b28
-
SHA256
e2df0cea039d91bfbcc0109359eef2db55c27ff8e04a9fe963c112db0e597d9e
-
SHA512
aeb46f8733031e67106203b68d400899477b31499087e8eda1cae97edaedf456b78711e2e7c28f51f13f29409ef3cc0478f4a0465a5b332a5093783271a0f83f
-
SSDEEP
3072:irRO6VMKUpkW1cmBA9Ezc7rXktZCT2ErXY0TySak5GtCt:OKVRckA9XrEUjYOaPtCt
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\edephvcfwzfimbht = "C:\\Windows\\System32\\regsvr32.exe /s \"C:\\Users\\Admin\\AppData\\Local\\Temp\\0cf132a29410b5ee656a610f920b4ba7.dll\"" regsvr32.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DFA48FC1-BF41-A00A-0B30-C4729CD92056} regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{DFA48FC1-BF41-A00A-0B30-C4729CD92056}\NoExplorer = "1" regsvr32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb80000000002000000000010660000000100002000000053885d518a64f76e42e4594923b578a25d7019bd07024a1f4e4eb61210c79a90000000000e80000000020000200000005658aef47b9b45fc984e4c55abedfa88463487be3d3109d7e3bb71398ed1b141200000000df69373d3a7654566441a8dc92c2f3210e5adf398e3591a4839c3d1c8146eff40000000d684f26e99b7ad791201799a2bc8a8eb40e8e2b73adcd3fc7c8291001e00a2c1ced3ecff79b3b11d7e21647981bfb9bb93592c860cb59b916660b65bf74f0ae5 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80bf4e5c533bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410125056" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{83FE1441-A746-11EE-AC0C-EAAD54D9E991} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DFA48FC1-BF41-A00A-0B30-C4729CD92056}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DFA48FC1-BF41-A00A-0B30-C4729CD92056}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DFA48FC1-BF41-A00A-0B30-C4729CD92056}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\0cf132a29410b5ee656a610f920b4ba7.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DFA48FC1-BF41-A00A-0B30-C4729CD92056} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DFA48FC1-BF41-A00A-0B30-C4729CD92056}\ = "offersfortoday browser enhancer" regsvr32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1292 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1292 iexplore.exe 1292 iexplore.exe 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2404 2652 regsvr32.exe 28 PID 2652 wrote to memory of 2404 2652 regsvr32.exe 28 PID 2652 wrote to memory of 2404 2652 regsvr32.exe 28 PID 2652 wrote to memory of 2404 2652 regsvr32.exe 28 PID 2652 wrote to memory of 2404 2652 regsvr32.exe 28 PID 2652 wrote to memory of 2404 2652 regsvr32.exe 28 PID 2652 wrote to memory of 2404 2652 regsvr32.exe 28 PID 1292 wrote to memory of 2788 1292 iexplore.exe 30 PID 1292 wrote to memory of 2788 1292 iexplore.exe 30 PID 1292 wrote to memory of 2788 1292 iexplore.exe 30 PID 1292 wrote to memory of 2788 1292 iexplore.exe 30
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\0cf132a29410b5ee656a610f920b4ba7.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\0cf132a29410b5ee656a610f920b4ba7.dll2⤵
- Adds Run key to start application
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:2404
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1292 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b2f1e3008775a4d9d3b6b22599c820a
SHA1c725bfb6a2fd9881045d0a62b5122ba082a66b9b
SHA25689ff19a7315a593eee873ea298ef8cf73cdd0048efb0e3e263d08fc622f734ef
SHA512e9a71cf339ef22c055bce5df26107cfdc06b3dc8ac56676ed62eed9637e9c915c80f9e6ee649942084cd7c5249220df4cf6f891b425e5c62a12a966e2163ce02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b79bf8368a932ee78516c4c11e2d34c6
SHA1936d6c9ad9403d34f06ee004acda013116b8e4a5
SHA256f26359aa4820c68153c304241d8b597b83cc75629c128ebc2a3ad37769ac5ebd
SHA512d6a9ef4b50683f3c8496d99856420a16f1632f748ea19fb33d5d7ff6dea0055dd22c66725b2f9c8948b3c0b255ed9e7ae20f8a5b973d9d0ce166b1196a61ad92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f62d7b43d56497dc3af1a3b9e01de634
SHA15d7d23550f92eede6c7c3994af02535650697334
SHA25638e4c1385e11b819b17b9c6ee095e1a324be58694d4149e01948fc4d97b22da8
SHA51227026fd0140e29e83368e3f31f7fbc7e6daf7eb7964b183378585a04a8bca9f0eb07b5308666728add9b9a609d304279a8e5112770f0a6c37fff1d5e81dff1b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e00fea77ffe49df61e317c8dd341e7d0
SHA164e9461eb5e6c654f89299a701be4ee48b82de06
SHA256326e1857a52051e3e32c8fd08db238976ccf7a01d4dcebf7c02f03577f88d044
SHA5121fb81ce8d474ffc7d58e58d3b225c2e466ec6b8ae76af1d2cb2cecacd11c95c72c6bb999a9d200419fcba3efa57971987f0af0a739cf3fa0f2b290836a3f195d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a49dd413f138a40d8fddb76991f1c08
SHA18652897982f9c52bbb4293ac14089e1016522112
SHA2564d744b7d919859d8551dbdbd626db79a0a34fd999866fb2bbe4bedfdc1a30c73
SHA512cbd28d250f10b5f511171325e0a850e634b642193f53270c48a460cc48b019332f32c2908c42d0e4c98b88a9eaf48215dcd624cbb9c597afffa0b091d3b52463
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5e346d546a6cb3a0e1644135616af9f
SHA1aabc7750b1aaed8fadfc83eedb754d2de4647c46
SHA256291f55d7b02c486a559253f308c80852f11de52f46e77737598ac32debb0c0ad
SHA51247b793de75f3b8af87389315091aa5f89a896bf15640e8114fa00fbbdaf9e6bee179035ba97f65e1323e8ce2666e526c621dae2360658aaf8dd0ef5b871a809d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9aca69aec13c12b7ce4266ccee2900e
SHA14a155f14fb86318a32fe9373c8cc069effd03154
SHA2563cfdf9a13959b4f835230557c966bfcecc8ddef331cba6b8aab107833c843855
SHA51239ef431f2703b450980d3f76608fd069e1b9f7c1b9dc776c765d15865b526e4d06920190044dcdf2bb6518c33dd567094c99e94ac2971d38e289f3266f1eda08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5364d8e9f22a0aedb0d19c9c1cde68743
SHA15da123d942ec99f8c8405b62b29cd4bac3871de2
SHA256ace9284420ea61031abf3a9756ba7652f726af8e5b4b7b3ac3c1b51bb1a39272
SHA5126ff89219d528dfb77b61b229d9572093e79c6fa04f87a1901b7c3948b82dfa722d64987389fc122d175e8973868a61f7082d29741fde4c5a92ae96d758e70beb
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06