Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 05:23
Static task
static1
Behavioral task
behavioral1
Sample
0fea7718b91e02dbbb382254ddb29521.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0fea7718b91e02dbbb382254ddb29521.exe
Resource
win10v2004-20231215-en
General
-
Target
0fea7718b91e02dbbb382254ddb29521.exe
-
Size
82KB
-
MD5
0fea7718b91e02dbbb382254ddb29521
-
SHA1
3581bee7666003dd5d9d1ba26f1ced114c100842
-
SHA256
d2b655df551fba7b9fc7fa457704f24877347df2a46c7cd2c2ac98e36abc5d9e
-
SHA512
92cd3db88e8a2cce7266753a243fd5eeae9d4fd0fa38a32f83c0977902d3465d9ea2c133c674d91e366775450ff1a852dbb1e1b18a492dd363c01e81a0053bb1
-
SSDEEP
1536:lG3DfTlzW6y41LlVwf+41iks8M6Qw/+XdOKKWc+2O:lG3DxHyILnX4fMaWXdOKpc+2O
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\E2 Lib = "{17C7CC24-549C-32E4-9603-E859227A8829}" regsvr32.exe -
Sets file execution options in registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe 0fea7718b91e02dbbb382254ddb29521.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\Debugger = "C:\\Windows\\system32\\e2v25527.exe" 0fea7718b91e02dbbb382254ddb29521.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Control Panel\International\Geo\Nation 0fea7718b91e02dbbb382254ddb29521.exe -
Loads dropped DLL 1 IoCs
pid Process 2016 regsvr32.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\e2v25527.exe 0fea7718b91e02dbbb382254ddb29521.exe File created C:\Windows\SysWOW64\e2v25527.dll 0fea7718b91e02dbbb382254ddb29521.exe File created C:\Windows\SysWOW64\e2v25527.exe 0fea7718b91e02dbbb382254ddb29521.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 29 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{325905C8-F5EF-3277-BA5C-1706523A3C7A}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\e2v25527.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{17C7CC24-549C-32E4-9603-E859227A8829}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{325905C8-F5EF-3277-BA5C-1706523A3C7A} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{460E93CF-FE0B-31C4-992A-CBC0D7AEE3B8}\TypeLib\ = "{325905C8-F5EF-3277-BA5C-1706523A3C7A}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{325905C8-F5EF-3277-BA5C-1706523A3C7A}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{17C7CC24-549C-32E4-9603-E859227A8829}\ = "E2 Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{325905C8-F5EF-3277-BA5C-1706523A3C7A}\1.0\ = "LIB" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{460E93CF-FE0B-31C4-992A-CBC0D7AEE3B8}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{17C7CC24-549C-32E4-9603-E859227A8829}\InprocServer32\ = "C:\\Windows\\SysWow64\\e2v25527.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{325905C8-F5EF-3277-BA5C-1706523A3C7A}\1.0\HELPDIR\ = "C:\\Windows\\SysWow64\\" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{325905C8-F5EF-3277-BA5C-1706523A3C7A}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{460E93CF-FE0B-31C4-992A-CBC0D7AEE3B8} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{460E93CF-FE0B-31C4-992A-CBC0D7AEE3B8}\ = "ID" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{460E93CF-FE0B-31C4-992A-CBC0D7AEE3B8}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{460E93CF-FE0B-31C4-992A-CBC0D7AEE3B8}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{325905C8-F5EF-3277-BA5C-1706523A3C7A}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{325905C8-F5EF-3277-BA5C-1706523A3C7A}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{460E93CF-FE0B-31C4-992A-CBC0D7AEE3B8}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{460E93CF-FE0B-31C4-992A-CBC0D7AEE3B8}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{17C7CC24-549C-32E4-9603-E859227A8829} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{460E93CF-FE0B-31C4-992A-CBC0D7AEE3B8} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{17C7CC24-549C-32E4-9603-E859227A8829}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{460E93CF-FE0B-31C4-992A-CBC0D7AEE3B8}\ = "ID" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{460E93CF-FE0B-31C4-992A-CBC0D7AEE3B8}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{460E93CF-FE0B-31C4-992A-CBC0D7AEE3B8}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{460E93CF-FE0B-31C4-992A-CBC0D7AEE3B8}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{460E93CF-FE0B-31C4-992A-CBC0D7AEE3B8}\TypeLib\ = "{325905C8-F5EF-3277-BA5C-1706523A3C7A}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{325905C8-F5EF-3277-BA5C-1706523A3C7A}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{325905C8-F5EF-3277-BA5C-1706523A3C7A}\1.0\HELPDIR regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3236 wrote to memory of 2016 3236 0fea7718b91e02dbbb382254ddb29521.exe 91 PID 3236 wrote to memory of 2016 3236 0fea7718b91e02dbbb382254ddb29521.exe 91 PID 3236 wrote to memory of 2016 3236 0fea7718b91e02dbbb382254ddb29521.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\0fea7718b91e02dbbb382254ddb29521.exe"C:\Users\Admin\AppData\Local\Temp\0fea7718b91e02dbbb382254ddb29521.exe"1⤵
- Sets file execution options in registry
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s C:\Windows\system32\e2v25527.dll2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Modifies registry class
PID:2016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD59d1b96541bb41ecb8cbb8cbba2cb1e02
SHA1933ab68c95571fff0d1a96fd990503dacef9df7a
SHA2567630d4ab785dc93ae5ad746e7d103f75ca4d587fff6b400b711e7406ad8de3c7
SHA512d590446166790c32e4f7fe4ec716abe6c65a0bb965cf95602a62c68a6650d2f318666812eef49ee8553e238265b8b9dda01433fb8d53660077fd9d884ecddc4e