Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2024, 16:18
Behavioral task
behavioral1
Sample
4ec667a1d6a962070df636a75905e677.exe
Resource
win7-20231129-en
General
-
Target
4ec667a1d6a962070df636a75905e677.exe
-
Size
91KB
-
MD5
4ec667a1d6a962070df636a75905e677
-
SHA1
50bdcae3c5fdd60a437ea8779a227f53ea2be0f9
-
SHA256
7def19525a3bf0067d6147b1bfd33b720bac523f0cd38c882a2d742ac36abd40
-
SHA512
8f1197ed7d161aade177ad2929a44564d8cdf9dba99caac93b7e44c1b9f02a1b2a51eaead4f1d8796fcf95af02b56435165cd1311e2d0c4132c30f7baf2d41fa
-
SSDEEP
768:XTToANTmNOdkk7taeICWzDpCMJrBDsX9MihU+jdVZWtdATTo1:XTToANqNOdRDWzdnsdhUsZWtWTTo1
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 3584 regsvr32.exe -
resource yara_rule behavioral2/memory/3924-0-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/3924-10-0x0000000000400000-0x0000000000418000-memory.dmp upx -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{61BD6924-D4FB-4BA2-B2EF-EBE5E203D122}\ = "??????" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{61BD6924-D4FB-4BA2-B2EF-EBE5E203D122} regedit.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\khaxhakvggiqgmufrdyi\dllxgfazkrgqr.dll 4ec667a1d6a962070df636a75905e677.exe File created C:\Windows\reg.reg 4ec667a1d6a962070df636a75905e677.exe File created C:\Windows\userid.txt 4ec667a1d6a962070df636a75905e677.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 45 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DEB9E5B3-3781-4A4C-80B8-216266A4B216}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DEB9E5B3-3781-4A4C-80B8-216266A4B216} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DEB9E5B3-3781-4A4C-80B8-216266A4B216}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QvodAdBlocker.QvodBlock\ = "QvodAdBlocker.QvodBlock" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{70747953-81DF-4F4D-9C7A-DAAD839FAD3B}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{70747953-81DF-4F4D-9C7A-DAAD839FAD3B}\1.0\0\win32\ = "C:\\Windows\\khaxhakvggiqgmufrdyi\\dllxgfazkrgqr.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{70747953-81DF-4F4D-9C7A-DAAD839FAD3B}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DEB9E5B3-3781-4A4C-80B8-216266A4B216}\ = "QvodBlock" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{61BD6924-D4FB-4BA2-B2EF-EBE5E203D122}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{61BD6924-D4FB-4BA2-B2EF-EBE5E203D122}\VERSION regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DEB9E5B3-3781-4A4C-80B8-216266A4B216} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DEB9E5B3-3781-4A4C-80B8-216266A4B216}\TypeLib\ = "{70747953-81DF-4F4D-9C7A-DAAD839FAD3B}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{61BD6924-D4FB-4BA2-B2EF-EBE5E203D122}\ProgID\ = "QvodAdBlocker.QvodBlock" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DEB9E5B3-3781-4A4C-80B8-216266A4B216}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DEB9E5B3-3781-4A4C-80B8-216266A4B216}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{61BD6924-D4FB-4BA2-B2EF-EBE5E203D122}\VERSION\ = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DEB9E5B3-3781-4A4C-80B8-216266A4B216}\ProxyStubClsid regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DEB9E5B3-3781-4A4C-80B8-216266A4B216}\ProxyStubClsid\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{70747953-81DF-4F4D-9C7A-DAAD839FAD3B}\1.0\ = "QvodAdBlocker" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{70747953-81DF-4F4D-9C7A-DAAD839FAD3B}\1.0\HELPDIR\ = "C:\\Windows\\khaxhakvggiqgmufrdyi" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DEB9E5B3-3781-4A4C-80B8-216266A4B216}\ = "_QvodBlock" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{70747953-81DF-4F4D-9C7A-DAAD839FAD3B}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{61BD6924-D4FB-4BA2-B2EF-EBE5E203D122}\InprocServer32\ = "C:\\Windows\\khaxhakvggiqgmufrdyi\\dllxgfazkrgqr.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{61BD6924-D4FB-4BA2-B2EF-EBE5E203D122}\Implemented Categories regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{61BD6924-D4FB-4BA2-B2EF-EBE5E203D122}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{61BD6924-D4FB-4BA2-B2EF-EBE5E203D122}\TypeLib\ = "{70747953-81DF-4F4D-9C7A-DAAD839FAD3B}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{61BD6924-D4FB-4BA2-B2EF-EBE5E203D122}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{70747953-81DF-4F4D-9C7A-DAAD839FAD3B}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DEB9E5B3-3781-4A4C-80B8-216266A4B216}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DEB9E5B3-3781-4A4C-80B8-216266A4B216}\TypeLib\ = "{70747953-81DF-4F4D-9C7A-DAAD839FAD3B}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{61BD6924-D4FB-4BA2-B2EF-EBE5E203D122}\ = "QvodAdBlocker.QvodBlock" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{61BD6924-D4FB-4BA2-B2EF-EBE5E203D122}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{61BD6924-D4FB-4BA2-B2EF-EBE5E203D122}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DEB9E5B3-3781-4A4C-80B8-216266A4B216}\ = "_QvodBlock" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DEB9E5B3-3781-4A4C-80B8-216266A4B216}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DEB9E5B3-3781-4A4C-80B8-216266A4B216}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DEB9E5B3-3781-4A4C-80B8-216266A4B216}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{61BD6924-D4FB-4BA2-B2EF-EBE5E203D122} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QvodAdBlocker.QvodBlock regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QvodAdBlocker.QvodBlock\Clsid regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QvodAdBlocker.QvodBlock\Clsid\ = "{61BD6924-D4FB-4BA2-B2EF-EBE5E203D122}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{70747953-81DF-4F4D-9C7A-DAAD839FAD3B} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{70747953-81DF-4F4D-9C7A-DAAD839FAD3B}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{70747953-81DF-4F4D-9C7A-DAAD839FAD3B}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{61BD6924-D4FB-4BA2-B2EF-EBE5E203D122}\Implemented Categories\{40FC6ED5-2438-11CF-A3DB-080036F12502} regsvr32.exe -
Runs .reg file with regedit 1 IoCs
pid Process 868 regedit.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3924 4ec667a1d6a962070df636a75905e677.exe 3924 4ec667a1d6a962070df636a75905e677.exe 3924 4ec667a1d6a962070df636a75905e677.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3924 wrote to memory of 3584 3924 4ec667a1d6a962070df636a75905e677.exe 100 PID 3924 wrote to memory of 3584 3924 4ec667a1d6a962070df636a75905e677.exe 100 PID 3924 wrote to memory of 3584 3924 4ec667a1d6a962070df636a75905e677.exe 100 PID 3924 wrote to memory of 3340 3924 4ec667a1d6a962070df636a75905e677.exe 101 PID 3924 wrote to memory of 3340 3924 4ec667a1d6a962070df636a75905e677.exe 101 PID 3924 wrote to memory of 3340 3924 4ec667a1d6a962070df636a75905e677.exe 101 PID 3340 wrote to memory of 868 3340 cmd.exe 103 PID 3340 wrote to memory of 868 3340 cmd.exe 103 PID 3340 wrote to memory of 868 3340 cmd.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ec667a1d6a962070df636a75905e677.exe"C:\Users\Admin\AppData\Local\Temp\4ec667a1d6a962070df636a75905e677.exe"1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Windows\khaxhakvggiqgmufrdyi\dllxgfazkrgqr.dll"2⤵
- Loads dropped DLL
- Modifies registry class
PID:3584
-
-
C:\Windows\SysWOW64\cmd.execmd /c regedit.exe /s C:\Windows\reg.reg2⤵
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Windows\SysWOW64\regedit.exeregedit.exe /s C:\Windows\reg.reg3⤵
- Installs/modifies Browser Helper Object
- Runs .reg file with regedit
PID:868
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD53b0760077c188bb3ce6972169b1613c2
SHA1cb3d50fe0a23a8bbd2558c6079b4b7d937fc4ea6
SHA2560fd9eef17a1eda66f8eb74145f0935ea3a79d09335f5e8e035a822532a0258d0
SHA512d7d71766cec49ec98291dff25cc4d57731ee90285ac122368f35817ed0fc5b36497dd5a21b4cbb09f3f4c14a155370c79899f2269c41bf1b8eb5c24d038f82ff
-
Filesize
2.9MB
MD502c30384db5b2abaf986621b2f4014ec
SHA14440ab1d55215f6e45dedcf382ca5a21a8993e00
SHA2566ef66a01ecd50e52e349d8d55ed5db97741c19086ada1440e1c0f63ad9ae7f37
SHA51220dbfb9ca5e34ec42651d8a4daba98b2997d016972dded504b1199abab9c39d6f720dcfaa163972375614f90320b5587117806e8d6bb83fd7222e253c6acf8bc
-
Filesize
185B
MD5e7ec5d1748cbe59ab5ee02805c9530af
SHA1cd5f89ea21cf72e5ce94d36aa00618bfd9c39a5c
SHA25636845b1f85dbc963f36bded837503db0b551194d62fd00db431e1c1e4dd783c3
SHA512f9af7930ec0021c72102eb4645dece32fb6bf0f7a054e2634ff26fa334ac79bf29ddcd69dbb5960897880da52693ce0fd9c69b4ccacdbb62dc9b5b91b6cdbe9c