Overview
overview
7Static
static
78fa9719792...fc.exe
windows7-x64
78fa9719792...fc.exe
windows10-2004-x64
7$LOCALAPPD...ds.exe
windows7-x64
7$LOCALAPPD...ds.exe
windows10-2004-x64
7$PLUGINSDI...Ex.dll
windows7-x64
3$PLUGINSDI...Ex.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
1$PLUGINSDI...ns.dll
windows10-2004-x64
1$PLUGINSDI...ad.dll
windows7-x64
3$PLUGINSDI...ad.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...es.dll
windows7-x64
3$PLUGINSDI...es.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/Time.dll
windows7-x64
3$PLUGINSDIR/Time.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...ef.dll
windows7-x64
3$PLUGINSDI...ef.dll
windows10-2004-x64
3$PLUGINSDIR/mt.dll
windows7-x64
1$PLUGINSDIR/mt.dll
windows10-2004-x64
1$PLUGINSDI...os.dll
windows7-x64
3$PLUGINSDI...os.dll
windows10-2004-x64
1FM4ffx.exe
windows7-x64
7FM4ffx.exe
windows10-2004-x64
7$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Analysis
-
max time kernel
89s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 16:49
Behavioral task
behavioral1
Sample
8fa9719792d0704543e239c4546b05fc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8fa9719792d0704543e239c4546b05fc.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
$LOCALAPPDATA/funmoods.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$LOCALAPPDATA/funmoods.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/ExtractDLLEx.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/ExtractDLLEx.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/IEFunctions.dll
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/IEFunctions.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/InetLoad.dll
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/InetLoad.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/Processes.dll
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/Processes.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/Time.dll
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/Time.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/chrmPref.dll
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/chrmPref.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/mt.dll
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/mt.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/nsisos.dll
Resource
win7-20231129-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/nsisos.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
FM4ffx.exe
Resource
win7-20231129-en
Behavioral task
behavioral28
Sample
FM4ffx.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20231215-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231215-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20231215-en
General
-
Target
$LOCALAPPDATA/funmoods.exe
-
Size
1.6MB
-
MD5
badf0b8e9bc8d7352fb084951255ee4f
-
SHA1
e584634b5565fd81d7258fca86c632c9d3e1cd14
-
SHA256
73db5f6b89963d6692e3c43c8f3e5265ec4512ce87fe652e9ec3a4a0bb036db8
-
SHA512
3b704e3b0d440f1e580cc277c3c68223139f35156b00250ebf9a231f03d5f74bd19bbf948061e7b8be13b9c08aca9f30a0929cfce5a9d5cc3558cd187a05d53e
-
SSDEEP
24576:VtxBMupYpmZICsiWuu0uFYBimEuDYYmTj67rRXFO6BbwZTdNFtr6Ps7QOWxQ6NVN:p6HmZICsfujIvGmTW7rRQakZpt+xQON
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation funmoods.exe -
Executes dropped EXE 3 IoCs
pid Process 4328 FM4ie.exe 4772 FM4ffx.exe 4012 funmoodssrv.exe -
Loads dropped DLL 64 IoCs
pid Process 100 funmoods.exe 100 funmoods.exe 100 funmoods.exe 100 funmoods.exe 100 funmoods.exe 100 funmoods.exe 100 funmoods.exe 100 funmoods.exe 100 funmoods.exe 100 funmoods.exe 100 funmoods.exe 100 funmoods.exe 100 funmoods.exe 100 funmoods.exe 100 funmoods.exe 100 funmoods.exe 100 funmoods.exe 100 funmoods.exe 100 funmoods.exe 100 funmoods.exe 100 funmoods.exe 100 funmoods.exe 100 funmoods.exe 100 funmoods.exe 100 funmoods.exe 100 funmoods.exe 100 funmoods.exe 100 funmoods.exe 100 funmoods.exe 100 funmoods.exe 100 funmoods.exe 100 funmoods.exe 100 funmoods.exe 4772 FM4ffx.exe 4772 FM4ffx.exe 4328 FM4ie.exe 4772 FM4ffx.exe 4328 FM4ie.exe 4772 FM4ffx.exe 4772 FM4ffx.exe 4328 FM4ie.exe 4328 FM4ie.exe 4328 FM4ie.exe 4328 FM4ie.exe 4772 FM4ffx.exe 4772 FM4ffx.exe 4772 FM4ffx.exe 4772 FM4ffx.exe 4772 FM4ffx.exe 4772 FM4ffx.exe 4772 FM4ffx.exe 4772 FM4ffx.exe 4772 FM4ffx.exe 4772 FM4ffx.exe 4772 FM4ffx.exe 4772 FM4ffx.exe 4772 FM4ffx.exe 4772 FM4ffx.exe 4772 FM4ffx.exe 4772 FM4ffx.exe 4772 FM4ffx.exe 4772 FM4ffx.exe 4772 FM4ffx.exe 4772 FM4ffx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 4 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{75EBB0AA-4214-4CB4-90EC-E3E07ECD04F7} FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{75EBB0AA-4214-4CB4-90EC-E3E07ECD04F7}\ = "Funmoods Helper Object" FM4ie.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{75EBB0AA-4214-4CB4-90EC-E3E07ECD04F7}\NoExplorer = "1" FM4ie.exe -
Drops file in Program Files directory 7 IoCs
description ioc Process File created C:\Program Files (x86)\Funmoods\funmoods\1.5.11.16\bh\funmoods.dll FM4ie.exe File created C:\Program Files (x86)\Funmoods\funmoods\1.5.11.16\funmoodsApp.dll FM4ie.exe File created C:\Program Files (x86)\Funmoods\funmoods\1.5.11.16\funmoodsEng.dll FM4ie.exe File created C:\Program Files (x86)\Funmoods\funmoods\1.5.11.16\funmoodsTlbr.dll FM4ie.exe File created C:\Program Files (x86)\Funmoods\funmoods\1.5.11.16\funmoodssrv.exe FM4ie.exe File created C:\Program Files (x86)\Funmoods\funmoods\1.5.11.16\funmoodsOEM.crx FM4ie.exe File created C:\Program Files (x86)\Funmoods\funmoods\1.5.11.16\uninstall.exe FM4ie.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 8 IoCs
resource yara_rule behavioral4/files/0x0006000000023231-152.dat nsis_installer_1 behavioral4/files/0x0006000000023231-152.dat nsis_installer_2 behavioral4/files/0x00020000000228c7-161.dat nsis_installer_1 behavioral4/files/0x00020000000228c7-161.dat nsis_installer_2 behavioral4/files/0x0006000000023231-158.dat nsis_installer_1 behavioral4/files/0x0006000000023231-158.dat nsis_installer_2 behavioral4/files/0x0006000000023231-157.dat nsis_installer_1 behavioral4/files/0x0006000000023231-157.dat nsis_installer_2 -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{C87FC351-A80D-43E9-9A86-CF1E29DC443A} FM4ie.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{C87FC351-A80D-43E9-9A86-CF1E29DC443A}\Policy = "3" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{C87FC351-A80D-43E9-9A86-CF1E29DC443A}\AppName = "funmoodssrv.exe" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{C87FC351-A80D-43E9-9A86-CF1E29DC443A}\AppPath = "C:\\Program Files (x86)\\Funmoods\\funmoods\\1.5.11.16" FM4ie.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Toolbar\ FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Toolbar\{A4C272EC-ED9E-4ACE-A6F2-9558C7F29EF3} = "Funmoods Toolbar" FM4ie.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\funmoodsApp.appCore\CLSID\ = "{A9DB719C-7156-415E-B49D-BAD039DE4F13}" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2CE5C4B9-6DBE-4528-96FA-C9FF38EF1762}\TypeLib FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C0585B2F-74D7-4734-88DE-6C150C5D4036} FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EF0588D6-1621-4A75-B8BE-F4BC34794136}\TypeLib FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{75A4D144-506D-4BE5-81DB-EC7DA1E7F840}\VersionIndependentProgID funmoodssrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{965B9DBE-B104-44AC-950A-8A5F97AFF439}\TypeLib FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\funmoodsApp.appCore FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{295CACB4-51F5-46FD-914E-C72BAAE1B672}\TypeLib FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\escort.escortIEPane.1\ = "escortIEPane Object" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{59C63F11-D4E5-46E7-9B8A-EE158DCA83A8} FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D8242E89-2F81-484A-AE5B-BA8CAD5B7347} FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{D7EE8177-D51E-4F89-92B6-83EA2EC40800}\ = "escortApp" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\funmoodsApp.appCore\ = "appCore Object" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1D085C0A-E4F4-4F66-BDBF-4BE51015BFC3}\1.0\HELPDIR FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\escortApp.DLL FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\funmoodsApp.appCore.1\CLSID FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A9DB719C-7156-415E-B49D-BAD039DE4F13}\ProgID FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{34C1FDF7-02C1-4F23-B393-F48B16E071D1}\TypeLib FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{4E1E9D45-8BF9-4139-915C-9F83CC3D5921} FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A4C272EC-ED9E-4ACE-A6F2-9558C7F29EF3}\TypeLib\ = "{4E1E9D45-8BF9-4139-915C-9F83CC3D5921}" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\funmoods.funmoodsHlpr\CurVer\ = "funmoods.funmoodsHlpr.1" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{34C1FDF7-02C1-4F23-B393-F48B16E071D1}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{960DF771-CFCB-4E53-A5B5-6EF2BBE6E706} funmoodssrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{23D8EEF7-0E13-4000-B9C4-6603C1E912D1}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0D80F1C5-D17B-4177-AC68-955F3EF9F191}\TypeLib\ = "{1D085C0A-E4F4-4F66-BDBF-4BE51015BFC3}" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{75A4D144-506D-4BE5-81DB-EC7DA1E7F840}\TypeLib funmoodssrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D7EE8177-D51E-4F89-92B6-83EA2EC40800}\1.0\HELPDIR\ = "C:\\Program Files (x86)\\Funmoods\\funmoods\\1.5.11.16" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2CE5C4B9-6DBE-4528-96FA-C9FF38EF1762}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F03FD9D0-4F2B-497C-8A71-DD41D70B07D9} FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2CE5C4B9-6DBE-4528-96FA-C9FF38EF1762} FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{23D8EEF7-0E13-4000-B9C4-6603C1E912D1}\ProxyStubClsid32 FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\esrv.funmoodsESrvc.1\CLSID funmoodssrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\funmoodsApp.appCore.1\CLSID\ = "{A9DB719C-7156-415E-B49D-BAD039DE4F13}" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D7EE8177-D51E-4F89-92B6-83EA2EC40800} FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2CE5C4B9-6DBE-4528-96FA-C9FF38EF1762} FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{75A4D144-506D-4BE5-81DB-EC7DA1E7F840}\VersionIndependentProgID\ = "esrv.funmoodsESrvc" funmoodssrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A9DB719C-7156-415E-B49D-BAD039DE4F13}\ProgID\ = "funmoodsApp.appCore.1" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D7EE8177-D51E-4F89-92B6-83EA2EC40800}\1.0\HELPDIR FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{59C63F11-D4E5-46E7-9B8A-EE158DCA83A8}\TypeLib FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C0585B2F-74D7-4734-88DE-6C150C5D4036}\TypeLib\ = "{1D085C0A-E4F4-4F66-BDBF-4BE51015BFC3}" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{75A4D144-506D-4BE5-81DB-EC7DA1E7F840}\AppID = "{960DF771-CFCB-4E53-A5B5-6EF2BBE6E706}" funmoodssrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\funmoods.funmoodsHlpr FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\funmoods.funmoodsHlpr\CLSID FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{295CACB4-51F5-46FD-914E-C72BAAE1B672}\ = "IescrtSrvc" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\funmoods.dskBnd\CurVer\ = "funmoods.dskBnd.1" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A4C272EC-ED9E-4ACE-A6F2-9558C7F29EF3}\ = "CDskBnd Object" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{D7EE8177-D51E-4F89-92B6-83EA2EC40800} FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EF0588D6-1621-4A75-B8BE-F4BC34794136}\TypeLib\ = "{1D085C0A-E4F4-4F66-BDBF-4BE51015BFC3}" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A9DB719C-7156-415E-B49D-BAD039DE4F13}\ = "appCore Object" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\escort.escortIEPane\CLSID FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5DA22CBD-0029-4A09-B757-CF0FAFC488ED}\ = "IRegmapDisp" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{23C70BCA-6E23-4A65-AD2E-1389062074F1}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{77A6E7D4-4A83-4A9B-A2A0-EF3B125DC29D}\ = "IEscortFctry" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\f\CLSID\ = "{F03FD9D0-4F2B-497C-8A71-DD41D70B07D9}" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\escort.DLL\AppID = "{09C554C3-109B-483C-A06B-F14172F1A947}" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{23C70BCA-6E23-4A65-AD2E-1389062074F1}\TypeLib FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{34C1FDF7-02C1-4F23-B393-F48B16E071D1}\TypeLib FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D8242E89-2F81-484A-AE5B-BA8CAD5B7347}\TypeLib\Version = "1.0" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{75A4D144-506D-4BE5-81DB-EC7DA1E7F840}\ProgID funmoodssrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{75A4D144-506D-4BE5-81DB-EC7DA1E7F840}\LocalServer32\ = "\"C:\\Program Files (x86)\\Funmoods\\funmoods\\1.5.11.16\\funmoodssrv.exe\"" funmoodssrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{960DF771-CFCB-4E53-A5B5-6EF2BBE6E706}\1.0\0 funmoodssrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{960DF771-CFCB-4E53-A5B5-6EF2BBE6E706}\1.0\0\win32\ = "C:\\Program Files (x86)\\Funmoods\\funmoods\\1.5.11.16\\funmoodssrv.exe" funmoodssrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{23D8EEF7-0E13-4000-B9C4-6603C1E912D1}\ = "IIEWndFct" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{23D8EEF7-0E13-4000-B9C4-6603C1E912D1}\TypeLib\ = "{1D085C0A-E4F4-4F66-BDBF-4BE51015BFC3}" FM4ie.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 100 funmoods.exe 100 funmoods.exe 100 funmoods.exe 100 funmoods.exe 100 funmoods.exe 100 funmoods.exe 100 funmoods.exe 100 funmoods.exe 100 funmoods.exe 100 funmoods.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 100 wrote to memory of 4328 100 funmoods.exe 54 PID 100 wrote to memory of 4328 100 funmoods.exe 54 PID 100 wrote to memory of 4328 100 funmoods.exe 54 PID 100 wrote to memory of 4772 100 funmoods.exe 52 PID 100 wrote to memory of 4772 100 funmoods.exe 52 PID 100 wrote to memory of 4772 100 funmoods.exe 52 PID 4328 wrote to memory of 4012 4328 FM4ie.exe 53 PID 4328 wrote to memory of 4012 4328 FM4ie.exe 53 PID 4328 wrote to memory of 4012 4328 FM4ie.exe 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\$LOCALAPPDATA\funmoods.exe"C:\Users\Admin\AppData\Local\Temp\$LOCALAPPDATA\funmoods.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:100 -
C:\Users\Admin\AppData\Local\Temp\FNMD\FM\1.5.11.16\FM4ffx.exeC:\Users\Admin\AppData\Local\Temp\FNMD\FM\1.5.11.16\FM4ffx.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4772
-
-
C:\Users\Admin\AppData\Local\Temp\FNMD\FM\1.5.11.16\FM4ie.exe"C:\Users\Admin\AppData\Local\Temp\FNMD\FM\1.5.11.16\FM4ie.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4328
-
-
C:\Program Files (x86)\Funmoods\funmoods\1.5.11.16\funmoodssrv.exe"C:\Program Files (x86)\Funmoods\funmoods\1.5.11.16\funmoodssrv.exe" /RegServer1⤵
- Executes dropped EXE
- Modifies registry class
PID:4012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
329KB
MD512be59f427297e54fef41f9bb32d4233
SHA10088967a4ed52f491976136c95d43e0e1b06cc31
SHA256e4b3df5ead761fe83da367d5e2ae1d416d0f89a572480deecc20c4b4295f17eb
SHA5120f8f3826e8a9205771863c042a8386315784927e260ca8617c44f83b5f3f3a501500d6d39ae732da11c0621dbd6c8c6d75ac7af660a46bb70acac9c12991d2db
-
Filesize
535KB
MD5d5e0f923b3ee640efd6a58ec0c70cbdc
SHA174f62a9acdb9f9dd0580d69450c062ba8870deea
SHA2563d1b55bbb46e5788ca3e8ce68e515f52bdf63c0f53ceaad7236964eedf97f281
SHA512471eca5adb43ba82cfed4fdb395471414301e3eeb602ba4fa6cccb9721869847a06bd8096d7eb15cbdcab908d6dfc47d48d293e1f77b881271f6d7dd4f54f3f0
-
Filesize
245KB
MD57f8be790b6614f46adeafd59761abbeb
SHA1a1be7d513d40b1a0af1aa1fd73c2c2b6173ac700
SHA256b1fa4dacf9656e31588eebeca1f831c72a33d9affca07ede0d5f5d113ec14aaf
SHA5124d17c74368543092a8e7604208689bc6a5fc5bcc46c60cfb9255622d031a4265adaa13d7c0b5f410ababed802f29cb89c2dd7d7b1adc1af33fbb5f55e4a8a5ca
-
Filesize
319KB
MD5fe768a6b82ed2a59c58254eae67b8cf9
SHA13dad9bf5011fb73b9be2fe6c601bb6281a3ceaf6
SHA2563ac3c700060a0487060724f3fd22faf70d5f633e69401641964d7ba4d6e6e570
SHA5123d8caadc61ea127bd0e3d01f35274a2ebfa34a0ac12b0932988300d011347f74a09c2bf3c85e58bfbe5200288c6e6f100b4f08916d23e56d7b52a70130aad14b
-
Filesize
305KB
MD5ed9ea3b34a331b4835876302bb4fe65c
SHA146db0a477a3cd4d6ba2f94cc9cbb93f28f87e5e8
SHA25625f6f0cc23d0637b9007050d428ac1898f382f4ec4969be86aaf0254a0a73c54
SHA512503d045cdb1e7c833aaaf956c717ad240002d38d08f2e003267c3d4b7a5be9e84f6dfec8b849d60eed7e388693db693caf7f8ea6dcba7499fefc9d410ac48f90
-
Filesize
829KB
MD5be035c4c63a2d00f32bdc0a3c36bb71f
SHA1cd7b0ff3a23a29ad2b9627a92072c9c35f22a8c1
SHA256b3329c3609aa02d588473e14a5db78965286849f84a50bf8aa7f4645324ad4ed
SHA5120bbfcc597656fc90ff168f28e0627c5a9a5724f9396001342b5451ff0203d7cf1201c8a411443be6cee6fcbdfeae9af01280bbbb47120f2c8f7ac90de8f295de
-
Filesize
470KB
MD510d58fbc734ba8ecc6473211b757c01a
SHA165400d51db01c56bf6c7e493f1d7ce3c9f50bc87
SHA256c347dd88829a4a94b2a41f7a73c0f757839ff3bbf63345363bf32cacfaac9166
SHA5125535ae80e924230cc5b30e5fe87bedc6e76d11cea205113fb0b8546cf2f83cc0c03357645961fa4940cae065adcce84e4baf3818b64aeaef3dfe8b51c19020a8
-
Filesize
679B
MD54505410d7d3065c7b0fb6966d8d2206e
SHA1dbb5933508b4bcc1349c4c2b9a0189f4c2a53057
SHA2567dbae04715f91ad0b73fec9759968fe2c66fa4a62879aab5da5fab84ef5d18be
SHA512dd7b96809a7f0587d323619762f56eca633c7d3c784060024e4d794a0dbafbd9a10671976c17e7bb2d4f614ba6ff0ebd5dc9ea1d5846de02092446963c6063ef
-
Filesize
825B
MD55547548167ef93424c9dac91e6e2555f
SHA195972dfa24168e9ee3440ebbdd1386fea14c21ed
SHA2563091a2d9a21f70e818ec9b355f6b743b11c425cabbf97873ea0b9b870ed91a61
SHA512c1041046064314b26cc27c494535e77eed9a0222d3b902498cc937ffbbe6fd52c19315203ae3b6f6c2cca202adab66a954c90aefc2d16906320f4c4cc736c833
-
Filesize
981B
MD56089e15ab03fa5f7b0dfed3207d03166
SHA1af22f6f8395b91c573a53b5a63051e6177d669c0
SHA25606e9e89b1f3cd76b70eb187e0f3f0ed28daa51a59a98415f1aba9736cdaca2df
SHA512c68ae79fce55f84e5874074f2190431a28d25d3cc27e0f4dfffa84fef71d8e81f6fc244aa8166bebb634ce7487a2ba616a1aa2a5e501adfcc2c93f504f52bd1e
-
Filesize
398B
MD58367a10b2b73fe60cb07c8f6601a4484
SHA12473d6b772acddb39ffd909554dc616efea177b8
SHA256f3648d1aa461be0946ae9562f6eb5e98ca466798d143cdb04349aadd4b846860
SHA512f84782a018c237c866a6016bbc5a1a0689c97596c4ae0603a49694af66a90952332948b9c6190ce38c61add56015d8f011cfcfbf0a7f51c898e007e8eb1f1eff
-
Filesize
463B
MD5391c4f7cfd3669ae210b44dcdb0df64b
SHA1029319c37e8f4524533a0405f482af043be758b2
SHA256aeec8f0493d8fa5608211dae64465b6a03ab7f0118b7fddf2f33d432430088a2
SHA512717588413246045ea7e468f13918d594eda26639c0ccdf76adf18fe451d24944943529216641cb189177184d06302a67e4eedbabb7ecc16ab557f7779b006d16
-
Filesize
537B
MD57aa65f2f71300139697f934d773cbf00
SHA1268d841b90522acbdce412435b64d46f91020850
SHA25690c7f00c89f6f4e0a4b5c221e71db4ab5e0bbf3d25183d3be5bd4ce56ef52823
SHA5122ba1a6100ead99a1c7310a9f0aec3ee98cc6fe8902342898ca04a9479b42b236ba3585e96e753cb30adec852abc1c6db14b3fa5e1f138e2c29d482f12e45c318
-
Filesize
876B
MD546c5b4bc455996ef740caa22048e01ef
SHA121795bc94be8ee1b4b1971a84045dd9319920a5b
SHA256d77b80caa644e9c22239a3aa40a2b584cd29af53d8c2e77ad71c3e5f0c232094
SHA5127ea063a87b53a4f884035c01e3e07fc479869f7495a98e6f70e90da1a4529e3d477f012e8df3f0e654ac2abd9b9eb7e6dfdb01b45a6c03600df19657116147be
-
Filesize
770B
MD55834cc02177bf041e2b7d588cf80ec03
SHA11519d63bb47f3981fccfda29ff7168a65a1f08fd
SHA25656015f6cb7bf38078e5bfa23e32cff582d136bd5823f8a740f86345c0271f157
SHA5127e40b078936ae924c2fe83c2922f72813a9f620defe3ad24bf37519c60d2e10c106b58bb6e4d59a472b2f988b6b87d6a07e80c4fbd10c007db2d44baab306cea
-
Filesize
482B
MD5bf4c21a39c500967ea2dd99c495176c3
SHA124e7fc91a55b6a3c884e134ba3d97eb7539ec7f0
SHA256539cf2e89793500b61474695dc847d41f29154775a3bdd8d4536091fa74e5a5a
SHA512cddd583514abe01d9b5c28e4920f3bec041a63c4cc9419dde285c92405d6b106cae99110f1b3343df9a801a9fa31c6b87eb72c64a6f0b13395896771ce70c5a8
-
Filesize
520B
MD55249059a5de61a7a405e4057d5401099
SHA1bdf9330457e7e4e65d9b266bb99799a526d7e6e7
SHA25689936b147f33103ba833fa62f3be2ce322c03976f90f2e588fe97558952361da
SHA512f771c0b6265f4556d094ac295409e4d23c3f725f34ff533341f54d133686f69c113b61344ef96ce734c8443f69ec618191456e8acaafdc1fe347455ddd78ca99
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
4KB
MD57579ade7ae1747a31960a228ce02e666
SHA18ec8571a296737e819dcf86353a43fcf8ec63351
SHA256564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5
SHA512a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b
-
Filesize
7KB
MD5ba4063f437abb349aa9120e9c320c467
SHA1b045d785f6041e25d6be031ae2af4d4504e87b12
SHA25673acba7dd477dfd6cf4249911f4e3c781196c7cf6b28425761dcb2d4f90c36c5
SHA51248a813f55834069f8c6b90740de3df01564a136b0fe637f9f85cc1a19d7f32b1f70205ff2462526508fe3c1962d7c1e8e384c40463e328538aeba28e8d0fb92a
-
Filesize
18KB
MD5994669c5737b25c26642c94180e92fa2
SHA1d8a1836914a446b0e06881ce1be8631554adafde
SHA256bf01a1f272e0daf82df3407690b646e0ff6b2c562e36e47cf177eda71ccb6f6c
SHA512d0ab7ca7f890ef9e59015c33e6b400a0a4d1ce0d24599537e09e845f4b953e3ecd44bf3e3cbe584f57c2948743e689ed67d2d40e6caf923bd630886e89c38563
-
Filesize
14KB
MD5a5f8399a743ab7f9c88c645c35b1ebb5
SHA1168f3c158913b0367bf79fa413357fbe97018191
SHA256dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9
SHA512824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977
-
Filesize
56KB
MD5cc0bd4f5a79107633084471dbd4af796
SHA109dfcf182b1493161dec8044a5234c35ee24c43a
SHA2563b5388e13dab53d53e08791f492ed7d3094a0cee51e9841af83ce02534e0621c
SHA51267ba90ec04366e07d0922ffb4dbbb4f12f90b6785b87700adaae29327db9ec2a03d750b229f858db0594f439499d6346fbf1ebc17c77162bf8da027515219ee3
-
Filesize
194KB
MD56845d147b88de1f005d9c6ebb6596574
SHA164523302e2b1e2ee7a31580d2acac852db3c7e45
SHA256c9ccc486c3353bad0d2819a42203c0db7ba98b4826b6a2b8d4deee832e4d3d8e
SHA512cd4caa6669b5f90ead60579a2e5b01a9cd2d17fd2919651cecda6327acb32e2eb3b9953412c085d50dee89779d2f60df658236fb4c3cc54bed4ae66929590606
-
Filesize
5KB
MD5aac69f856c4540edd4ef7ce6c8571639
SHA12860f55ea9774d631219e66604051e90a43258b7
SHA2566dc2644a389feeef9e0ac65e2c8b01fc18ca6e53b253f10efffcb117e0a852dd
SHA512ebacc8117c44d298ae519705510285c576932761b3c7b697eeb91cb7620150ebe551102d1ab83d68f4c78e1496b191a55ad8f78c491f5b4af456c4de6ad72dcd
-
Filesize
5KB
MD569806691d649ef1c8703fd9e29231d44
SHA1e2193fcf5b4863605eec2a5eb17bf84c7ac00166
SHA256ba79ab7f63f02ed5d5d46b82b11d97dac5b7ef7e9b9a4df926b43ceac18483b6
SHA5125e5e0319e701d15134a01cb6472c624e271e99891058aef4dfe779c29c73899771a5b6f8b1cd61b543a3b3defeaecaa080c9cc4e76e84038ca08e12084f128eb
-
Filesize
10KB
MD538977533750fe69979b2c2ac801f96e6
SHA174643c30cda909e649722ed0c7f267903558e92a
SHA256b4a95a455e53372c59f91bc1b5fb9e5c8e4a10a506fa04aaf7be27048b30ae35
SHA512e17069395ad4a17e24f7cd3c532670d40244bd5ae3887c82e3b2e4a68c250cd55e2d8b329d6ff0e2d758955ab7470534e6307779e49fe331c1fd2242ea73fd53
-
Filesize
1KB
MD56fc8285f51f266e2b30f7a6afb1eb76d
SHA17d95d5579f1f13ec29bf1e9e81d75f62d193b5a3
SHA256bc805bc0555f5fae6f9806db5f6422aeae1c228da2bf46858a91513476165760
SHA512638a45e3e5b8ba952af27e766047a7555bdd658c104de7f0d31d86b318ebddcec95b5b19b779f8b2bf3ac4730b1a119b386e7aa76ef57af4afbb597515ab9f2c
-
Filesize
301B
MD52bbed7c9521174d68eb82751901184d3
SHA15adc5a58175f2cf899695e3c162b31f1dfa04524
SHA2560eebe6ecb1c7f74a5175dd6aef7ea4a605741a54104f26b08f29ed0b763ae7db
SHA5120feec3cc87c72b66b5dd53ee42e812b4a392ce7a26c47d31a06554e777271c7075bb4870a1435fde647a4fa7c1418d1eef8f7bbaf2d133fb43a2b7a7631bf471
-
Filesize
713B
MD5b1a00e45248c1e363d42259d08fc71d8
SHA14afc2ce3e515df8eca455a285e07b33ac5fbabb1
SHA256d8821be170dcce3acfe26c15f2331e6783eab146f519b96724b0ebef65bfe8a1
SHA51282f3a5e90db6d31a9131418d78a018fb6a708c434f84ae6c5ebe34d502c9b2b2c5a9d179cc77c5243a3e6827c85191ca2b395ab00043c276c52f369cc490ce68
-
Filesize
1KB
MD54d957165f55fec98cedf199bf344557f
SHA1da30aa9cfabe5d5edefb1d3aad69ad0684288c5a
SHA256061909588a851102653c6903c33f0e09c99164ddc37b99629733346de1fa61fc
SHA512fc37bdcc1ac937ba6ae5191b21b306038c72f34b94c799a3083b87868a3a638632b9cb98b232cb69e7522ac6df0cfd94ffc69be2b585d67ce67379ba4f63faed
-
Filesize
342B
MD56e93a5952ef5579d31203bafe6089aa4
SHA11e86a0a4a6393466f4b0a0b402f38be512cf04ef
SHA256f90505243b7640d6590e03f0c18f82f2cca42a1ee993b7a2c5175f5d9d0c8bca
SHA512488459a7794178f078b37ac8b6ad99e9e8401f01cf7300a57b5d0d872dc9926c3e37c174e60f7b57314203bcf9ae0bad7229e6a3d77ad874d6d2f36fc0b6e3c3
-
Filesize
781B
MD58df0b2b021b98407f3cb061244c27d51
SHA1e49bd0def4b45a7c4eae5dcf9512d69f393e42bb
SHA256ae6b938ff0fe8fa964393c9c992c9ac31e541e973d00c8c5dc496d6b591d75e4
SHA512be27985120cfc36fc9657ec8802763b0eb4efea17659685b740be7f063955f3a29b415a40226903b113052aeb5d9547a36248f180f41bb7b4101837041370e0f
-
Filesize
830B
MD50a0a5b086b65b131f260011c84bd1037
SHA194a92df778535560ad058e11f34bbb84da2cf89c
SHA2568c50864cba327f0360f759ff7a908b8d6125b7a431df89c094c3c13bcf3a40eb
SHA5120ae8aca95828ae9c76486a9cdf9d6770b48556d918b136ea82a9af0ec0b277c00a91f3a9df6be48175df6cd87a2f01bc69fabc61125e3d6a70174759bdf26f67