Analysis
-
max time kernel
93s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25/02/2024, 08:59
Static task
static1
Behavioral task
behavioral1
Sample
a36141b2055a3284cc1b0375ddb9090e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a36141b2055a3284cc1b0375ddb9090e.exe
Resource
win10v2004-20240221-en
General
-
Target
a36141b2055a3284cc1b0375ddb9090e.exe
-
Size
218KB
-
MD5
a36141b2055a3284cc1b0375ddb9090e
-
SHA1
0f1f59c5261ab76e202722459e55424626573ee8
-
SHA256
6816acd73cc1c029dc9a7bbc1543758694056f692c8293a6da517ea2d1425673
-
SHA512
455875d2eb923eba561f7be74f9eff90c79124b56a717b303d8dd2e1de16af4ca2f4b07bba0e88813e73c891469f88333a0c59aedbb5250563b694e234838ee7
-
SSDEEP
3072:VgDaLX9QXu6gQ/tUHC4yvtyxJvTqLf82ImtIQ8PwNtR7nB+kV0KUwaXJC8z/xWiT:qaLX96ubctUHC4yvtyX2frIsUwFgkVh
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = ",C:\\Windows\\system32\\mrcmgr.exe," mrcmgr.exe -
Modifies firewall policy service 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List\28473:TCP = "28473:TCP:*:Enabled:port" mrcmgr.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List\12488:TCP = "12488:TCP:*:Enabled:port" mrcmgr.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List mrcmgr.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications mrcmgr.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\%windir%\explorer.exe = "%windir%\\explorer.exe:*:Enabled:Explorer" mrcmgr.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List mrcmgr.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile mrcmgr.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts mrcmgr.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run mrcmgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\1 = "C:\\Windows\\system32\\mrcmgr.exe" mrcmgr.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1712835645-2080934712-2142796781-1000\Control Panel\International\Geo\Nation a36141b2055a3284cc1b0375ddb9090e.exe Key value queried \REGISTRY\USER\S-1-5-21-1712835645-2080934712-2142796781-1000\Control Panel\International\Geo\Nation mrcmgr.exe -
Executes dropped EXE 1 IoCs
pid Process 1864 mrcmgr.exe -
Loads dropped DLL 2 IoCs
pid Process 2312 regsvr32.exe 2636 regsvr32.exe -
resource yara_rule behavioral2/files/0x0006000000023217-8.dat upx behavioral2/memory/1864-12-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/1864-21-0x0000000000400000-0x000000000041C000-memory.dmp upx -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{161B953B-95F9-4af3-B071-D5FF5EA132EF} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1A4F919F-4334-4abf-BF47-0836A8B5A54B} regsvr32.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\hl.dat a36141b2055a3284cc1b0375ddb9090e.exe File created C:\Windows\SysWOW64\scerpt.dll a36141b2055a3284cc1b0375ddb9090e.exe File opened for modification C:\Windows\SysWOW64\prxsmr.dll mrcmgr.exe File opened for modification C:\Windows\SysWOW64\ddr7xm.dll mrcmgr.exe File created C:\Windows\SysWOW64\mshpc.dll a36141b2055a3284cc1b0375ddb9090e.exe File created C:\Windows\SysWOW64\mp7arc.dat a36141b2055a3284cc1b0375ddb9090e.exe File created C:\Windows\SysWOW64\mrcmgr.exe a36141b2055a3284cc1b0375ddb9090e.exe File created C:\Windows\SysWOW64\prxsmr.dll mrcmgr.exe File created C:\Windows\SysWOW64\ddr7xm.dll mrcmgr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1712835645-2080934712-2142796781-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1712835645-2080934712-2142796781-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1712835645-2080934712-2142796781-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1712835645-2080934712-2142796781-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1712835645-2080934712-2142796781-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "372011904" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1712835645-2080934712-2142796781-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1712835645-2080934712-2142796781-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1712835645-2080934712-2142796781-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "372011904" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1712835645-2080934712-2142796781-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31090633" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1712835645-2080934712-2142796781-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1712835645-2080934712-2142796781-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1712835645-2080934712-2142796781-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1712835645-2080934712-2142796781-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1712835645-2080934712-2142796781-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1712835645-2080934712-2142796781-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31090633" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1712835645-2080934712-2142796781-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1712835645-2080934712-2142796781-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1712835645-2080934712-2142796781-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1712835645-2080934712-2142796781-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1712835645-2080934712-2142796781-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1712835645-2080934712-2142796781-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1712835645-2080934712-2142796781-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "415616575" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1712835645-2080934712-2142796781-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1712835645-2080934712-2142796781-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1712835645-2080934712-2142796781-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "374980225" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1712835645-2080934712-2142796781-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31090633" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1712835645-2080934712-2142796781-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{41D1353E-D3BC-11EE-AF9B-4E7D9308121B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1712835645-2080934712-2142796781-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1712835645-2080934712-2142796781-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1712835645-2080934712-2142796781-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSApp.BhoApp\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Mdd.MddApp.1\ = "MddApp Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{244F3263-6C3C-469C-AECE-FF46D84A0A3B}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSApp.BhoApp\CLSID\ = "{161B953B-95F9-4af3-B071-D5FF5EA132EF}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2D51E439-3AE8-4BF7-8FB2-45F768554DEC}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{30989926-2D37-4561-B76F-65D0F89A3560}\ = "IApp" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1A4F919F-4334-4abf-BF47-0836A8B5A54B}\InprocServer32\ = "C:\\Windows\\SysWow64\\ddr7xm.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSApp.BhoApp regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Mdd.MddApp.1\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Mdd.MddApp.1\CLSID\ = "{1A4F919F-4334-4abf-BF47-0836A8B5A54B}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1A4F919F-4334-4abf-BF47-0836A8B5A54B}\TypeLib\ = "{F6FBADC6-F435-4b4b-9153-8DFF61BCF996}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{572AB3DC-60AC-4FCB-B0F6-8B010ECFE90A}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC3D9EE3-8304-4228-ADC2-234D035FEB89}\InprocServer32\hp = "28473" mrcmgr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Mmdd.MddApp regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSApp.BhoApp.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{161B953B-95F9-4af3-B071-D5FF5EA132EF}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2D51E439-3AE8-4BF7-8FB2-45F768554DEC}\1.0\HELPDIR\ = "C:\\Windows\\system32" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1A4F919F-4334-4abf-BF47-0836A8B5A54B} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{244F3263-6C3C-469C-AECE-FF46D84A0A3B} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{244F3263-6C3C-469C-AECE-FF46D84A0A3B}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSApp.BhoApp.1\CLSID\ = "{161B953B-95F9-4af3-B071-D5FF5EA132EF}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSApp.BhoApp\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{161B953B-95F9-4af3-B071-D5FF5EA132EF}\InprocServer32\ = "C:\\Windows\\SysWow64\\mshpc.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{30989926-2D37-4561-B76F-65D0F89A3560}\TypeLib\ = "{2D51E439-3AE8-4BF7-8FB2-45F768554DEC}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Mdd.MddApp.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSApp.BhoApp\CurVer\ = "MSApp.BhoApp.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{161B953B-95F9-4af3-B071-D5FF5EA132EF}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2D51E439-3AE8-4BF7-8FB2-45F768554DEC}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F6FBADC6-F435-4B4B-9153-8DFF61BCF996}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC3D9EE3-8304-4228-ADC2-234D035FEB89}\InprocServer32\sp = "12488" mrcmgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{30989926-2D37-4561-B76F-65D0F89A3560}\ = "IApp" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F6FBADC6-F435-4B4B-9153-8DFF61BCF996}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{572AB3DC-60AC-4FCB-B0F6-8B010ECFE90A} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1A4F919F-4334-4abf-BF47-0836A8B5A54B}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{161B953B-95F9-4af3-B071-D5FF5EA132EF}\ = "IE Microsoft extension" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2D51E439-3AE8-4BF7-8FB2-45F768554DEC}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2D51E439-3AE8-4BF7-8FB2-45F768554DEC}\1.0\HELPDIR regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{30989926-2D37-4561-B76F-65D0F89A3560}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Mmdd.MddApp\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Mmdd.MddApp\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{161B953B-95F9-4af3-B071-D5FF5EA132EF}\TypeLib\ = "{2D51E439-3AE8-4bf7-8FB2-45F768554DEC}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{ECEE577A-5B6F-4BDC-9210-DB603D6BEF78}\ = "_IAppEvents" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F6FBADC6-F435-4B4B-9153-8DFF61BCF996}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2D51E439-3AE8-4BF7-8FB2-45F768554DEC}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\mshpc.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{244F3263-6C3C-469C-AECE-FF46D84A0A3B}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{30989926-2D37-4561-B76F-65D0F89A3560}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{30989926-2D37-4561-B76F-65D0F89A3560}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F6FBADC6-F435-4B4B-9153-8DFF61BCF996}\1.0\HELPDIR\ = "C:\\Windows\\system32" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{244F3263-6C3C-469C-AECE-FF46D84A0A3B}\TypeLib\ = "{F6FBADC6-F435-4B4B-9153-8DFF61BCF996}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{572AB3DC-60AC-4FCB-B0F6-8B010ECFE90A}\TypeLib\ = "{F6FBADC6-F435-4B4B-9153-8DFF61BCF996}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{572AB3DC-60AC-4FCB-B0F6-8B010ECFE90A}\ = "IMApp" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{161B953B-95F9-4af3-B071-D5FF5EA132EF}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1A4F919F-4334-4abf-BF47-0836A8B5A54B}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F6FBADC6-F435-4B4B-9153-8DFF61BCF996}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\ddr7xm.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{244F3263-6C3C-469C-AECE-FF46D84A0A3B}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{ECEE577A-5B6F-4BDC-9210-DB603D6BEF78}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{30989926-2D37-4561-B76F-65D0F89A3560} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC3D9EE3-8304-4228-ADC2-234D035FEB89} mrcmgr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{ECEE577A-5B6F-4BDC-9210-DB603D6BEF78}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{30989926-2D37-4561-B76F-65D0F89A3560}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{161B953B-95F9-4af3-B071-D5FF5EA132EF} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2D51E439-3AE8-4BF7-8FB2-45F768554DEC} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{ECEE577A-5B6F-4BDC-9210-DB603D6BEF78}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{30989926-2D37-4561-B76F-65D0F89A3560}\TypeLib\ = "{2D51E439-3AE8-4BF7-8FB2-45F768554DEC}" regsvr32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5000 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 5000 iexplore.exe 5000 iexplore.exe 4940 IEXPLORE.EXE 4940 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3244 wrote to memory of 2312 3244 a36141b2055a3284cc1b0375ddb9090e.exe 90 PID 3244 wrote to memory of 2312 3244 a36141b2055a3284cc1b0375ddb9090e.exe 90 PID 3244 wrote to memory of 2312 3244 a36141b2055a3284cc1b0375ddb9090e.exe 90 PID 3244 wrote to memory of 1864 3244 a36141b2055a3284cc1b0375ddb9090e.exe 91 PID 3244 wrote to memory of 1864 3244 a36141b2055a3284cc1b0375ddb9090e.exe 91 PID 3244 wrote to memory of 1864 3244 a36141b2055a3284cc1b0375ddb9090e.exe 91 PID 3244 wrote to memory of 5000 3244 a36141b2055a3284cc1b0375ddb9090e.exe 92 PID 3244 wrote to memory of 5000 3244 a36141b2055a3284cc1b0375ddb9090e.exe 92 PID 1864 wrote to memory of 2636 1864 mrcmgr.exe 93 PID 1864 wrote to memory of 2636 1864 mrcmgr.exe 93 PID 1864 wrote to memory of 2636 1864 mrcmgr.exe 93 PID 5000 wrote to memory of 4940 5000 iexplore.exe 94 PID 5000 wrote to memory of 4940 5000 iexplore.exe 94 PID 5000 wrote to memory of 4940 5000 iexplore.exe 94 PID 1864 wrote to memory of 116 1864 mrcmgr.exe 97 PID 1864 wrote to memory of 116 1864 mrcmgr.exe 97 PID 1864 wrote to memory of 116 1864 mrcmgr.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\a36141b2055a3284cc1b0375ddb9090e.exe"C:\Users\Admin\AppData\Local\Temp\a36141b2055a3284cc1b0375ddb9090e.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s C:\Windows\system32\mshpc.dll2⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:2312
-
-
C:\Windows\SysWOW64\mrcmgr.exe"C:\Windows\System32\mrcmgr.exe"2⤵
- Modifies WinLogon for persistence
- Modifies firewall policy service
- Adds policy Run key to start application
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s C:\Windows\system32\ddr7xm.dll3⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:2636
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\System32\explorer.exe"3⤵PID:116
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5000 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4940
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Browser Extensions
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
48KB
MD5951ec5c255c79f4164d27b14da454dbe
SHA1e3b9322831bca6f37a901e8b3597ffd7aab7ea8b
SHA2562f72b6e6fa6bb70ad0e70c67c854d61e1ad5b69ccdd0a8882e679cafc347f8fe
SHA51218b83ed995d683eb9052c270c4fbf996f57fa337b40fc096595840146477b1001893d5242a582c56ac07200d24fe86a4845e7304a8a0c31b425af5fe3980f92f
-
Filesize
62KB
MD562155b9211b8f50a41c85dc8fc0b30ae
SHA1277e71a59849bc89e39ba0940aa44a14746c7602
SHA256ed2510ed98fa1068c60043f5b700190666854891152ffd436ecb7ff677b4863e
SHA5126942a889d3b9e518b4c0d7b19f49df9558fb4649fdaa1fa1a2ce8bdfa990d356a859d526f362674eca62d73efc9e8b5c9ebec831e3557b84a4a05b7e0ec7a913
-
Filesize
100KB
MD56149cc928cfba138d2b32ee0f81be927
SHA1963a3f062fefc8fafeb6b00f07ca45c99ae5dcbf
SHA25613d8c1c10a1640af046c555675b99b6bdc7ad941a7fb32098fe4fe2b9c79ef93
SHA51296e03153cc17e56b8f39c27c6169a46b9d29f1124a4765f0e6678628532a4309acf87b5a0d3b52cf9c672d0626255c38d2a9f2973e20b350e21195de88ea1b2b