Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/02/2024, 20:43
Static task
static1
Behavioral task
behavioral1
Sample
aa1cbbafc41735fe8e794a6e5d8e5410.dll
Resource
win7-20240221-en
General
-
Target
aa1cbbafc41735fe8e794a6e5d8e5410.dll
-
Size
264KB
-
MD5
aa1cbbafc41735fe8e794a6e5d8e5410
-
SHA1
439c128008abf32242c4290bba1232f20127d1f4
-
SHA256
e16ac3f14e8b78ef1f56643f0ecaa9310659d498e1a2712575763bf09c0c3376
-
SHA512
b35b7bd7433ac3d9d8299c5462f20f11bfc4e0303e17d189c089015cff9d57a38711703911662037452cf8d2a73db86b7b18aae3e5d265d84463c32a07d576e9
-
SSDEEP
6144:MQL46sq9C9X3xVHG8EnSEpawFWAf23j9Wpxhq:F5s1xVHG8ESkDcAfcjKxM
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2340 regsvr32mgr.exe -
Loads dropped DLL 4 IoCs
pid Process 1224 regsvr32.exe 1224 regsvr32.exe 2340 regsvr32mgr.exe 2340 regsvr32mgr.exe -
resource yara_rule behavioral1/memory/2340-11-0x0000000000400000-0x000000000046A000-memory.dmp upx -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{CC59E0F9-7E43-44FA-9FAA-8377850BF205}\NoExplorer = "1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{CC59E0F9-7E43-44FA-9FAA-8377850BF205} regsvr32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\regsvr32mgr.exe regsvr32.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{40D3F599-74F0-44D3-B059-76C0F12C0D6E}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{64844F4D-492F-429E-881C-D7F106259738}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC59E0F9-7E43-44FA-9FAA-8377850BF205}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Iecooks.FDMIEStat\ = "FDMIEStat Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D4D6EAB8-009E-4EED-814E-4891D7E1741B}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{351A47E5-B59E-4CF2-B81A-B651D75FE944}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{40D3F599-74F0-44D3-B059-76C0F12C0D6E}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC59E0F9-7E43-44FA-9FAA-8377850BF205} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D4D6EAB8-009E-4EED-814E-4891D7E1741B}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\aa1cbbafc41735fe8e794a6e5d8e5410.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{40D3F599-74F0-44D3-B059-76C0F12C0D6E} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{64844F4D-492F-429E-881C-D7F106259738}\ = "IFDMIEStat" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{64844F4D-492F-429E-881C-D7F106259738}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC59E0F9-7E43-44FA-9FAA-8377850BF205}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{40D3F599-74F0-44D3-B059-76C0F12C0D6E}\TypeLib\ = "{351A47E5-B59E-4CF2-B81A-B651D75FE944}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{64844F4D-492F-429E-881C-D7F106259738}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{40D3F599-74F0-44D3-B059-76C0F12C0D6E}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{64844F4D-492F-429E-881C-D7F106259738}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Iecooks.FDMIECookiesBHO.1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Iecooks.FDMIECookiesBHO\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC59E0F9-7E43-44FA-9FAA-8377850BF205}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Iecooks.FDMIEStat regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{40D3F599-74F0-44D3-B059-76C0F12C0D6E} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{64844F4D-492F-429E-881C-D7F106259738}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Iecooks.FDMIECookiesBHO.1\ = "FDMIECookiesBHO Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC59E0F9-7E43-44FA-9FAA-8377850BF205}\VersionIndependentProgID\ = "Iecooks.FDMIECookiesBHO" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC59E0F9-7E43-44FA-9FAA-8377850BF205}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D4D6EAB8-009E-4EED-814E-4891D7E1741B}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{351A47E5-B59E-4CF2-B81A-B651D75FE944}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\aa1cbbafc41735fe8e794a6e5d8e5410.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC59E0F9-7E43-44FA-9FAA-8377850BF205}\ = "FDMIECookiesBHO Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D4D6EAB8-009E-4EED-814E-4891D7E1741B}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{351A47E5-B59E-4CF2-B81A-B651D75FE944}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{351A47E5-B59E-4CF2-B81A-B651D75FE944}\1.0\ = "iecooks 1.0 Type Library" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{40D3F599-74F0-44D3-B059-76C0F12C0D6E}\ = "IFDMIECookiesBHO" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{40D3F599-74F0-44D3-B059-76C0F12C0D6E}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Iecooks.FDMIECookiesBHO.1\CLSID\ = "{CC59E0F9-7E43-44FA-9FAA-8377850BF205}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Iecooks.FDMIECookiesBHO\ = "FDMIECookiesBHO Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Iecooks.FDMIEStat\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Iecooks.FDMIEStat\CLSID\ = "{D4D6EAB8-009E-4EED-814E-4891D7E1741B}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D4D6EAB8-009E-4EED-814E-4891D7E1741B}\ProgID\ = "Iecooks.FDMIEStat.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{40D3F599-74F0-44D3-B059-76C0F12C0D6E}\TypeLib\ = "{351A47E5-B59E-4CF2-B81A-B651D75FE944}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Iecooks.FDMIECookiesBHO\CurVer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Iecooks.FDMIEStat\CurVer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{351A47E5-B59E-4CF2-B81A-B651D75FE944}\1.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{64844F4D-492F-429E-881C-D7F106259738}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{64844F4D-492F-429E-881C-D7F106259738} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Iecooks.FDMIECookiesBHO\CurVer\ = "Iecooks.FDMIECookiesBHO.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{40D3F599-74F0-44D3-B059-76C0F12C0D6E}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{64844F4D-492F-429E-881C-D7F106259738}\TypeLib\ = "{351A47E5-B59E-4CF2-B81A-B651D75FE944}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{64844F4D-492F-429E-881C-D7F106259738}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Iecooks.FDMIEStat.1\ = "FDMIEStat Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{40D3F599-74F0-44D3-B059-76C0F12C0D6E}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{64844F4D-492F-429E-881C-D7F106259738}\TypeLib\ = "{351A47E5-B59E-4CF2-B81A-B651D75FE944}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Iecooks.FDMIECookiesBHO regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D4D6EAB8-009E-4EED-814E-4891D7E1741B}\VersionIndependentProgID\ = "Iecooks.FDMIEStat" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{351A47E5-B59E-4CF2-B81A-B651D75FE944}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{40D3F599-74F0-44D3-B059-76C0F12C0D6E}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{40D3F599-74F0-44D3-B059-76C0F12C0D6E}\ = "IFDMIECookiesBHO" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Iecooks.FDMIECookiesBHO.1\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC59E0F9-7E43-44FA-9FAA-8377850BF205}\TypeLib\ = "{351A47E5-B59E-4CF2-B81A-B651D75FE944}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{351A47E5-B59E-4CF2-B81A-B651D75FE944}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Iecooks.FDMIECookiesBHO\CLSID\ = "{CC59E0F9-7E43-44FA-9FAA-8377850BF205}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC59E0F9-7E43-44FA-9FAA-8377850BF205}\ProgID\ = "Iecooks.FDMIECookiesBHO.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Iecooks.FDMIEStat.1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{64844F4D-492F-429E-881C-D7F106259738} regsvr32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1756 wrote to memory of 1224 1756 regsvr32.exe 28 PID 1756 wrote to memory of 1224 1756 regsvr32.exe 28 PID 1756 wrote to memory of 1224 1756 regsvr32.exe 28 PID 1756 wrote to memory of 1224 1756 regsvr32.exe 28 PID 1756 wrote to memory of 1224 1756 regsvr32.exe 28 PID 1756 wrote to memory of 1224 1756 regsvr32.exe 28 PID 1756 wrote to memory of 1224 1756 regsvr32.exe 28 PID 1224 wrote to memory of 2340 1224 regsvr32.exe 29 PID 1224 wrote to memory of 2340 1224 regsvr32.exe 29 PID 1224 wrote to memory of 2340 1224 regsvr32.exe 29 PID 1224 wrote to memory of 2340 1224 regsvr32.exe 29
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\aa1cbbafc41735fe8e794a6e5d8e5410.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\aa1cbbafc41735fe8e794a6e5d8e5410.dll2⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWOW64\regsvr32mgr.exeC:\Windows\SysWOW64\regsvr32mgr.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\guwumtan.exeC:\Users\Admin\AppData\Local\Temp\guwumtan.exe4⤵PID:2740
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
559KB
MD52aa6d22320983a99311f5d61c9f52584
SHA1b3644928ebc723f9a39b40baae37951c9949b82f
SHA25600505ca38dad85816333c45bda87a99ba84f19ca72804e700aa40d4a6a2fe631
SHA512880610658737df3063590cfea5b4f06ba8cb027e35500fd5187973fe8f618d69724aa36eace0e9408af58542ad6f5b9850c3586735faca1ad554c339367c7c0e
-
Filesize
1.1MB
MD59b98d47916ead4f69ef51b56b0c2323c
SHA1290a80b4ded0efc0fd00816f373fcea81a521330
SHA25696e0ae104c9662d0d20fdf59844c2d18334e5847b6c4fc7f8ce4b3b87f39887b
SHA51268b67021f228d8d71df4deb0b6388558b2f935a6aa466a12199cd37ada47ee588ea407b278d190d3a498b0ef3f5f1a2573a469b7ea5561ab2e7055c45565fe94
-
Filesize
162KB
MD56c1e199ccc02acaf6e962eb75acb8c98
SHA1742db8306bdbc1759d73eabd7914a93f94478cc7
SHA2568408dc27c9c9a7b6ffa3fc2484284be71709d714f33a0b2e0ee51da03f7c7e0f
SHA5126c8151370cc7264cab59d2c5cc03c2bc384a4cd44d2a58d431d3fca7ef2318b2aced1fa7fb21d6e4ca7fb25392912e5ef8592cfff9755ecc59b9af9fd1e14b3c