Analysis
-
max time kernel
151s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27/02/2024, 20:43
Static task
static1
Behavioral task
behavioral1
Sample
aa1cbbafc41735fe8e794a6e5d8e5410.dll
Resource
win7-20240221-en
General
-
Target
aa1cbbafc41735fe8e794a6e5d8e5410.dll
-
Size
264KB
-
MD5
aa1cbbafc41735fe8e794a6e5d8e5410
-
SHA1
439c128008abf32242c4290bba1232f20127d1f4
-
SHA256
e16ac3f14e8b78ef1f56643f0ecaa9310659d498e1a2712575763bf09c0c3376
-
SHA512
b35b7bd7433ac3d9d8299c5462f20f11bfc4e0303e17d189c089015cff9d57a38711703911662037452cf8d2a73db86b7b18aae3e5d265d84463c32a07d576e9
-
SSDEEP
6144:MQL46sq9C9X3xVHG8EnSEpawFWAf23j9Wpxhq:F5s1xVHG8ESkDcAfcjKxM
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4996 regsvr32mgr.exe -
Loads dropped DLL 1 IoCs
pid Process 4996 regsvr32mgr.exe -
resource yara_rule behavioral2/memory/4996-6-0x0000000000400000-0x000000000046A000-memory.dmp upx -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{CC59E0F9-7E43-44FA-9FAA-8377850BF205} regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{CC59E0F9-7E43-44FA-9FAA-8377850BF205}\NoExplorer = "1" regsvr32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\regsvr32mgr.exe regsvr32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3292 4996 WerFault.exe 97 -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC59E0F9-7E43-44FA-9FAA-8377850BF205}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D4D6EAB8-009E-4EED-814E-4891D7E1741B} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D4D6EAB8-009E-4EED-814E-4891D7E1741B}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{64844F4D-492F-429E-881C-D7F106259738}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Iecooks.FDMIECookiesBHO.1\CLSID\ = "{CC59E0F9-7E43-44FA-9FAA-8377850BF205}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Iecooks.FDMIECookiesBHO regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{64844F4D-492F-429E-881C-D7F106259738}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{351A47E5-B59E-4CF2-B81A-B651D75FE944}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\aa1cbbafc41735fe8e794a6e5d8e5410.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{40D3F599-74F0-44D3-B059-76C0F12C0D6E}\ = "IFDMIECookiesBHO" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D4D6EAB8-009E-4EED-814E-4891D7E1741B}\ProgID\ = "Iecooks.FDMIEStat.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{64844F4D-492F-429E-881C-D7F106259738} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Iecooks.FDMIECookiesBHO\CLSID\ = "{CC59E0F9-7E43-44FA-9FAA-8377850BF205}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC59E0F9-7E43-44FA-9FAA-8377850BF205}\VersionIndependentProgID\ = "Iecooks.FDMIECookiesBHO" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{351A47E5-B59E-4CF2-B81A-B651D75FE944}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC59E0F9-7E43-44FA-9FAA-8377850BF205}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Iecooks.FDMIEStat\ = "FDMIEStat Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{40D3F599-74F0-44D3-B059-76C0F12C0D6E}\TypeLib\ = "{351A47E5-B59E-4CF2-B81A-B651D75FE944}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{64844F4D-492F-429E-881C-D7F106259738}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Iecooks.FDMIECookiesBHO.1\ = "FDMIECookiesBHO Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Iecooks.FDMIECookiesBHO\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{351A47E5-B59E-4CF2-B81A-B651D75FE944}\1.0\ = "iecooks 1.0 Type Library" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{351A47E5-B59E-4CF2-B81A-B651D75FE944}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{40D3F599-74F0-44D3-B059-76C0F12C0D6E}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{64844F4D-492F-429E-881C-D7F106259738}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{64844F4D-492F-429E-881C-D7F106259738}\ = "IFDMIEStat" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC59E0F9-7E43-44FA-9FAA-8377850BF205}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC59E0F9-7E43-44FA-9FAA-8377850BF205}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{351A47E5-B59E-4CF2-B81A-B651D75FE944}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{40D3F599-74F0-44D3-B059-76C0F12C0D6E}\TypeLib\ = "{351A47E5-B59E-4CF2-B81A-B651D75FE944}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D4D6EAB8-009E-4EED-814E-4891D7E1741B}\VersionIndependentProgID\ = "Iecooks.FDMIEStat" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{351A47E5-B59E-4CF2-B81A-B651D75FE944}\1.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC59E0F9-7E43-44FA-9FAA-8377850BF205}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D4D6EAB8-009E-4EED-814E-4891D7E1741B}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{40D3F599-74F0-44D3-B059-76C0F12C0D6E}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Iecooks.FDMIECookiesBHO.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC59E0F9-7E43-44FA-9FAA-8377850BF205}\ = "FDMIECookiesBHO Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Iecooks.FDMIEStat\CurVer\ = "Iecooks.FDMIEStat.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D4D6EAB8-009E-4EED-814E-4891D7E1741B}\TypeLib\ = "{351A47E5-B59E-4CF2-B81A-B651D75FE944}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{40D3F599-74F0-44D3-B059-76C0F12C0D6E} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{40D3F599-74F0-44D3-B059-76C0F12C0D6E}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC59E0F9-7E43-44FA-9FAA-8377850BF205}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Iecooks.FDMIEStat\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC59E0F9-7E43-44FA-9FAA-8377850BF205}\TypeLib\ = "{351A47E5-B59E-4CF2-B81A-B651D75FE944}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Iecooks.FDMIEStat regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{351A47E5-B59E-4CF2-B81A-B651D75FE944}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{40D3F599-74F0-44D3-B059-76C0F12C0D6E}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{40D3F599-74F0-44D3-B059-76C0F12C0D6E} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{64844F4D-492F-429E-881C-D7F106259738}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Iecooks.FDMIECookiesBHO\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Iecooks.FDMIECookiesBHO\CurVer\ = "Iecooks.FDMIECookiesBHO.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D4D6EAB8-009E-4EED-814E-4891D7E1741B}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{351A47E5-B59E-4CF2-B81A-B651D75FE944}\1.0\FLAGS\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{40D3F599-74F0-44D3-B059-76C0F12C0D6E}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{64844F4D-492F-429E-881C-D7F106259738}\TypeLib\ = "{351A47E5-B59E-4CF2-B81A-B651D75FE944}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC59E0F9-7E43-44FA-9FAA-8377850BF205} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Iecooks.FDMIEStat.1\ = "FDMIEStat Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{40D3F599-74F0-44D3-B059-76C0F12C0D6E}\ = "IFDMIECookiesBHO" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{40D3F599-74F0-44D3-B059-76C0F12C0D6E}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{40D3F599-74F0-44D3-B059-76C0F12C0D6E}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{64844F4D-492F-429E-881C-D7F106259738}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{64844F4D-492F-429E-881C-D7F106259738}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{351A47E5-B59E-4CF2-B81A-B651D75FE944} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{351A47E5-B59E-4CF2-B81A-B651D75FE944}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Iecooks.FDMIEStat\CLSID\ = "{D4D6EAB8-009E-4EED-814E-4891D7E1741B}" regsvr32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1040 wrote to memory of 2540 1040 regsvr32.exe 94 PID 1040 wrote to memory of 2540 1040 regsvr32.exe 94 PID 1040 wrote to memory of 2540 1040 regsvr32.exe 94 PID 2540 wrote to memory of 4996 2540 regsvr32.exe 97 PID 2540 wrote to memory of 4996 2540 regsvr32.exe 97 PID 2540 wrote to memory of 4996 2540 regsvr32.exe 97
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\aa1cbbafc41735fe8e794a6e5d8e5410.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\aa1cbbafc41735fe8e794a6e5d8e5410.dll2⤵
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\regsvr32mgr.exeC:\Windows\SysWOW64\regsvr32mgr.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4996 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4996 -s 101964⤵
- Program crash
PID:3292
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4996 -ip 49961⤵PID:3252
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3736 --field-trial-handle=2232,i,11267738607351977302,107266978269557304,262144 --variations-seed-version /prefetch:81⤵PID:1208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD54f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219
-
Filesize
162KB
MD56c1e199ccc02acaf6e962eb75acb8c98
SHA1742db8306bdbc1759d73eabd7914a93f94478cc7
SHA2568408dc27c9c9a7b6ffa3fc2484284be71709d714f33a0b2e0ee51da03f7c7e0f
SHA5126c8151370cc7264cab59d2c5cc03c2bc384a4cd44d2a58d431d3fca7ef2318b2aced1fa7fb21d6e4ca7fb25392912e5ef8592cfff9755ecc59b9af9fd1e14b3c