Malware Analysis Report

2025-03-14 22:31

Sample ID 240304-rdwfcsbh8w
Target b250c295ec5bfe1575a29b350a13f688
SHA256 1b41a17f665da5aa94b2ca75031ade1dd760c8a6bf95e4a5e4cb0563e6200dc5
Tags
adware persistence stealer
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

SHA256

1b41a17f665da5aa94b2ca75031ade1dd760c8a6bf95e4a5e4cb0563e6200dc5

Threat Level: Likely malicious

The file b250c295ec5bfe1575a29b350a13f688 was found to be: Likely malicious.

Malicious Activity Summary

adware persistence stealer

Adds policy Run key to start application

Loads dropped DLL

Installs/modifies Browser Helper Object

Drops file in System32 directory

Unsigned PE

Modifies Internet Explorer start page

Modifies registry class

Modifies Internet Explorer settings

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-03-04 14:05

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-03-04 14:05

Reported

2024-03-04 14:07

Platform

win7-20240221-en

Max time kernel

119s

Max time network

124s

Command Line

"C:\Users\Admin\AppData\Local\Temp\b250c295ec5bfe1575a29b350a13f688.exe"

Signatures

Adds policy Run key to start application

persistence
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\explorer\run C:\Users\Admin\AppData\Local\Temp\b250c295ec5bfe1575a29b350a13f688.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\nvctrl.exe = "nvctrl.exe" C:\Users\Admin\AppData\Local\Temp\b250c295ec5bfe1575a29b350a13f688.exe N/A

Installs/modifies Browser Helper Object

stealer adware
Description Indicator Process Target
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} C:\Users\Admin\AppData\Local\Temp\b250c295ec5bfe1575a29b350a13f688.exe N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} C:\Users\Admin\AppData\Local\Temp\b250c295ec5bfe1575a29b350a13f688.exe N/A
Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects C:\Users\Admin\AppData\Local\Temp\b250c295ec5bfe1575a29b350a13f688.exe N/A
Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{4da4616d-7e6e-4fd9-a2d5-b6c535733e22} C:\Users\Admin\AppData\Local\Temp\b250c295ec5bfe1575a29b350a13f688.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{4da4616d-7e6e-4fd9-a2d5-b6c535733e22}\ C:\Users\Admin\AppData\Local\Temp\b250c295ec5bfe1575a29b350a13f688.exe N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{18DF081C-E8AD-4283-A596-FA578C2EBDC3} C:\Users\Admin\AppData\Local\Temp\b250c295ec5bfe1575a29b350a13f688.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\hp8BDB.tmp C:\Users\Admin\AppData\Local\Temp\b250c295ec5bfe1575a29b350a13f688.exe N/A
File opened for modification C:\Windows\SysWOW64\ncompat.tlb C:\Users\Admin\AppData\Local\Temp\b250c295ec5bfe1575a29b350a13f688.exe N/A
File created C:\Windows\SysWOW64\ncompat.tlb C:\Users\Admin\AppData\Local\Temp\b250c295ec5bfe1575a29b350a13f688.exe N/A
File created C:\Windows\SysWOW64\interf.tlb C:\Users\Admin\AppData\Local\Temp\b250c295ec5bfe1575a29b350a13f688.exe N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main C:\Users\Admin\AppData\Local\Temp\b250c295ec5bfe1575a29b350a13f688.exe N/A
Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Search C:\Users\Admin\AppData\Local\Temp\b250c295ec5bfe1575a29b350a13f688.exe N/A
Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchUrl C:\Users\Admin\AppData\Local\Temp\b250c295ec5bfe1575a29b350a13f688.exe N/A

Modifies Internet Explorer start page

stealer
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "about:blank" C:\Users\Admin\AppData\Local\Temp\b250c295ec5bfe1575a29b350a13f688.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID C:\Users\Admin\AppData\Local\Temp\b250c295ec5bfe1575a29b350a13f688.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4DA4616D-7E6E-4FD9-A2D5-B6C535733E22} C:\Users\Admin\AppData\Local\Temp\b250c295ec5bfe1575a29b350a13f688.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4DA4616D-7E6E-4FD9-A2D5-B6C535733E22}\ = "Nothing" C:\Users\Admin\AppData\Local\Temp\b250c295ec5bfe1575a29b350a13f688.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4DA4616D-7E6E-4FD9-A2D5-B6C535733E22}\InprocServer32 C:\Users\Admin\AppData\Local\Temp\b250c295ec5bfe1575a29b350a13f688.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4DA4616D-7E6E-4FD9-A2D5-B6C535733E22}\InprocServer32\ = "C:\\Windows\\SysWow64\\hp8BDB.tmp" C:\Users\Admin\AppData\Local\Temp\b250c295ec5bfe1575a29b350a13f688.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4DA4616D-7E6E-4FD9-A2D5-B6C535733E22}\InprocServer32\ThreadingModel = "Apartment" C:\Users\Admin\AppData\Local\Temp\b250c295ec5bfe1575a29b350a13f688.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{4da4616d-7e6e-4fd9-a2d5-b6c535733e22}\InprocServer32 C:\Users\Admin\AppData\Local\Temp\b250c295ec5bfe1575a29b350a13f688.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\b250c295ec5bfe1575a29b350a13f688.exe

"C:\Users\Admin\AppData\Local\Temp\b250c295ec5bfe1575a29b350a13f688.exe"

Network

N/A

Files

\Windows\SysWOW64\hp8BDB.tmp

MD5 aaa4d8f2e5259a64da931b1d99d2a615
SHA1 608acb7476ff36f0a7f4254888fe15fa8403097c
SHA256 c1951c3add8a86ffff249160c215f1da19c55b25a389856d26925ebe4941732c
SHA512 4211beba14922a36284a74526d7cec77b089d225dd624ecd2f335e5880753d70b15e2518c5bda39846cedf94ab2058a0fe07451dc393c327031b86640cc74d8d

\Windows\SysWOW64\interf.tlb

MD5 aa8c73f100420cbdfda7ddc4c036d3b5
SHA1 fb9d2a76b38464147cd754dafd50878b869876ff
SHA256 54db2eb0c7e7bf1b533b58f48a1f1af54fe3df1c2e48de20f1864cc442b5f63b
SHA512 e97532d2ced7897e097892de51d36f254d4b01b2ff9c9bfaee6ff661172acde7837dbb530b129dca0bad9f9c65f0109544f4da73e04f137845ccf21dae10880a

Analysis: behavioral2

Detonation Overview

Submitted

2024-03-04 14:05

Reported

2024-03-04 14:07

Platform

win10v2004-20240226-en

Max time kernel

104s

Max time network

113s

Command Line

"C:\Users\Admin\AppData\Local\Temp\b250c295ec5bfe1575a29b350a13f688.exe"

Signatures

Adds policy Run key to start application

persistence
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\explorer\run C:\Users\Admin\AppData\Local\Temp\b250c295ec5bfe1575a29b350a13f688.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\nvctrl.exe = "nvctrl.exe" C:\Users\Admin\AppData\Local\Temp\b250c295ec5bfe1575a29b350a13f688.exe N/A

Installs/modifies Browser Helper Object

stealer adware
Description Indicator Process Target
Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{4da4616d-7e6e-4fd9-a2d5-b6c535733e22} C:\Users\Admin\AppData\Local\Temp\b250c295ec5bfe1575a29b350a13f688.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{4da4616d-7e6e-4fd9-a2d5-b6c535733e22}\ C:\Users\Admin\AppData\Local\Temp\b250c295ec5bfe1575a29b350a13f688.exe N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} C:\Users\Admin\AppData\Local\Temp\b250c295ec5bfe1575a29b350a13f688.exe N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA} C:\Users\Admin\AppData\Local\Temp\b250c295ec5bfe1575a29b350a13f688.exe N/A
Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects C:\Users\Admin\AppData\Local\Temp\b250c295ec5bfe1575a29b350a13f688.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\hp730D.tmp C:\Users\Admin\AppData\Local\Temp\b250c295ec5bfe1575a29b350a13f688.exe N/A
File opened for modification C:\Windows\SysWOW64\ncompat.tlb C:\Users\Admin\AppData\Local\Temp\b250c295ec5bfe1575a29b350a13f688.exe N/A
File created C:\Windows\SysWOW64\ncompat.tlb C:\Users\Admin\AppData\Local\Temp\b250c295ec5bfe1575a29b350a13f688.exe N/A
File created C:\Windows\SysWOW64\interf.tlb C:\Users\Admin\AppData\Local\Temp\b250c295ec5bfe1575a29b350a13f688.exe N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Internet Explorer\Main C:\Users\Admin\AppData\Local\Temp\b250c295ec5bfe1575a29b350a13f688.exe N/A
Key created \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Internet Explorer\Search C:\Users\Admin\AppData\Local\Temp\b250c295ec5bfe1575a29b350a13f688.exe N/A
Key created \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Internet Explorer\SearchUrl C:\Users\Admin\AppData\Local\Temp\b250c295ec5bfe1575a29b350a13f688.exe N/A

Modifies Internet Explorer start page

stealer
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "about:blank" C:\Users\Admin\AppData\Local\Temp\b250c295ec5bfe1575a29b350a13f688.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{4da4616d-7e6e-4fd9-a2d5-b6c535733e22}\InprocServer32 C:\Users\Admin\AppData\Local\Temp\b250c295ec5bfe1575a29b350a13f688.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID C:\Users\Admin\AppData\Local\Temp\b250c295ec5bfe1575a29b350a13f688.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4DA4616D-7E6E-4FD9-A2D5-B6C535733E22} C:\Users\Admin\AppData\Local\Temp\b250c295ec5bfe1575a29b350a13f688.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4DA4616D-7E6E-4FD9-A2D5-B6C535733E22}\ = "Nothing" C:\Users\Admin\AppData\Local\Temp\b250c295ec5bfe1575a29b350a13f688.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4DA4616D-7E6E-4FD9-A2D5-B6C535733E22}\InprocServer32 C:\Users\Admin\AppData\Local\Temp\b250c295ec5bfe1575a29b350a13f688.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4DA4616D-7E6E-4FD9-A2D5-B6C535733E22}\InprocServer32\ = "C:\\Windows\\SysWow64\\hp730D.tmp" C:\Users\Admin\AppData\Local\Temp\b250c295ec5bfe1575a29b350a13f688.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4DA4616D-7E6E-4FD9-A2D5-B6C535733E22}\InprocServer32\ThreadingModel = "Apartment" C:\Users\Admin\AppData\Local\Temp\b250c295ec5bfe1575a29b350a13f688.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\b250c295ec5bfe1575a29b350a13f688.exe

"C:\Users\Admin\AppData\Local\Temp\b250c295ec5bfe1575a29b350a13f688.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 134.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 210.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.200:443 g.bing.com tcp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 241.154.82.20.in-addr.arpa udp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 8.8.8.8:53 41.110.16.96.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 217.135.221.88.in-addr.arpa udp
US 8.8.8.8:53 180.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 202.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 31.243.111.52.in-addr.arpa udp

Files

C:\Windows\SysWOW64\hp730D.tmp

MD5 aaa4d8f2e5259a64da931b1d99d2a615
SHA1 608acb7476ff36f0a7f4254888fe15fa8403097c
SHA256 c1951c3add8a86ffff249160c215f1da19c55b25a389856d26925ebe4941732c
SHA512 4211beba14922a36284a74526d7cec77b089d225dd624ecd2f335e5880753d70b15e2518c5bda39846cedf94ab2058a0fe07451dc393c327031b86640cc74d8d

C:\Windows\SysWOW64\interf.tlb

MD5 aa8c73f100420cbdfda7ddc4c036d3b5
SHA1 fb9d2a76b38464147cd754dafd50878b869876ff
SHA256 54db2eb0c7e7bf1b533b58f48a1f1af54fe3df1c2e48de20f1864cc442b5f63b
SHA512 e97532d2ced7897e097892de51d36f254d4b01b2ff9c9bfaee6ff661172acde7837dbb530b129dca0bad9f9c65f0109544f4da73e04f137845ccf21dae10880a