Analysis
-
max time kernel
152s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06-03-2024 04:19
Static task
static1
Behavioral task
behavioral1
Sample
b67dba8f7cd90d7eaeaf2aabf1ecced6.exe
Resource
win7-20240221-en
General
-
Target
b67dba8f7cd90d7eaeaf2aabf1ecced6.exe
-
Size
76KB
-
MD5
b67dba8f7cd90d7eaeaf2aabf1ecced6
-
SHA1
a1d7c48424f8315658108afbb0a96b89077520a5
-
SHA256
bdc24b8dad31f5ae2d3e9d70a54024b7283d58ffa6ab1aab3a8bfbbdd04ffab3
-
SHA512
25c8217c4ef76d5d8182012fe0129f21c3ba85520929a108a3e1bd0975fcc2f9deb6e0fc003a72d10636f51e158e27149dd5f95b34163f7fbc9ed73035dee9a2
-
SSDEEP
768:PKTTo/j1nZ1hSvyqnSE72WzpNVdTToeJrBDsX9MifM2:PKTToL1nZ1Uv4WzXVdTToesdfM2
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2364 regsvr32.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{A159F450-51A6-4CCA-A5BF-011C41A52FF9} regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{A159F450-51A6-4CCA-A5BF-011C41A52FF9}\ = "??????" regedit.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files\ao\dlledora.dll b67dba8f7cd90d7eaeaf2aabf1ecced6.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\userid.txt b67dba8f7cd90d7eaeaf2aabf1ecced6.exe File created C:\Windows\reg.reg b67dba8f7cd90d7eaeaf2aabf1ecced6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 45 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A159F450-51A6-4CCA-A5BF-011C41A52FF9}\VERSION\ = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A159F450-51A6-4CCA-A5BF-011C41A52FF9}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{99586BE3-89F9-40BE-AA1A-D2D8492D6F47}\1.0\0\win32\ = "C:\\Program Files\\ao\\dlledora.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{69CB71DE-CB9D-42E5-B097-3B1BE621643B}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{69CB71DE-CB9D-42E5-B097-3B1BE621643B}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{69CB71DE-CB9D-42E5-B097-3B1BE621643B}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A159F450-51A6-4CCA-A5BF-011C41A52FF9}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A159F450-51A6-4CCA-A5BF-011C41A52FF9}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QvodAdBlocker.QvodBlock\Clsid regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{99586BE3-89F9-40BE-AA1A-D2D8492D6F47}\1.0\ = "QvodAdBlocker" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{69CB71DE-CB9D-42E5-B097-3B1BE621643B} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{69CB71DE-CB9D-42E5-B097-3B1BE621643B}\ = "_QvodBlock" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{69CB71DE-CB9D-42E5-B097-3B1BE621643B}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QvodAdBlocker.QvodBlock\Clsid\ = "{A159F450-51A6-4CCA-A5BF-011C41A52FF9}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{69CB71DE-CB9D-42E5-B097-3B1BE621643B}\ = "QvodBlock" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{99586BE3-89F9-40BE-AA1A-D2D8492D6F47} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{69CB71DE-CB9D-42E5-B097-3B1BE621643B} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A159F450-51A6-4CCA-A5BF-011C41A52FF9}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QvodAdBlocker.QvodBlock\ = "QvodAdBlocker.QvodBlock" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A159F450-51A6-4CCA-A5BF-011C41A52FF9}\TypeLib\ = "{99586BE3-89F9-40BE-AA1A-D2D8492D6F47}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QvodAdBlocker.QvodBlock regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{99586BE3-89F9-40BE-AA1A-D2D8492D6F47}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{69CB71DE-CB9D-42E5-B097-3B1BE621643B}\ = "_QvodBlock" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A159F450-51A6-4CCA-A5BF-011C41A52FF9} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A159F450-51A6-4CCA-A5BF-011C41A52FF9}\ = "QvodAdBlocker.QvodBlock" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{69CB71DE-CB9D-42E5-B097-3B1BE621643B}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A159F450-51A6-4CCA-A5BF-011C41A52FF9}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A159F450-51A6-4CCA-A5BF-011C41A52FF9}\VERSION regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A159F450-51A6-4CCA-A5BF-011C41A52FF9}\Implemented Categories regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{99586BE3-89F9-40BE-AA1A-D2D8492D6F47}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{99586BE3-89F9-40BE-AA1A-D2D8492D6F47}\1.0\HELPDIR\ = "C:\\Program Files\\ao" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{69CB71DE-CB9D-42E5-B097-3B1BE621643B}\TypeLib\ = "{99586BE3-89F9-40BE-AA1A-D2D8492D6F47}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{69CB71DE-CB9D-42E5-B097-3B1BE621643B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{69CB71DE-CB9D-42E5-B097-3B1BE621643B}\ProxyStubClsid\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{99586BE3-89F9-40BE-AA1A-D2D8492D6F47}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{99586BE3-89F9-40BE-AA1A-D2D8492D6F47}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{69CB71DE-CB9D-42E5-B097-3B1BE621643B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{69CB71DE-CB9D-42E5-B097-3B1BE621643B}\TypeLib\ = "{99586BE3-89F9-40BE-AA1A-D2D8492D6F47}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A159F450-51A6-4CCA-A5BF-011C41A52FF9}\ProgID\ = "QvodAdBlocker.QvodBlock" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{69CB71DE-CB9D-42E5-B097-3B1BE621643B}\ProxyStubClsid regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A159F450-51A6-4CCA-A5BF-011C41A52FF9}\Implemented Categories\{40FC6ED5-2438-11CF-A3DB-080036F12502} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{99586BE3-89F9-40BE-AA1A-D2D8492D6F47}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{99586BE3-89F9-40BE-AA1A-D2D8492D6F47}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{69CB71DE-CB9D-42E5-B097-3B1BE621643B}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A159F450-51A6-4CCA-A5BF-011C41A52FF9}\InprocServer32\ = "C:\\Program Files\\ao\\dlledora.dll" regsvr32.exe -
Runs .reg file with regedit 1 IoCs
pid Process 4292 regedit.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1988 b67dba8f7cd90d7eaeaf2aabf1ecced6.exe 1988 b67dba8f7cd90d7eaeaf2aabf1ecced6.exe 1988 b67dba8f7cd90d7eaeaf2aabf1ecced6.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1988 wrote to memory of 2364 1988 b67dba8f7cd90d7eaeaf2aabf1ecced6.exe 108 PID 1988 wrote to memory of 2364 1988 b67dba8f7cd90d7eaeaf2aabf1ecced6.exe 108 PID 1988 wrote to memory of 2364 1988 b67dba8f7cd90d7eaeaf2aabf1ecced6.exe 108 PID 1988 wrote to memory of 4584 1988 b67dba8f7cd90d7eaeaf2aabf1ecced6.exe 109 PID 1988 wrote to memory of 4584 1988 b67dba8f7cd90d7eaeaf2aabf1ecced6.exe 109 PID 1988 wrote to memory of 4584 1988 b67dba8f7cd90d7eaeaf2aabf1ecced6.exe 109 PID 4584 wrote to memory of 4292 4584 cmd.exe 111 PID 4584 wrote to memory of 4292 4584 cmd.exe 111 PID 4584 wrote to memory of 4292 4584 cmd.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\b67dba8f7cd90d7eaeaf2aabf1ecced6.exe"C:\Users\Admin\AppData\Local\Temp\b67dba8f7cd90d7eaeaf2aabf1ecced6.exe"1⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files\ao\dlledora.dll"2⤵
- Loads dropped DLL
- Modifies registry class
PID:2364
-
-
C:\Windows\SysWOW64\cmd.execmd /c regedit.exe /s C:\Windows\reg.reg2⤵
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\SysWOW64\regedit.exeregedit.exe /s C:\Windows\reg.reg3⤵
- Installs/modifies Browser Helper Object
- Runs .reg file with regedit
PID:4292
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1404 --field-trial-handle=2328,i,5873823382323802923,13134441441264702821,262144 --variations-seed-version /prefetch:81⤵PID:4412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD5237b3d7556bc6e467ac17a79ff04305f
SHA1d5d0febb33aa9028024655a88d2a7c9bc2f52949
SHA25679adaad1033772a85bbe73331ae5f554220c11b1f2fa571a2eea184a2eb16cfe
SHA5125519c5e66ed48f3261d3d468b987d1363529a5007d11b95f1559830a0967b30a16859cfcda2d07f2fe797cbe5523b6959c5623551cde24b96740f4b3de79f87d
-
Filesize
185B
MD5cfbb28c929196d73bc58a6039b80a0a2
SHA1a954e80d61025b4944222955e9bc4e3f30cc849a
SHA25648cebe9cc7acd1f8c5402944c0fa82390f0180d74c24dcb5bb0e99393066a71e
SHA5125f9d18f266ade5e5de53ac89a9dde25af6d7a822ba8a6842b6de6c7568830617b03c1f2ece80e3111942454c9f19289d44d8fc5bf9d63067e512f8112ec4684d