Analysis
-
max time kernel
145s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/03/2024, 01:42
Static task
static1
Behavioral task
behavioral1
Sample
e0786cfd02889f5cf8e98b648eb6863f.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e0786cfd02889f5cf8e98b648eb6863f.dll
Resource
win10v2004-20240319-en
General
-
Target
e0786cfd02889f5cf8e98b648eb6863f.dll
-
Size
891KB
-
MD5
e0786cfd02889f5cf8e98b648eb6863f
-
SHA1
22b9d971c7fdea19904c96ef4ffae5f6540cbd10
-
SHA256
83a4b08071ee6829a9c420e1c37ea767d986318a18fd937833fe43199d07c9a7
-
SHA512
0fc78c7d9482cb3e41866b768c9155a19fc184354470368db518c95c141ec220a042fc7eb93383dc1b341abb73fa9f8a7d45d8fffcdcd3018e4603dd873dea35
-
SSDEEP
24576:4ksNHkWxFfLAb87n+GyiTP/NwG7ZgqAc:zexFjAoHTiG7ZgTc
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nxnjluuqrkdeuhca = "C:\\Windows\\System32\\regsvr32.exe /s \"C:\\Users\\Admin\\AppData\\Local\\Temp\\e0786cfd02889f5cf8e98b648eb6863f.dll\"" regsvr32.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6F3B866D-9C44-AD1E-3AC5-9DF6C67B83B5} regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{6F3B866D-9C44-AD1E-3AC5-9DF6C67B83B5}\NoExplorer = "1" regsvr32.exe -
Maps connected drives based on registry 3 TTPs 3 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum regsvr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\Count regsvr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 regsvr32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "417665651" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{558FD9C1-EBDB-11EE-BC0B-5A791E92BC44} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6F3B866D-9C44-AD1E-3AC5-9DF6C67B83B5}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\e0786cfd02889f5cf8e98b648eb6863f.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6F3B866D-9C44-AD1E-3AC5-9DF6C67B83B5} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6F3B866D-9C44-AD1E-3AC5-9DF6C67B83B5}\ = "revenuebuster browser enhancer" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6F3B866D-9C44-AD1E-3AC5-9DF6C67B83B5}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6F3B866D-9C44-AD1E-3AC5-9DF6C67B83B5}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2984 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2984 iexplore.exe 2984 iexplore.exe 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1352 wrote to memory of 2304 1352 regsvr32.exe 28 PID 1352 wrote to memory of 2304 1352 regsvr32.exe 28 PID 1352 wrote to memory of 2304 1352 regsvr32.exe 28 PID 1352 wrote to memory of 2304 1352 regsvr32.exe 28 PID 1352 wrote to memory of 2304 1352 regsvr32.exe 28 PID 1352 wrote to memory of 2304 1352 regsvr32.exe 28 PID 1352 wrote to memory of 2304 1352 regsvr32.exe 28 PID 2984 wrote to memory of 2632 2984 iexplore.exe 30 PID 2984 wrote to memory of 2632 2984 iexplore.exe 30 PID 2984 wrote to memory of 2632 2984 iexplore.exe 30 PID 2984 wrote to memory of 2632 2984 iexplore.exe 30
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\e0786cfd02889f5cf8e98b648eb6863f.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\e0786cfd02889f5cf8e98b648eb6863f.dll2⤵
- Adds Run key to start application
- Installs/modifies Browser Helper Object
- Maps connected drives based on registry
- Modifies registry class
PID:2304
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2984 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2632
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Browser Extensions
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4e8477589be282305d07fb67dd32755
SHA10c35149ec0c6ec66fa24a0174344f6eb46149435
SHA256fc319b8341b3463fb5bfa5b0036979ec09ff9f31159e3871aea45b3dec48f977
SHA5120b60232aad2f19e22e6b8a8605820b9820e743d414b9f14af4b29cbfb898909b8e5d92cd0c6e65c71ece262627b059669308e9b1234717935147bb2ae1375471
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561dea05a8da1512389240e2e621d94ec
SHA124b862b55fef28f2e06d7a3bad4f0d2e3b37c10d
SHA2560a9e36ed8f4b163e67eb445a1f667777da076909921cd2694b2cb61f2ad2db96
SHA5126ebeed49704a53d81a023cd0af4221ea8a0df6990221e85332fae9e365d35f5545dfb5b070586861c0020607463dcb46d2a298af4e12d3c9e4bf74c177da5f2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574adc83d98f361b00ed0474502148856
SHA193514a3bc815d214bc716544e96d8439eeeef58b
SHA2562aa211284714102b35a81f6924dd458691cca3aadd2c16f18bf42e4cbf3bb707
SHA51228d8eeb2d2afcbafce8acbb34a608176963782da6f9a9034f765ff5413b812ad8b72b2ca649cd3ea2db1bbd3285c0d03a3c65c0b2c18449588a291a055fb2e5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5645644b3b6adbb01552f8998aec02c4d
SHA14bc66d60e8a6e6b16390d2d2bef2b123936e50b9
SHA2569dd6236f79e134fb2a23deffdc75435370a72214c21dd4244da035e4099df2f8
SHA5121094a230c756b9c8aa522b895011a6fd5cdf3b87123560e80a58ede929fb1b1249c6394bb2536b3088442a8f0cc0cbece8f589b7559b54dbcd54921b9384422b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5028e173a3ec26d862e40431a579bdb35
SHA1686fbfed0260ac38769cde30e9f21b4cebbc5637
SHA256a2216cf8e528fc2d2c712a17c509c167f006cbf1e4d7489877de2caecf1e4433
SHA5126c474b0aa8b77a726d2d0c98d3dc62423d91e66c6735b2cf605cc4e55faae862d8645b0393af4bf4538fc4bdb5e5d8d017d71a7e0669340137d8a58a9fee2670
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f23b92e8f74b1cc141d1f1662c21e6d
SHA17707ed1506f2b8eda00fb1cf9212b0a793e377a8
SHA256918973bd600dc5df383057edc8aae2c8ab5f3ed884da26c864d35b50a3327051
SHA51241f096e5e1ef45f503b97a35f92f123ec2cece3ff2aa46d48dc57eac58adbbed5d9d15f955f60fe1524e2b60567d94c1e216304de612d7e179527a5cd80779b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e045a8de0d4a7a00b0a987b2ba02516
SHA11060af608ba36425538be394e30b4480c4a2a226
SHA256966cd225828ea7545ac52f68215566b8091285db232c7e9e9b5eb53efda27847
SHA512234f3e01a19c4b3e9f145112b5553e992f361934add5a3b4be2006c4aa2bd3cf17dba8f762db4e7dbff0ca24b3cf2d6accf5b68803338d0b8d770b061ecbd7b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1e3de321b85d8de8f3826f9d891a5f9
SHA19d9c26ebb1eb0642ee5537e1f8ce493177ce6172
SHA2562cd527bd3d46d274873ec4546579e2dbec6a130e2e87b379b878c2e63ee34bea
SHA51203e3994982735fa7147a6f7cbb1ff445d120b43f0f2ca1c7930e7639fdb312c0c9884421a410dc3cc58d2e9c12f3f5f81a164672edda1c9ef10dc7a9aafe009d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546a412986e58d952d4dc5e4d38d961cc
SHA1ec10ea64363d24e555480c3b354318578d033824
SHA256371060b9d37d6f2ceef3cb95d4cc853e3875846a0c84c3729e7242523e26f532
SHA5126e4ca1bbe42916932438fb8a04ff75a55b952b6bd09b9f8b50fe6636ba47b71ae8c214b46443cc6ae616f5876927e7ab46fcbe7f47eac9447b7d6ae9cd19b434
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a