Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240319-en -
resource tags
arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2024, 06:42
Static task
static1
Behavioral task
behavioral1
Sample
e104ec13f856854262a38fd446800be9.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
e104ec13f856854262a38fd446800be9.exe
Resource
win10v2004-20240319-en
General
-
Target
e104ec13f856854262a38fd446800be9.exe
-
Size
291KB
-
MD5
e104ec13f856854262a38fd446800be9
-
SHA1
ae536f56e540f865d1d0e5ff669a7c632c65ae6c
-
SHA256
d0d17a30ed9223cedcf6538be8045fc6e5d49a7d17b705e3e53ba2369e83b333
-
SHA512
a818a4f73d93fe252b5508750068e78e3a91d70195313a03845f87c0bbf6e80770b4c46db4ccab1d3e98e3bb48aca66e082c0e671c64da2241900712b22ea4cc
-
SSDEEP
6144:3hTFdlny677b1Idz9PmUbfffslfbhFRLHHeDv8K4BZDcZbq:91V35IdxuULf0lfbhF5HO8K4BZ6+
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 400 e104ec13f856854262a38fd446800be9.exe 400 e104ec13f856854262a38fd446800be9.exe 400 e104ec13f856854262a38fd446800be9.exe 400 e104ec13f856854262a38fd446800be9.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\MSINET.OCX e104ec13f856854262a38fd446800be9.exe File opened for modification C:\Windows\SysWOW64\MSWINSCK.OCX e104ec13f856854262a38fd446800be9.exe File opened for modification C:\Windows\SysWOW64\TABCTL32.OCX e104ec13f856854262a38fd446800be9.exe File opened for modification C:\Windows\SysWOW64\VSListview.ocx e104ec13f856854262a38fd446800be9.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CD6C9867-7A85-40A6-BC9C-B495EE4B3643}\ = "_vsListView" e104ec13f856854262a38fd446800be9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FF95099A-7236-4E65-A271-FCC284DD9EAF}\MiscStatus\ = "0" e104ec13f856854262a38fd446800be9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FF95099A-7236-4E65-A271-FCC284DD9EAF}\TypeLib e104ec13f856854262a38fd446800be9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\vsListViewXP.vsListView\Clsid e104ec13f856854262a38fd446800be9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FF95099A-7236-4E65-A271-FCC284DD9EAF}\Implemented Categories\{0DE86A52-2BAA-11CF-A229-00AA003D7352} e104ec13f856854262a38fd446800be9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908} e104ec13f856854262a38fd446800be9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E401C2D9-92D9-4ACE-823E-7D96F076A74F}\ = "__vsListView" e104ec13f856854262a38fd446800be9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FF95099A-7236-4E65-A271-FCC284DD9EAF}\Control\ e104ec13f856854262a38fd446800be9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\vsListViewXP.vsListView\ = "vsListViewXP.vsListView" e104ec13f856854262a38fd446800be9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FF95099A-7236-4E65-A271-FCC284DD9EAF}\Implemented Categories e104ec13f856854262a38fd446800be9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\InprocServer32 e104ec13f856854262a38fd446800be9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D05C3AD7-7EF1-4749-885E-A2006408FC13}\1.0\FLAGS\ = "2" e104ec13f856854262a38fd446800be9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3E33C93F-C525-4CAC-8A46-B9EAA303B20A} e104ec13f856854262a38fd446800be9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FF95099A-7236-4E65-A271-FCC284DD9EAF}\InprocServer32 e104ec13f856854262a38fd446800be9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FF95099A-7236-4E65-A271-FCC284DD9EAF}\Implemented Categories\{40FC6ED4-2438-11CF-A3DB-080036F12502} e104ec13f856854262a38fd446800be9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D05C3AD7-7EF1-4749-885E-A2006408FC13}}\InprocServer32\ = "VSListview.ocx" e104ec13f856854262a38fd446800be9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FF95099A-7236-4E65-A271-FCC284DD9EAF}\VERSION e104ec13f856854262a38fd446800be9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FF95099A-7236-4E65-A271-FCC284DD9EAF}\Implemented Categories\{0DE86A53-2BAA-11CF-A229-00AA003D7352} e104ec13f856854262a38fd446800be9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CD6C9867-7A85-40A6-BC9C-B495EE4B3643}\TypeLib\ = "{D05C3AD7-7EF1-4749-885E-A2006408FC13}" e104ec13f856854262a38fd446800be9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E401C2D9-92D9-4ACE-823E-7D96F076A74F}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" e104ec13f856854262a38fd446800be9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CD6C9867-7A85-40A6-BC9C-B495EE4B3643} e104ec13f856854262a38fd446800be9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E401C2D9-92D9-4ACE-823E-7D96F076A74F}\TypeLib e104ec13f856854262a38fd446800be9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3E33C93F-C525-4CAC-8A46-B9EAA303B20A}\ = "vsListViewXP.ÊôÐÔ" e104ec13f856854262a38fd446800be9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3E33C93F-C525-4CAC-8A46-B9EAA303B20A}\InprocServer32\ = "C:\\Windows\\SysWow64\\VSListview.ocx" e104ec13f856854262a38fd446800be9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FF95099A-7236-4E65-A271-FCC284DD9EAF}\ToolboxBitmap32 e104ec13f856854262a38fd446800be9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D05C3AD7-7EF1-4749-885E-A2006408FC13}\1.0\0 e104ec13f856854262a38fd446800be9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CD6C9867-7A85-40A6-BC9C-B495EE4B3643}\ProxyStubClsid32 e104ec13f856854262a38fd446800be9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{5A81230A-B360-48FD-970A-3221E4BF6A00}\ProxyStubClsid32 e104ec13f856854262a38fd446800be9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E401C2D9-92D9-4ACE-823E-7D96F076A74F} e104ec13f856854262a38fd446800be9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FF95099A-7236-4E65-A271-FCC284DD9EAF}\TypeLib\ = "{D05C3AD7-7EF1-4749-885E-A2006408FC13}" e104ec13f856854262a38fd446800be9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{5A81230A-B360-48FD-970A-3221E4BF6A00}\TypeLib e104ec13f856854262a38fd446800be9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E401C2D9-92D9-4ACE-823E-7D96F076A74F}\ProxyStubClsid32 e104ec13f856854262a38fd446800be9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FF95099A-7236-4E65-A271-FCC284DD9EAF}\ProgID\ = "vsListViewXP.vsListView" e104ec13f856854262a38fd446800be9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7DA06D40-54A0-11CF-A521-0080C77A7786}\InprocServer32 e104ec13f856854262a38fd446800be9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E401C2D9-92D9-4ACE-823E-7D96F076A74F}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" e104ec13f856854262a38fd446800be9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3E33C93F-C525-4CAC-8A46-B9EAA303B20A}\InprocServer32 e104ec13f856854262a38fd446800be9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FF95099A-7236-4E65-A271-FCC284DD9EAF} e104ec13f856854262a38fd446800be9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D} e104ec13f856854262a38fd446800be9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CD6C9867-7A85-40A6-BC9C-B495EE4B3643}\TypeLib\ = "{D05C3AD7-7EF1-4749-885E-A2006408FC13}" e104ec13f856854262a38fd446800be9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5A81230A-B360-48FD-970A-3221E4BF6A00}\ = "_ÊôÐÔ" e104ec13f856854262a38fd446800be9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7DA06D40-54A0-11CF-A521-0080C77A7786} e104ec13f856854262a38fd446800be9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D05C3AD7-7EF1-4749-885E-A2006408FC13}\1.0\0\win32 e104ec13f856854262a38fd446800be9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node e104ec13f856854262a38fd446800be9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D05C3AD7-7EF1-4749-885E-A2006408FC13}\1.0\HELPDIR e104ec13f856854262a38fd446800be9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{5A81230A-B360-48FD-970A-3221E4BF6A00}\TypeLib\ = "{D05C3AD7-7EF1-4749-885E-A2006408FC13}" e104ec13f856854262a38fd446800be9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E401C2D9-92D9-4ACE-823E-7D96F076A74F}\TypeLib\ = "{D05C3AD7-7EF1-4749-885E-A2006408FC13}" e104ec13f856854262a38fd446800be9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FF95099A-7236-4E65-A271-FCC284DD9EAF}\InprocServer32\ThreadingModel = "Apartment" e104ec13f856854262a38fd446800be9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32\ = "MSWINSCK.OCX" e104ec13f856854262a38fd446800be9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D05C3AD7-7EF1-4749-885E-A2006408FC13} e104ec13f856854262a38fd446800be9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CD6C9867-7A85-40A6-BC9C-B495EE4B3643} e104ec13f856854262a38fd446800be9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FF95099A-7236-4E65-A271-FCC284DD9EAF}\MiscStatus\1 e104ec13f856854262a38fd446800be9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CD6C9867-7A85-40A6-BC9C-B495EE4B3643}\ProxyStubClsid32 e104ec13f856854262a38fd446800be9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{5A81230A-B360-48FD-970A-3221E4BF6A00}\ = "_ÊôÐÔ" e104ec13f856854262a38fd446800be9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5A81230A-B360-48FD-970A-3221E4BF6A00}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" e104ec13f856854262a38fd446800be9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FF95099A-7236-4E65-A271-FCC284DD9EAF}\VERSION\ = "1.0" e104ec13f856854262a38fd446800be9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CD6C9867-7A85-40A6-BC9C-B495EE4B3643}\TypeLib\Version = "1.0" e104ec13f856854262a38fd446800be9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5A81230A-B360-48FD-970A-3221E4BF6A00}\TypeLib\Version = "1.0" e104ec13f856854262a38fd446800be9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E401C2D9-92D9-4ACE-823E-7D96F076A74F}\TypeLib e104ec13f856854262a38fd446800be9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FF95099A-7236-4E65-A271-FCC284DD9EAF}\ProgID e104ec13f856854262a38fd446800be9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E401C2D9-92D9-4ACE-823E-7D96F076A74F}\ProxyStubClsid\ = "{00020420-0000-0000-C000-000000000046}" e104ec13f856854262a38fd446800be9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CD6C9867-7A85-40A6-BC9C-B495EE4B3643}\ = "vsListView" e104ec13f856854262a38fd446800be9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CD6C9867-7A85-40A6-BC9C-B495EE4B3643}\TypeLib\Version = "1.0" e104ec13f856854262a38fd446800be9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CD6C9867-7A85-40A6-BC9C-B495EE4B3643}\TypeLib e104ec13f856854262a38fd446800be9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E401C2D9-92D9-4ACE-823E-7D96F076A74F}\TypeLib\Version = "1.0" e104ec13f856854262a38fd446800be9.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 400 e104ec13f856854262a38fd446800be9.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 400 e104ec13f856854262a38fd446800be9.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 400 e104ec13f856854262a38fd446800be9.exe 400 e104ec13f856854262a38fd446800be9.exe 400 e104ec13f856854262a38fd446800be9.exe 400 e104ec13f856854262a38fd446800be9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e104ec13f856854262a38fd446800be9.exe"C:\Users\Admin\AppData\Local\Temp\e104ec13f856854262a38fd446800be9.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:400
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3988 --field-trial-handle=2288,i,10301911031503898037,2997280636231771547,262144 --variations-seed-version /prefetch:81⤵PID:980
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129KB
MD590a39346e9b67f132ef133725c487ff6
SHA19cd22933f628465c863bed7895d99395acaa5d2a
SHA256e55627932120be87c7950383a75a5712b0ff2c00b8d18169195ad35bc2502fc2
SHA5120337817b9194a10b946d7381a84a2aeefd21445986afef1b9ae5a52921e598cdb0d1a576bdf8391f1ebf8be74950883a6f50ad1f61ff08678782c6b05a18adbf
-
Filesize
121KB
MD5e8a2190a9e8ee5e5d2e0b599bbf9dda6
SHA14e97bf9519c83835da9db309e61ec87ddf165167
SHA25680ab0b86de58a657956b2a293bd9957f78e37e7383c86d6cd142208c153b6311
SHA51257f8473eedaf7e8aad3b5bcbb16d373fd6aaec290c3230033fc50b5ec220e93520b8915c936e758bb19107429a49965516425350e012f8db0de6d4f6226b42ee
-
Filesize
88KB
MD509411b401ac53b113d9492ce45186380
SHA115f4c683ba317bb0b54b335755721fcc2d745cd3
SHA256e4f27ba024f2ec6be12d94790b7d07f6245dfb75339bad6969fd311229d1d326
SHA51265a68e8d1dd46e498ebe2e07b6c81078605dcbe5271dfc3364146f298b170c5bf2c68b307e3267505b6ea0645d4a1cc0f5780b6de3f640a81829ea13797f0efa