Malware Analysis Report

2024-10-19 11:03

Sample ID 240524-d53f4abe81
Target 273c5aed2485bd5a9ba5c32362820aafaa87b52cbe73389b37bc6be3774fe240
SHA256 273c5aed2485bd5a9ba5c32362820aafaa87b52cbe73389b37bc6be3774fe240
Tags
adware stealer
score
6/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
6/10

SHA256

273c5aed2485bd5a9ba5c32362820aafaa87b52cbe73389b37bc6be3774fe240

Threat Level: Shows suspicious behavior

The file 273c5aed2485bd5a9ba5c32362820aafaa87b52cbe73389b37bc6be3774fe240 was found to be: Shows suspicious behavior.

Malicious Activity Summary

adware stealer

Installs/modifies Browser Helper Object

Unsigned PE

Modifies registry class

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-24 03:36

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-24 03:36

Reported

2024-05-24 03:38

Platform

win7-20240508-en

Max time kernel

122s

Max time network

122s

Command Line

regsvr32 /s C:\Users\Admin\AppData\Local\Temp\273c5aed2485bd5a9ba5c32362820aafaa87b52cbe73389b37bc6be3774fe240.dll

Signatures

Installs/modifies Browser Helper Object

stealer adware
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{C145719C-BB7B-4C19-AB6B-0AD230511158} C:\Windows\SysWOW64\regsvr32.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\WebMonitor.DLL C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WebMonitor.WebHook C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D00348EA-79DE-4F4B-970E-F9C22FD41899}\ = "IWebHook" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D00348EA-79DE-4F4B-970E-F9C22FD41899}\TypeLib\Version = "1.0" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{4FF5CF07-1BC0-4BFB-9EE9-8AD744F6710B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{AE404CA3-78EB-4A8C-9E91-D30561E495A4} C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C145719C-BB7B-4C19-AB6B-0AD230511158}\AppID = "{AE404CA3-78EB-4A8C-9E91-D30561E495A4}" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D00348EA-79DE-4F4B-970E-F9C22FD41899}\TypeLib\ = "{9CB9933E-0AE8-4993-8214-16F5179C7A30}" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{4FF5CF07-1BC0-4BFB-9EE9-8AD744F6710B} C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{AE404CA3-78EB-4A8C-9E91-D30561E495A4}\ = "WebMonitor" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WebMonitor.WebHook.1\CLSID\ = "{C145719C-BB7B-4C19-AB6B-0AD230511158}" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WebMonitor.WebHook\CurVer\ = "WebMonitor.WebHook.1" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C145719C-BB7B-4C19-AB6B-0AD230511158}\VersionIndependentProgID C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C145719C-BB7B-4C19-AB6B-0AD230511158}\VersionIndependentProgID\ = "WebMonitor.WebHook" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D00348EA-79DE-4F4B-970E-F9C22FD41899}\TypeLib C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\WebMonitor.DLL\AppID = "{AE404CA3-78EB-4A8C-9E91-D30561E495A4}" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9CB9933E-0AE8-4993-8214-16F5179C7A30}\1.0 C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{4FF5CF07-1BC0-4BFB-9EE9-8AD744F6710B}\TypeLib\Version = "1.0" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4FF5CF07-1BC0-4BFB-9EE9-8AD744F6710B}\ProxyStubClsid32 C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WebMonitor.WebHook.1 C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WebMonitor.WebHook\ = "WebHook Class" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C145719C-BB7B-4C19-AB6B-0AD230511158}\Programmable C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C145719C-BB7B-4C19-AB6B-0AD230511158}\InprocServer32\ThreadingModel = "Apartment" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D00348EA-79DE-4F4B-970E-F9C22FD41899}\ProxyStubClsid32 C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4FF5CF07-1BC0-4BFB-9EE9-8AD744F6710B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C145719C-BB7B-4C19-AB6B-0AD230511158} C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C145719C-BB7B-4C19-AB6B-0AD230511158}\TypeLib\ = "{9CB9933E-0AE8-4993-8214-16F5179C7A30}" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9CB9933E-0AE8-4993-8214-16F5179C7A30}\1.0\FLAGS C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D00348EA-79DE-4F4B-970E-F9C22FD41899}\TypeLib\ = "{9CB9933E-0AE8-4993-8214-16F5179C7A30}" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D00348EA-79DE-4F4B-970E-F9C22FD41899} C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D00348EA-79DE-4F4B-970E-F9C22FD41899}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C145719C-BB7B-4C19-AB6B-0AD230511158}\ProgID C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9CB9933E-0AE8-4993-8214-16F5179C7A30}\1.0\ = "WebMonitor 1.0 ÀàÐÍ¿â" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9CB9933E-0AE8-4993-8214-16F5179C7A30}\1.0\0 C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D00348EA-79DE-4F4B-970E-F9C22FD41899}\ProxyStubClsid32 C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4FF5CF07-1BC0-4BFB-9EE9-8AD744F6710B}\TypeLib\ = "{9CB9933E-0AE8-4993-8214-16F5179C7A30}" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WebMonitor.WebHook\CLSID C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C145719C-BB7B-4C19-AB6B-0AD230511158}\ = "WebHook Class" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9CB9933E-0AE8-4993-8214-16F5179C7A30} C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D00348EA-79DE-4F4B-970E-F9C22FD41899} C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D00348EA-79DE-4F4B-970E-F9C22FD41899}\ = "IWebHook" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WebMonitor.WebHook.1\CLSID C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WebMonitor.WebHook\CurVer C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{4FF5CF07-1BC0-4BFB-9EE9-8AD744F6710B}\ = "ISearchHook" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9CB9933E-0AE8-4993-8214-16F5179C7A30}\1.0\HELPDIR C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{4FF5CF07-1BC0-4BFB-9EE9-8AD744F6710B}\TypeLib\ = "{9CB9933E-0AE8-4993-8214-16F5179C7A30}" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WebMonitor.WebHook.1\ = "WebHook Class" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C145719C-BB7B-4C19-AB6B-0AD230511158}\InprocServer32 C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9CB9933E-0AE8-4993-8214-16F5179C7A30}\1.0\FLAGS\ = "0" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D00348EA-79DE-4F4B-970E-F9C22FD41899}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4FF5CF07-1BC0-4BFB-9EE9-8AD744F6710B} C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4FF5CF07-1BC0-4BFB-9EE9-8AD744F6710B}\ = "ISearchHook" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WebMonitor.WebHook\CLSID\ = "{C145719C-BB7B-4C19-AB6B-0AD230511158}" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4FF5CF07-1BC0-4BFB-9EE9-8AD744F6710B}\TypeLib C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{4FF5CF07-1BC0-4BFB-9EE9-8AD744F6710B}\TypeLib C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C145719C-BB7B-4C19-AB6B-0AD230511158}\ProgID\ = "WebMonitor.WebHook.1" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C145719C-BB7B-4C19-AB6B-0AD230511158}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\273c5aed2485bd5a9ba5c32362820aafaa87b52cbe73389b37bc6be3774fe240.dll" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9CB9933E-0AE8-4993-8214-16F5179C7A30}\1.0\0\win32 C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9CB9933E-0AE8-4993-8214-16F5179C7A30}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\273c5aed2485bd5a9ba5c32362820aafaa87b52cbe73389b37bc6be3774fe240.dll" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9CB9933E-0AE8-4993-8214-16F5179C7A30}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D00348EA-79DE-4F4B-970E-F9C22FD41899}\TypeLib\Version = "1.0" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{4FF5CF07-1BC0-4BFB-9EE9-8AD744F6710B}\ProxyStubClsid32 C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4FF5CF07-1BC0-4BFB-9EE9-8AD744F6710B}\TypeLib\Version = "1.0" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C145719C-BB7B-4C19-AB6B-0AD230511158}\TypeLib C:\Windows\SysWOW64\regsvr32.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2552 wrote to memory of 2748 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2552 wrote to memory of 2748 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2552 wrote to memory of 2748 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2552 wrote to memory of 2748 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2552 wrote to memory of 2748 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2552 wrote to memory of 2748 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2552 wrote to memory of 2748 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe

Processes

C:\Windows\system32\regsvr32.exe

regsvr32 /s C:\Users\Admin\AppData\Local\Temp\273c5aed2485bd5a9ba5c32362820aafaa87b52cbe73389b37bc6be3774fe240.dll

C:\Windows\SysWOW64\regsvr32.exe

/s C:\Users\Admin\AppData\Local\Temp\273c5aed2485bd5a9ba5c32362820aafaa87b52cbe73389b37bc6be3774fe240.dll

Network

N/A

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-24 03:36

Reported

2024-05-24 03:38

Platform

win10v2004-20240426-en

Max time kernel

131s

Max time network

101s

Command Line

regsvr32 /s C:\Users\Admin\AppData\Local\Temp\273c5aed2485bd5a9ba5c32362820aafaa87b52cbe73389b37bc6be3774fe240.dll

Signatures

Installs/modifies Browser Helper Object

stealer adware
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{C145719C-BB7B-4C19-AB6B-0AD230511158} C:\Windows\SysWOW64\regsvr32.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C145719C-BB7B-4C19-AB6B-0AD230511158}\VersionIndependentProgID C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9CB9933E-0AE8-4993-8214-16F5179C7A30}\1.0\0\win32 C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9CB9933E-0AE8-4993-8214-16F5179C7A30}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\273c5aed2485bd5a9ba5c32362820aafaa87b52cbe73389b37bc6be3774fe240.dll" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D00348EA-79DE-4F4B-970E-F9C22FD41899} C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D00348EA-79DE-4F4B-970E-F9C22FD41899}\TypeLib\ = "{9CB9933E-0AE8-4993-8214-16F5179C7A30}" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D00348EA-79DE-4F4B-970E-F9C22FD41899}\ProxyStubClsid32 C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D00348EA-79DE-4F4B-970E-F9C22FD41899}\TypeLib C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C145719C-BB7B-4C19-AB6B-0AD230511158}\ProgID\ = "WebMonitor.WebHook.1" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C145719C-BB7B-4C19-AB6B-0AD230511158}\TypeLib C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4FF5CF07-1BC0-4BFB-9EE9-8AD744F6710B}\TypeLib C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4FF5CF07-1BC0-4BFB-9EE9-8AD744F6710B}\TypeLib\Version = "1.0" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D00348EA-79DE-4F4B-970E-F9C22FD41899}\TypeLib\Version = "1.0" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4FF5CF07-1BC0-4BFB-9EE9-8AD744F6710B}\TypeLib\ = "{9CB9933E-0AE8-4993-8214-16F5179C7A30}" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\WebMonitor.DLL\AppID = "{AE404CA3-78EB-4A8C-9E91-D30561E495A4}" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WebMonitor.WebHook\CLSID C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WebMonitor.WebHook\CurVer\ = "WebMonitor.WebHook.1" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C145719C-BB7B-4C19-AB6B-0AD230511158}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\273c5aed2485bd5a9ba5c32362820aafaa87b52cbe73389b37bc6be3774fe240.dll" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4FF5CF07-1BC0-4BFB-9EE9-8AD744F6710B}\ = "ISearchHook" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\WebMonitor.DLL C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WebMonitor.WebHook.1\ = "WebHook Class" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WebMonitor.WebHook.1\CLSID\ = "{C145719C-BB7B-4C19-AB6B-0AD230511158}" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D00348EA-79DE-4F4B-970E-F9C22FD41899}\ = "IWebHook" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4FF5CF07-1BC0-4BFB-9EE9-8AD744F6710B} C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WebMonitor.WebHook.1\CLSID C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C145719C-BB7B-4C19-AB6B-0AD230511158}\ = "WebHook Class" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D00348EA-79DE-4F4B-970E-F9C22FD41899}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{AE404CA3-78EB-4A8C-9E91-D30561E495A4} C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9CB9933E-0AE8-4993-8214-16F5179C7A30} C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9CB9933E-0AE8-4993-8214-16F5179C7A30}\1.0\FLAGS\ = "0" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9CB9933E-0AE8-4993-8214-16F5179C7A30}\1.0\HELPDIR C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4FF5CF07-1BC0-4BFB-9EE9-8AD744F6710B}\TypeLib\ = "{9CB9933E-0AE8-4993-8214-16F5179C7A30}" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WebMonitor.WebHook\ = "WebHook Class" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WebMonitor.WebHook\CurVer C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D00348EA-79DE-4F4B-970E-F9C22FD41899}\ProxyStubClsid32 C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D00348EA-79DE-4F4B-970E-F9C22FD41899}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4FF5CF07-1BC0-4BFB-9EE9-8AD744F6710B}\ProxyStubClsid32 C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C145719C-BB7B-4C19-AB6B-0AD230511158} C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C145719C-BB7B-4C19-AB6B-0AD230511158}\InprocServer32\ThreadingModel = "Apartment" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C145719C-BB7B-4C19-AB6B-0AD230511158}\TypeLib\ = "{9CB9933E-0AE8-4993-8214-16F5179C7A30}" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9CB9933E-0AE8-4993-8214-16F5179C7A30}\1.0\0 C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9CB9933E-0AE8-4993-8214-16F5179C7A30}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D00348EA-79DE-4F4B-970E-F9C22FD41899}\TypeLib C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D00348EA-79DE-4F4B-970E-F9C22FD41899}\TypeLib\ = "{9CB9933E-0AE8-4993-8214-16F5179C7A30}" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WebMonitor.WebHook.1 C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9CB9933E-0AE8-4993-8214-16F5179C7A30}\1.0 C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4FF5CF07-1BC0-4BFB-9EE9-8AD744F6710B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4FF5CF07-1BC0-4BFB-9EE9-8AD744F6710B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4FF5CF07-1BC0-4BFB-9EE9-8AD744F6710B}\TypeLib\Version = "1.0" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C145719C-BB7B-4C19-AB6B-0AD230511158}\ProgID C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C145719C-BB7B-4C19-AB6B-0AD230511158}\AppID = "{AE404CA3-78EB-4A8C-9E91-D30561E495A4}" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{AE404CA3-78EB-4A8C-9E91-D30561E495A4}\ = "WebMonitor" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C145719C-BB7B-4C19-AB6B-0AD230511158}\VersionIndependentProgID\ = "WebMonitor.WebHook" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C145719C-BB7B-4C19-AB6B-0AD230511158}\InprocServer32 C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D00348EA-79DE-4F4B-970E-F9C22FD41899}\TypeLib\Version = "1.0" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WebMonitor.WebHook\CLSID\ = "{C145719C-BB7B-4C19-AB6B-0AD230511158}" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WebMonitor.WebHook C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C145719C-BB7B-4C19-AB6B-0AD230511158}\Programmable C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9CB9933E-0AE8-4993-8214-16F5179C7A30}\1.0\ = "WebMonitor 1.0 ÀàÐÍ¿â" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9CB9933E-0AE8-4993-8214-16F5179C7A30}\1.0\FLAGS C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D00348EA-79DE-4F4B-970E-F9C22FD41899}\ = "IWebHook" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4FF5CF07-1BC0-4BFB-9EE9-8AD744F6710B}\TypeLib C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D00348EA-79DE-4F4B-970E-F9C22FD41899} C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4FF5CF07-1BC0-4BFB-9EE9-8AD744F6710B} C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4FF5CF07-1BC0-4BFB-9EE9-8AD744F6710B}\ = "ISearchHook" C:\Windows\SysWOW64\regsvr32.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1448 wrote to memory of 3848 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 1448 wrote to memory of 3848 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 1448 wrote to memory of 3848 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe

Processes

C:\Windows\system32\regsvr32.exe

regsvr32 /s C:\Users\Admin\AppData\Local\Temp\273c5aed2485bd5a9ba5c32362820aafaa87b52cbe73389b37bc6be3774fe240.dll

C:\Windows\SysWOW64\regsvr32.exe

/s C:\Users\Admin\AppData\Local\Temp\273c5aed2485bd5a9ba5c32362820aafaa87b52cbe73389b37bc6be3774fe240.dll

Network

Country Destination Domain Proto
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
NL 23.62.61.194:443 www.bing.com tcp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 194.61.62.23.in-addr.arpa udp
NL 23.62.61.194:443 www.bing.com tcp
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 205.47.74.20.in-addr.arpa udp
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
US 52.111.227.11:443 tcp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp

Files

N/A