Overview
overview
7Static
static
30262065334...18.exe
windows7-x64
70262065334...18.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ib.dll
windows7-x64
3$PLUGINSDI...ib.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$R0.dll
windows7-x64
1$R0.dll
windows10-2004-x64
1$R2/NSIS.L...2_.exe
windows7-x64
1$R2/NSIS.L...2_.exe
windows10-2004-x64
1$SYSDIR/DWSHK80.dll
windows7-x64
1$SYSDIR/DWSHK80.dll
windows10-2004-x64
1$SYSDIR/MSVBVM60.dll
windows7-x64
1$SYSDIR/MSVBVM60.dll
windows10-2004-x64
1$SYSDIR/VB6KO.dll
windows7-x64
1$SYSDIR/VB6KO.dll
windows10-2004-x64
1$SYSDIR/dwsbc80.dll
windows7-x64
1$SYSDIR/dwsbc80.dll
windows10-2004-x64
1$SYSDIR/dw...80.dll
windows7-x64
1$SYSDIR/dw...80.dll
windows10-2004-x64
1UrlUpdate.exe
windows7-x64
7UrlUpdate.exe
windows10-2004-x64
7efbbar.dll
windows7-x64
1efbbar.dll
windows10-2004-x64
1efsbar.dll
windows7-x64
1efsbar.dll
windows10-2004-x64
1iewindow.exe
windows7-x64
1iewindow.exe
windows10-2004-x64
1nnlogon.exe
windows7-x64
1nnlogon.exe
windows10-2004-x64
1Analysis
-
max time kernel
138s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
20-06-2024 03:22
Static task
static1
Behavioral task
behavioral1
Sample
02620653340ad8d2a425b5e5f8af258f_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
02620653340ad8d2a425b5e5f8af258f_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/TypeLib.dll
Resource
win7-20240611-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/TypeLib.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral9
Sample
$R0.dll
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
$R0.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
$R2/NSIS.Library.RegTool.v3.$_2_.exe
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
$R2/NSIS.Library.RegTool.v3.$_2_.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral13
Sample
$SYSDIR/DWSHK80.dll
Resource
win7-20240419-en
Behavioral task
behavioral14
Sample
$SYSDIR/DWSHK80.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral15
Sample
$SYSDIR/MSVBVM60.dll
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
$SYSDIR/MSVBVM60.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
$SYSDIR/VB6KO.dll
Resource
win7-20240508-en
Behavioral task
behavioral18
Sample
$SYSDIR/VB6KO.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral19
Sample
$SYSDIR/dwsbc80.dll
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
$SYSDIR/dwsbc80.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
$SYSDIR/dwshengine80.dll
Resource
win7-20231129-en
Behavioral task
behavioral22
Sample
$SYSDIR/dwshengine80.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
UrlUpdate.exe
Resource
win7-20240220-en
Behavioral task
behavioral24
Sample
UrlUpdate.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral25
Sample
efbbar.dll
Resource
win7-20240611-en
Behavioral task
behavioral26
Sample
efbbar.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral27
Sample
efsbar.dll
Resource
win7-20240611-en
Behavioral task
behavioral28
Sample
efsbar.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
iewindow.exe
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
iewindow.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
nnlogon.exe
Resource
win7-20240220-en
Behavioral task
behavioral32
Sample
nnlogon.exe
Resource
win10v2004-20240508-en
General
-
Target
UrlUpdate.exe
-
Size
152KB
-
MD5
df4c70adfe3ee8e7d0a7d396754681ea
-
SHA1
86d6bc8e6961a01aa689909d678512e0e3bc202c
-
SHA256
94a6a81ad5c12aec33d7274e43ed8197cd476bb9680724995631fd971e8a3d86
-
SHA512
94e8fa6c92cbb30320b2067158549e6079be66489c4a2c8008ec7675d9135cddd477137b3c08fe7e7a41d2da6fcc3732d9ae10e8bc47226108938249fa33fa4e
-
SSDEEP
3072:T6npLFsb893Sn3dkJht04WD2spOL/KGKlhcpguZh5pXK1zZcsbAM:+0nNke4WdUL/KGKlhcpguZHpXK1z0M
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3660 urlupdate1.exe -
Installs/modifies Browser Helper Object 2 TTPs 5 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{72CEEE43-C350-4932-B3DC-B6201F01EFCB} ntmurl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{72CEEE43-C350-4932-B3DC-B6201F01EFCB}\NoExplorer ntmurl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{D815AB8A-E840-4054-B37D-943893116452} ntmurl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{D815AB8A-E840-4054-B37D-943893116452}\NoExplorer ntmurl.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{D815AB8A-E840-4054-B37D-943893116452} REG.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\NSearcher.exe ntmurl.exe File opened for modification C:\Windows\SysWOW64\NSearcher.exe ntmurl.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Netimo\NSearcher\NSearcher.exe ntmurl.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 456 sc.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Enable Browser Extensions = "yes" ntmurl.exe Set value (int) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Internet Explorer\MenuExt\ÀÌ ´Ü¾î °Ë»ö(&S)\contexts = "48" ntmurl.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Explorer Bars REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{72CEEE43-C350-4932-B3DC-B6201F01EFCB}\URL = "http://search.netimo.net/ntmsearch.html?where=all&cp=ezsearch&adv=yahoo&type=forward&ssupply=1&q={searchTerms}" ntmurl.exe Set value (int) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{72CEEE43-C350-4932-B3DC-B6201F01EFCB}\Codepage = "949" ntmurl.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Internet Explorer\MenuExt\ÀÌ ´Ü¾î °Ë»ö(&S)\ = "res://C:\\Users\\Admin\\AppData\\Local\\Temp\\ntmurl.dll/SEARCH.HTM" ntmurl.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Explorer Bars\{6A294C45-07CC-426C-9512-6742053E462C} REG.exe Key created \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Internet Explorer\Explorer Bars REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{72CEEE43-C350-4932-B3DC-B6201F01EFCB}\DisplayName = "¾ßÈÄ" ntmurl.exe Key created \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\Software\Microsoft\Internet Explorer\Main ntmurl.exe Key created \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\Software\Microsoft\Internet Explorer\Explorer Bars\{6A294C45-07CC-426C-9512-6742053E462C} REG.exe Set value (data) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Internet Explorer\Explorer Bars\{6A294C45-07CC-426C-9512-6742053E462C}\BarSize = dc00000000000000 REG.exe Key created \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\Software\Microsoft\Internet Explorer\SearchScopes\{72CEEE43-C350-4932-B3DC-B6201F01EFCB} ntmurl.exe Key created \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\Software\Microsoft\Internet Explorer\MenuExt\ÀÌ ´Ü¾î °Ë»ö(&S) ntmurl.exe Key created \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Internet Explorer\Explorer Bars\{6A294C45-07CC-426C-9512-6742053E462C} REG.exe Key created \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\Software\Microsoft\Internet Explorer\SearchScopes ntmurl.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\DefaultScope = "{72CEEE43-C350-4932-B3DC-B6201F01EFCB}" ntmurl.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E9ECAA7A-3EAC-4F41-8375-84AC9D2AC3AF}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{738A3C47-189C-4B96-8ACE-985DD34AFF17}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ntmurl.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1E81505D-47A7-471B-B348-07BDA6159756}\Forward regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5A2B988C-5F30-47F7-97DA-0888B9FA0D15}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E72183BD-2FD6-4FEC-A806-BB3DE07A5E35}\TypeLib\ = "{C6E6B197-9348-449E-A149-384B208874B1}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{149BD92F-B28E-4C04-8B4D-46CDD176B7E4}\ProxyStubClsid\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{323EDAF0-DD73-47E1-9C77-76261365F2A6}\ = "ntmURL.ISubclass" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{044D0F63-C274-40B2-8F50-F09A06DCFBE1} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3B07FABA-099B-4D62-9780-D254A04E32F5}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C48E43A2-A7B7-4293-A13A-F4B29158A0BB}\ProgID\ = "ntmURL.IURLHelper" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0E9BF828-7362-4850-9FE7-59E26521AC34}\ = "_CSBCriteria" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ntmURL.ISubclass\Clsid\ = "{323EDAF0-DD73-47E1-9C77-76261365F2A6}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D815AB8A-E840-4054-B37D-943893116452}\Implemented Categories\{40FC6ED5-2438-11CF-A3DB-080036F12502} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FA496C82-EF15-498A-9281-71C17D2E83B1} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FBA8A473-BB88-4DDC-AB67-0EE6BF4788A9}\VERSION regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ntmURL.CSideBar regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72CEEE43-C350-4932-B3DC-B6201F01EFCB}\TypeLib\ = "{C6E6B197-9348-449E-A149-384B208874B1}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3F16DB30-C562-41AD-A3B3-4D405BBBEFEE}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FA496C82-EF15-498A-9281-71C17D2E83B1}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E9ECAA7A-3EAC-4F41-8375-84AC9D2AC3AF}\TypeLib\ = "{C6E6B197-9348-449E-A149-384B208874B1}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FBA8A473-BB88-4DDC-AB67-0EE6BF4788A9}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72CEEE43-C350-4932-B3DC-B6201F01EFCB}\VERSION regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ntmURL.GSubclass\ = "ntmURL.GSubclass" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{044D0F63-C274-40B2-8F50-F09A06DCFBE1}\TypeLib\ = "{C6E6B197-9348-449E-A149-384B208874B1}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3F16DB30-C562-41AD-A3B3-4D405BBBEFEE}\ = "_ISubclass" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A625F501-206F-4713-9DE1-DD3AF4AC4BF9}\TypeLib\ = "{C6E6B197-9348-449E-A149-384B208874B1}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3D00D2AA-A077-4914-A046-62E2A7BA9C11}\ProxyStubClsid\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ntmURL.CTimer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ntmURL.ISubclass regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{22FD679B-DCE6-4B67-BC7A-EBE8326D40DB}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3F16DB30-C562-41AD-A3B3-4D405BBBEFEE} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FA496C82-EF15-498A-9281-71C17D2E83B1}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FBA8A473-BB88-4DDC-AB67-0EE6BF4788A9}\ProgID\ = "ntmURL.IInputObjectCallback" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{884DA533-61D6-43BD-AF00-BB3E961BFD29}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72CEEE43-C350-4932-B3DC-B6201F01EFCB} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ntmURL.IURLHelper regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E72183BD-2FD6-4FEC-A806-BB3DE07A5E35} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72CEEE43-C350-4932-B3DC-B6201F01EFCB}\Implemented Categories\{40FC6ED5-2438-11CF-A3DB-080036F12502} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3D00D2AA-A077-4914-A046-62E2A7BA9C11}\ = "IURLHelper" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{738A3C47-189C-4B96-8ACE-985DD34AFF17}\ProgID\ = "ntmURL.CSBCriteria" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5A2B988C-5F30-47F7-97DA-0888B9FA0D15}\VERSION\ = "1045.4" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\efindersidebar.CSideBar\Clsid regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FBA8A473-BB88-4DDC-AB67-0EE6BF4788A9} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F8A3508D-B8F0-4619-94D1-A85A54B9ABAE} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C6E6B197-9348-449E-A149-384B208874B1} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{044D0F63-C274-40B2-8F50-F09A06DCFBE1}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DD8BFC7F-4A69-4C23-B496-78B301B5193F}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FBA8A473-BB88-4DDC-AB67-0EE6BF4788A9}\ = "ntmURL.IInputObjectCallback" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ntmURL.IURLHelper\ = "ntmURL.IURLHelper" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BEA1FA35-AC92-4978-8556-0AFCD9B52FA2}\ = "CSideBar" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{26893EEF-3781-4234-8D71-EF9C394156A3}\ = "_CSBCriterion" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{738A3C47-189C-4B96-8ACE-985DD34AFF17}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1E81505D-47A7-471B-B348-07BDA6159756}\ProxyStubClsid\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6A294C45-07CC-426C-9512-6742053E462C}\Implemented Categories REG.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E9ECAA7A-3EAC-4F41-8375-84AC9D2AC3AF}\InprocServer32 regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{884DA533-61D6-43BD-AF00-BB3E961BFD29} ntmurl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6A294C45-07CC-426C-9512-6742053E462C} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C36516DD-9577-4347-B0DC-D3641BDBEB36} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DD8BFC7F-4A69-4C23-B496-78B301B5193F}\TypeLib\ = "{C6E6B197-9348-449E-A149-384B208874B1}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{149BD92F-B28E-4C04-8B4D-46CDD176B7E4}\ = "CSBCriterion" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{884DA533-61D6-43BD-AF00-BB3E961BFD29}\Programmable ntmurl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BEA1FA35-AC92-4978-8556-0AFCD9B52FA2}\TypeLib\ = "{22FD679B-DCE6-4B67-BC7A-EBE8326D40DB}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D815AB8A-E840-4054-B37D-943893116452}\ = "ezsearch" ntmurl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0E9BF828-7362-4850-9FE7-59E26521AC34}\TypeLib\ = "{C6E6B197-9348-449E-A149-384B208874B1}" regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3660 urlupdate1.exe 3660 urlupdate1.exe 3660 urlupdate1.exe 3660 urlupdate1.exe 3660 urlupdate1.exe 3660 urlupdate1.exe 3660 urlupdate1.exe 3660 urlupdate1.exe 3660 urlupdate1.exe 3660 urlupdate1.exe 3660 urlupdate1.exe 3660 urlupdate1.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3780 UrlUpdate.exe 3660 urlupdate1.exe 1600 ntmurl.exe 3036 iewindow.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3780 wrote to memory of 3660 3780 UrlUpdate.exe 83 PID 3780 wrote to memory of 3660 3780 UrlUpdate.exe 83 PID 3780 wrote to memory of 3660 3780 UrlUpdate.exe 83 PID 3660 wrote to memory of 1600 3660 urlupdate1.exe 87 PID 3660 wrote to memory of 1600 3660 urlupdate1.exe 87 PID 3660 wrote to memory of 1600 3660 urlupdate1.exe 87 PID 1600 wrote to memory of 3092 1600 ntmurl.exe 91 PID 1600 wrote to memory of 3092 1600 ntmurl.exe 91 PID 1600 wrote to memory of 3092 1600 ntmurl.exe 91 PID 1600 wrote to memory of 2068 1600 ntmurl.exe 93 PID 1600 wrote to memory of 2068 1600 ntmurl.exe 93 PID 1600 wrote to memory of 2068 1600 ntmurl.exe 93 PID 1600 wrote to memory of 456 1600 ntmurl.exe 94 PID 1600 wrote to memory of 456 1600 ntmurl.exe 94 PID 1600 wrote to memory of 456 1600 ntmurl.exe 94 PID 1600 wrote to memory of 1472 1600 ntmurl.exe 95 PID 1600 wrote to memory of 1472 1600 ntmurl.exe 95 PID 1600 wrote to memory of 1472 1600 ntmurl.exe 95 PID 1600 wrote to memory of 3532 1600 ntmurl.exe 98 PID 1600 wrote to memory of 3532 1600 ntmurl.exe 98 PID 1600 wrote to memory of 3532 1600 ntmurl.exe 98 PID 1600 wrote to memory of 3228 1600 ntmurl.exe 100 PID 1600 wrote to memory of 3228 1600 ntmurl.exe 100 PID 1600 wrote to memory of 3228 1600 ntmurl.exe 100 PID 1600 wrote to memory of 3700 1600 ntmurl.exe 102 PID 1600 wrote to memory of 3700 1600 ntmurl.exe 102 PID 1600 wrote to memory of 3700 1600 ntmurl.exe 102 PID 1600 wrote to memory of 3036 1600 ntmurl.exe 104 PID 1600 wrote to memory of 3036 1600 ntmurl.exe 104 PID 1600 wrote to memory of 3036 1600 ntmurl.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\UrlUpdate.exe"C:\Users\Admin\AppData\Local\Temp\UrlUpdate.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Users\Admin\AppData\Local\Temp\urlupdate1.exeC:\Users\Admin\AppData\Local\Temp\urlupdate1.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Users\Admin\AppData\Local\Temp\ntmurl.exeC:\Users\Admin\AppData\Local\Temp\ntmurl.exe install scope addressbar3⤵
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Users\Admin\AppData\Local\Temp\ntmurl.dll"4⤵
- Modifies registry class
PID:3092
-
-
C:\Users\Admin\AppData\Local\Temp\nnlogon.exe"C:\Users\Admin\AppData\Local\Temp\nnlogon.exe" -i4⤵PID:2068
-
-
C:\Windows\SysWOW64\sc.exesc start efinderservice4⤵
- Launches sc.exe
PID:456
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Users\Admin\AppData\Local\Temp\efsbar.dll"4⤵
- Modifies registry class
PID:1472
-
-
C:\Windows\SysWOW64\REG.exeREG IMPORT "C:\Users\Admin\AppData\Local\Temp\sbinstall.reg"4⤵
- Installs/modifies Browser Helper Object
- Modifies Internet Explorer settings
- Modifies registry class
PID:3532
-
-
C:\Windows\SysWOW64\REG.exeREG IMPORT "C:\Users\Admin\AppData\Local\Temp\sbinstall.reg"4⤵
- Modifies Internet Explorer settings
PID:3228
-
-
C:\Windows\SysWOW64\REG.exeREG IMPORT "C:\Users\Admin\AppData\Local\Temp\bbuninstall.reg"4⤵PID:3700
-
-
C:\Users\Admin\AppData\Local\Temp\iewindow.exeC:\Users\Admin\AppData\Local\Temp\iewindow.exe4⤵
- Suspicious use of SetWindowsHookEx
PID:3036
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
442B
MD5d1b9ce8ba9d227e61b8200e837a791da
SHA15ae250f8c2191376d9a07d80c356cedf976a7575
SHA2563f0c9bf08a9cdcdb96c2401271dc2bf0316adc6d4b01dde12c0d9da32594690d
SHA512265d60be34fa0457e7a7073ccfacf7748b8bddf003589cc53e6e9f2d055a0b442fe21521b78d2e2321faeab7f401eeca7d7f32b3ba65c8d64fdaa521b243965c
-
Filesize
584B
MD5ecacfdea795bad965c17f5f5be299271
SHA18273953e6382d61ef2a5c8ad9bcf60de57bdacee
SHA256b708e86033abcb3159491ae6236f03bb0bc193b2b343378d4bdd8c9d4eaa4e62
SHA5120045aa376348e8e4f3c5d1d3919f23878d3dd2cd6913e7916912b0492df0441f7b592dfc535ee83192df6431aa98b91693b8b0ae690db5c90b5a79a1976aa5bc
-
Filesize
324B
MD5538db3509cc0579e39a151e618cc0cdd
SHA1382d4259c2ec86e5ad33b94a5d9601007383aa4e
SHA2563447a237c8d3c323476c6546a6fa915c12e6dc09741428c4f0062412cabedd7d
SHA512c64cedb604536a6390b5a79529fd85227288d00340e528e5cde5bf1c978d57ad8701171dfe90c2eb9286e9f25a8e9675c47ff44f064bcee421d258835289ebf1
-
Filesize
382B
MD5729b717441624c6a216fbb0de26ce54a
SHA1f25a7ef88de77f653224a7c68bedd8898f36b753
SHA2567d63699a4b288cb8893f1524e8c5ef449e83037f21bc151fac9bcfd7325b9640
SHA512ea35eeac9c2f75e3e1fb0eceecea9e788167d01a95015c7bf17bc1b31461d027381c2dc81b88816156f14b83606b40b393ed859d8b5b83f485f9e1744ce2f3a3
-
Filesize
830B
MD599efeac3859992432d0973cbac6e9b30
SHA16f987006f2fe72031084bb86e18ed2f7ba4807e6
SHA256a89c9dcc2775d7b98f177fd55c553e5b00d1800a59322e1e1e854a79620868ae
SHA51242c441aade296c8acce5d424b919e14476d0da84a552dba118c7487415540020687fe290849214dc8067fdbc35a7a6002cd687faf048d7d2e495fd476b3788e3
-
Filesize
324B
MD5058f2758bb8063271a5c5c6257ea9cd2
SHA16928513ee55a2a32871c08f1a3aa890c6147b074
SHA2562e58e8a351d814537317d27c339272ec69e611daa63c7df80a3dc8666096fc98
SHA5120bc4a847b8aaf00f596ef97a9942882a224397b5af52628417695724d4b9dec07547f48003c902493e71832c1622305736d7119e5a278822ab55cfccef1df1a7
-
Filesize
232KB
MD50dbcc4146cc0f83f1d3c628cefa2cfba
SHA1f26860cc75c1359cac09802ce1afc51fc9d7e68e
SHA2567b5c87a3acc8c205a382515c4cf7e4a55d5ef1d1c276602ae4bf43f5bfe3567e
SHA5120b05c8e6c3d142f26502744982e627737df633776f4108a90beb0e555891c3c0cb73e4acd82ff4a4fd55e769dffc5516ec6fe0e3aed357528aef56fbb39042e1
-
Filesize
152KB
MD5df4c70adfe3ee8e7d0a7d396754681ea
SHA186d6bc8e6961a01aa689909d678512e0e3bc202c
SHA25694a6a81ad5c12aec33d7274e43ed8197cd476bb9680724995631fd971e8a3d86
SHA51294e8fa6c92cbb30320b2067158549e6079be66489c4a2c8008ec7675d9135cddd477137b3c08fe7e7a41d2da6fcc3732d9ae10e8bc47226108938249fa33fa4e
-
Filesize
218B
MD53a14f56b2be7331351b5f52803957b57
SHA17b65af8466c66022e3099dabc067b819f6b9e0e3
SHA2560373a483cce59fe7d6ced1d9bd287bbd83399289574c306e9967db60574d0fb0
SHA512f80b5a18e1b1d7788a5b98e0874765ddae7db4d6ea9a4e34defec1eb28d98a41dcadcc7610ee4c3cbc52ea9e4f5229aed848332d9aa86f9e55bfff24b3732008