Overview
overview
10Static
static
3HA_DVDIden...re.exe
windows7-x64
7HA_DVDIden...re.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...sh.dll
windows7-x64
3$PLUGINSDI...sh.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$TEMP/Assi...fy.exe
windows7-x64
8$TEMP/Assi...fy.exe
windows10-2004-x64
8$R0.dll
windows7-x64
8$R0.dll
windows10-2004-x64
8Assist/$R0.dll
windows7-x64
6Assist/$R0.dll
windows10-2004-x64
6$TEMP/DUDU_HH.exe
windows7-x64
10$TEMP/DUDU_HH.exe
windows10-2004-x64
10DVD Identifier.chm
windows7-x64
1DVD Identifier.chm
windows10-2004-x64
1DVD Identifier.exe
windows7-x64
6DVD Identifier.exe
windows10-2004-x64
6uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3Analysis
-
max time kernel
138s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
20-06-2024 06:12
Static task
static1
Behavioral task
behavioral1
Sample
HA_DVDIdentifier401_Fire.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
HA_DVDIdentifier401_Fire.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/Splash.dll
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/Splash.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240419-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
$TEMP/Assist_hanzify.exe
Resource
win7-20240220-en
Behavioral task
behavioral12
Sample
$TEMP/Assist_hanzify.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral13
Sample
$R0.dll
Resource
win7-20240611-en
Behavioral task
behavioral14
Sample
$R0.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
Assist/$R0.dll
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
Assist/$R0.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral17
Sample
$TEMP/DUDU_HH.exe
Resource
win7-20240508-en
Behavioral task
behavioral18
Sample
$TEMP/DUDU_HH.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
DVD Identifier.chm
Resource
win7-20240220-en
Behavioral task
behavioral20
Sample
DVD Identifier.chm
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
DVD Identifier.exe
Resource
win7-20231129-en
Behavioral task
behavioral22
Sample
DVD Identifier.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral23
Sample
uninst.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
uninst.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240611-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240508-en
General
-
Target
Assist/$R0.dll
-
Size
156KB
-
MD5
aaf5a6b61ca11868c31011a68d95a5ef
-
SHA1
d58bb83332af9e56758ff5cb1fcd3173567e6c4c
-
SHA256
a8cd1c0f58135ad104b0d2a3064d3d4b9792be5ff40a721aac7eb37e26708b36
-
SHA512
e6461950958a38089197932f6ba34b578a6d6932e1cf7412a2c93f5841e853468037c0cd2081d3ef5f744ab04df7b8b967113aa255066a1f22ae980dc6ceca3b
-
SSDEEP
3072:rLUxXZ6+a0acTJyxc+avp3U0S96yM33fJgqVfuO8LLx14:cxZ6/cNSKd7r33VfVA
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
regsvr32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{BB936323-19FA-4521-BA29-ECA6A121BC78} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{BB936323-19FA-4521-BA29-ECA6A121BC78}\ = "AssistII" regsvr32.exe -
Processes:
regsvr32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Software\Microsoft\Internet Explorer\URLSearchHooks regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\SOFTWARE\Microsoft\Internet Explorer\URLSearchHooks\{BB936323-19FA-4521-BA29-ECA6A121BC78} = "coolbar" regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\SOFTWARE\Microsoft\Internet Explorer\URLSearchHooks\{CFBFAE00-17A6-11D0-99CB-00C04FD64497} regsvr32.exe Key deleted \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\WebBrowser regsvr32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Toolbar regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Toolbar\{BB936323-19FA-4521-BA29-ECA6A121BC78} = "????" regsvr32.exe -
Modifies registry class 46 IoCs
Processes:
regsvr32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CoolBar.CoolBarObj.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CoolBar.CoolBarObj\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CoolBar.CoolBarObj\CurVer\ = "CoolBar.CoolBarObj.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BB936323-19FA-4521-BA29-ECA6A121BC78}\TypeLib\ = "{D4839331-534D-4D0C-875F-D25AF6A10CCC}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D4839331-534D-4D0C-875F-D25AF6A10CCC}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7436DB12-1A7A-4D87-A4E0-713EC9D86050}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7436DB12-1A7A-4D87-A4E0-713EC9D86050}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CoolBar.CoolBarObj.1\ = "ÉÏÍøÖúÊÖ" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CoolBar.CoolBarObj\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BB936323-19FA-4521-BA29-ECA6A121BC78}\ProgID\ = "CoolBar.CoolBarObj.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BB936323-19FA-4521-BA29-ECA6A121BC78}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D4839331-534D-4D0C-875F-D25AF6A10CCC}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7436DB12-1A7A-4D87-A4E0-713EC9D86050} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7436DB12-1A7A-4D87-A4E0-713EC9D86050}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BB936323-19FA-4521-BA29-ECA6A121BC78} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BB936323-19FA-4521-BA29-ECA6A121BC78}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D4839331-534D-4D0C-875F-D25AF6A10CCC}\1.0\ = "CoolBar 1.0 Type Library" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7436DB12-1A7A-4D87-A4E0-713EC9D86050}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7436DB12-1A7A-4D87-A4E0-713EC9D86050}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7436DB12-1A7A-4D87-A4E0-713EC9D86050}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CoolBar.CoolBarObj.1\CLSID\ = "{BB936323-19FA-4521-BA29-ECA6A121BC78}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BB936323-19FA-4521-BA29-ECA6A121BC78}\VersionIndependentProgID\ = "CoolBar.CoolBarObj" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BB936323-19FA-4521-BA29-ECA6A121BC78}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BB936323-19FA-4521-BA29-ECA6A121BC78}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Assist\\$R0.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7436DB12-1A7A-4D87-A4E0-713EC9D86050}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7436DB12-1A7A-4D87-A4E0-713EC9D86050}\TypeLib\ = "{D4839331-534D-4D0C-875F-D25AF6A10CCC}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CoolBar.CoolBarObj\CLSID\ = "{BB936323-19FA-4521-BA29-ECA6A121BC78}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BB936323-19FA-4521-BA29-ECA6A121BC78}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BB936323-19FA-4521-BA29-ECA6A121BC78}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D4839331-534D-4D0C-875F-D25AF6A10CCC}\1.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D4839331-534D-4D0C-875F-D25AF6A10CCC}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D4839331-534D-4D0C-875F-D25AF6A10CCC}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Assist\\" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CoolBar.CoolBarObj.1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CoolBar.CoolBarObj regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BB936323-19FA-4521-BA29-ECA6A121BC78}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D4839331-534D-4D0C-875F-D25AF6A10CCC} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7436DB12-1A7A-4D87-A4E0-713EC9D86050}\ = "IToolBandObj" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7436DB12-1A7A-4D87-A4E0-713EC9D86050}\ = "IToolBandObj" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D4839331-534D-4D0C-875F-D25AF6A10CCC}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7436DB12-1A7A-4D87-A4E0-713EC9D86050}\TypeLib\ = "{D4839331-534D-4D0C-875F-D25AF6A10CCC}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7436DB12-1A7A-4D87-A4E0-713EC9D86050}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CoolBar.CoolBarObj\ = "ÉÏÍøÖúÊÖ" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BB936323-19FA-4521-BA29-ECA6A121BC78}\ = "ÉÏÍøÖúÊÖ" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D4839331-534D-4D0C-875F-D25AF6A10CCC}\1.0\FLAGS\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D4839331-534D-4D0C-875F-D25AF6A10CCC}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Assist\\$R0.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7436DB12-1A7A-4D87-A4E0-713EC9D86050} regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
regsvr32.exedescription pid process target process PID 4480 wrote to memory of 1828 4480 regsvr32.exe regsvr32.exe PID 4480 wrote to memory of 1828 4480 regsvr32.exe regsvr32.exe PID 4480 wrote to memory of 1828 4480 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\Assist\$R0.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\Assist\$R0.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies Internet Explorer settings
- Modifies registry class
PID:1828
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
604B
MD5797a7955e4869d421f672cd2e5fb6bde
SHA14120908d501ad837286cafedc8cd8096dc2b6364
SHA256f251946827b8ed34e1cf1909b1a0a68ab8a6a378a2043753c93b9156a781908e
SHA5125aaaa681d6bf2aa88224c4884c739a325ba6d5d4cc2e668fe85910c5db1ab58bafceafc8478c050084c90a5c7d3a58e81939c1bb3aa18ffd4512a0ff3cb84002