Analysis Overview
SHA256
c7dadcf3bbc695043272e73133d1b309f7b02ec7a8b409fae375dcbea23cedb3
Threat Level: Shows suspicious behavior
The file 03e3c0a239be50c50e369d4d71ecf1bf_JaffaCakes118 was found to be: Shows suspicious behavior.
Malicious Activity Summary
Loads dropped DLL
UPX packed file
Installs/modifies Browser Helper Object
Drops file in System32 directory
Enumerates physical storage devices
Program crash
Unsigned PE
NSIS installer
Modifies registry class
Suspicious use of WriteProcessMemory
Modifies Internet Explorer settings
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-06-20 07:06
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
NSIS installer
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-20 07:06
Reported
2024-06-20 07:09
Platform
win7-20240611-en
Max time kernel
119s
Max time network
124s
Command Line
Signatures
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\03e3c0a239be50c50e369d4d71ecf1bf_JaffaCakes118.exe | N/A |
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Installs/modifies Browser Helper Object
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{FCD25C53-C41E-4DE1-9E9E-04CB49692BC9} | C:\Users\Admin\AppData\Local\Temp\03e3c0a239be50c50e369d4d71ecf1bf_JaffaCakes118.exe | N/A |
Drops file in System32 directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\SysWOW64\fastsrch.dll | C:\Users\Admin\AppData\Local\Temp\03e3c0a239be50c50e369d4d71ecf1bf_JaffaCakes118.exe | N/A |
| File created | C:\Windows\SysWOW64\fastsrch.dll | C:\Users\Admin\AppData\Local\Temp\03e3c0a239be50c50e369d4d71ecf1bf_JaffaCakes118.exe | N/A |
Enumerates physical storage devices
Modifies Internet Explorer settings
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main | C:\Users\Admin\AppData\Local\Temp\03e3c0a239be50c50e369d4d71ecf1bf_JaffaCakes118.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\TabProcGrowth = "1" | C:\Users\Admin\AppData\Local\Temp\03e3c0a239be50c50e369d4d71ecf1bf_JaffaCakes118.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FCD25C53-C41E-4DE1-9E9E-04CB49692BC9}\InprocServer32\ThreadingModel = "apartment" | C:\Users\Admin\AppData\Local\Temp\03e3c0a239be50c50e369d4d71ecf1bf_JaffaCakes118.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FCD25C53-C41E-4DE1-9E9E-04CB49692BC9}\InprocServer32 | C:\Users\Admin\AppData\Local\Temp\03e3c0a239be50c50e369d4d71ecf1bf_JaffaCakes118.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node | C:\Users\Admin\AppData\Local\Temp\03e3c0a239be50c50e369d4d71ecf1bf_JaffaCakes118.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID | C:\Users\Admin\AppData\Local\Temp\03e3c0a239be50c50e369d4d71ecf1bf_JaffaCakes118.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FCD25C53-C41E-4DE1-9E9E-04CB49692BC9} | C:\Users\Admin\AppData\Local\Temp\03e3c0a239be50c50e369d4d71ecf1bf_JaffaCakes118.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FCD25C53-C41E-4DE1-9E9E-04CB49692BC9}\InprocServer32\ = "C:\\Windows\\SysWow64\\fastsrch.dll" | C:\Users\Admin\AppData\Local\Temp\03e3c0a239be50c50e369d4d71ecf1bf_JaffaCakes118.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\03e3c0a239be50c50e369d4d71ecf1bf_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\03e3c0a239be50c50e369d4d71ecf1bf_JaffaCakes118.exe"
Network
Files
\Windows\SysWOW64\fastsrch.dll
| MD5 | 1e337e4316c2c973180e635218897f78 |
| SHA1 | e73cbb449c451a8dbdbabc9e42d84659e5b9158e |
| SHA256 | 269d150bcb4e6b94c5c07174ae73ed642c922fb73f43974f4fc1158e7815e4e0 |
| SHA512 | c2109c0a0b3f57371d8f5e3dbf0c32854247bf8709291e4f53549d7fa515dc56a6cc5df75e52213d2e5af45daaf4179075a26c93d4e1f536a1596bce7e8a3fdb |
memory/3000-4-0x0000000001CC0000-0x0000000001D00000-memory.dmp
memory/3000-8-0x0000000001CC0000-0x0000000001D00000-memory.dmp
memory/3000-5-0x0000000001CC0000-0x0000000001D00000-memory.dmp
memory/3000-2-0x0000000000330000-0x0000000000354000-memory.dmp
Analysis: behavioral5
Detonation Overview
Submitted
2024-06-20 07:06
Reported
2024-06-20 07:09
Platform
win7-20240221-en
Max time kernel
120s
Max time network
120s
Command Line
Signatures
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Installs/modifies Browser Helper Object
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5B02530C-8A5D-405F-8B84-AA41B6B8A302} | C:\Windows\SysWOW64\regsvr32.exe | N/A |
Modifies Internet Explorer settings
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\TabProcGrowth = "1" | C:\Windows\SysWOW64\regsvr32.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main | C:\Windows\SysWOW64\regsvr32.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5B02530C-8A5D-405F-8B84-AA41B6B8A302} | C:\Windows\SysWOW64\regsvr32.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5B02530C-8A5D-405F-8B84-AA41B6B8A302}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\$R0.dll" | C:\Windows\SysWOW64\regsvr32.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5B02530C-8A5D-405F-8B84-AA41B6B8A302}\InprocServer32\ThreadingModel = "apartment" | C:\Windows\SysWOW64\regsvr32.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5B02530C-8A5D-405F-8B84-AA41B6B8A302}\InprocServer32 | C:\Windows\SysWOW64\regsvr32.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node | C:\Windows\SysWOW64\regsvr32.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID | C:\Windows\SysWOW64\regsvr32.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1912 wrote to memory of 2216 | N/A | C:\Windows\system32\regsvr32.exe | C:\Windows\SysWOW64\regsvr32.exe |
| PID 1912 wrote to memory of 2216 | N/A | C:\Windows\system32\regsvr32.exe | C:\Windows\SysWOW64\regsvr32.exe |
| PID 1912 wrote to memory of 2216 | N/A | C:\Windows\system32\regsvr32.exe | C:\Windows\SysWOW64\regsvr32.exe |
| PID 1912 wrote to memory of 2216 | N/A | C:\Windows\system32\regsvr32.exe | C:\Windows\SysWOW64\regsvr32.exe |
| PID 1912 wrote to memory of 2216 | N/A | C:\Windows\system32\regsvr32.exe | C:\Windows\SysWOW64\regsvr32.exe |
| PID 1912 wrote to memory of 2216 | N/A | C:\Windows\system32\regsvr32.exe | C:\Windows\SysWOW64\regsvr32.exe |
| PID 1912 wrote to memory of 2216 | N/A | C:\Windows\system32\regsvr32.exe | C:\Windows\SysWOW64\regsvr32.exe |
Processes
C:\Windows\system32\regsvr32.exe
regsvr32 /s C:\Users\Admin\AppData\Local\Temp\$R0.dll
C:\Windows\SysWOW64\regsvr32.exe
/s C:\Users\Admin\AppData\Local\Temp\$R0.dll
Network
Files
memory/2216-0-0x00000000001B0000-0x00000000001D4000-memory.dmp
memory/2216-7-0x00000000001E0000-0x0000000000220000-memory.dmp
memory/2216-6-0x00000000001E0000-0x0000000000220000-memory.dmp
memory/2216-5-0x00000000001E0000-0x0000000000220000-memory.dmp
memory/2216-2-0x00000000001E0000-0x0000000000220000-memory.dmp
Analysis: behavioral7
Detonation Overview
Submitted
2024-06-20 07:06
Reported
2024-06-20 07:09
Platform
win7-20240508-en
Max time kernel
118s
Max time network
119s
Command Line
Signatures
Processes
C:\Users\Admin\AppData\Local\Temp\$R2\NSIS.Library.RegTool.v3.$_0_.exe
"C:\Users\Admin\AppData\Local\Temp\$R2\NSIS.Library.RegTool.v3.$_0_.exe"
Network
Files
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-20 07:06
Reported
2024-06-20 07:09
Platform
win10v2004-20240508-en
Max time kernel
149s
Max time network
150s
Command Line
Signatures
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\03e3c0a239be50c50e369d4d71ecf1bf_JaffaCakes118.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\03e3c0a239be50c50e369d4d71ecf1bf_JaffaCakes118.exe | N/A |
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Installs/modifies Browser Helper Object
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{06CCFAB1-D1FD-4053-8238-30BF708E8154} | C:\Users\Admin\AppData\Local\Temp\03e3c0a239be50c50e369d4d71ecf1bf_JaffaCakes118.exe | N/A |
Drops file in System32 directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\SysWOW64\fastsrch.dll | C:\Users\Admin\AppData\Local\Temp\03e3c0a239be50c50e369d4d71ecf1bf_JaffaCakes118.exe | N/A |
| File created | C:\Windows\SysWOW64\fastsrch.dll | C:\Users\Admin\AppData\Local\Temp\03e3c0a239be50c50e369d4d71ecf1bf_JaffaCakes118.exe | N/A |
Enumerates physical storage devices
Modifies Internet Explorer settings
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Microsoft\Internet Explorer\Main | C:\Users\Admin\AppData\Local\Temp\03e3c0a239be50c50e369d4d71ecf1bf_JaffaCakes118.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\Main\TabProcGrowth = "1" | C:\Users\Admin\AppData\Local\Temp\03e3c0a239be50c50e369d4d71ecf1bf_JaffaCakes118.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{06CCFAB1-D1FD-4053-8238-30BF708E8154}\InprocServer32 | C:\Users\Admin\AppData\Local\Temp\03e3c0a239be50c50e369d4d71ecf1bf_JaffaCakes118.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node | C:\Users\Admin\AppData\Local\Temp\03e3c0a239be50c50e369d4d71ecf1bf_JaffaCakes118.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID | C:\Users\Admin\AppData\Local\Temp\03e3c0a239be50c50e369d4d71ecf1bf_JaffaCakes118.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{06CCFAB1-D1FD-4053-8238-30BF708E8154} | C:\Users\Admin\AppData\Local\Temp\03e3c0a239be50c50e369d4d71ecf1bf_JaffaCakes118.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{06CCFAB1-D1FD-4053-8238-30BF708E8154}\InprocServer32\ = "C:\\Windows\\SysWow64\\fastsrch.dll" | C:\Users\Admin\AppData\Local\Temp\03e3c0a239be50c50e369d4d71ecf1bf_JaffaCakes118.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{06CCFAB1-D1FD-4053-8238-30BF708E8154}\InprocServer32\ThreadingModel = "apartment" | C:\Users\Admin\AppData\Local\Temp\03e3c0a239be50c50e369d4d71ecf1bf_JaffaCakes118.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\03e3c0a239be50c50e369d4d71ecf1bf_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\03e3c0a239be50c50e369d4d71ecf1bf_JaffaCakes118.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 183.142.211.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 4.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 28.118.140.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 58.55.71.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 103.169.127.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 140.71.91.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 240.221.184.93.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 14.227.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 226.162.46.104.in-addr.arpa | udp |
Files
C:\Windows\SysWOW64\fastsrch.dll
| MD5 | 1e337e4316c2c973180e635218897f78 |
| SHA1 | e73cbb449c451a8dbdbabc9e42d84659e5b9158e |
| SHA256 | 269d150bcb4e6b94c5c07174ae73ed642c922fb73f43974f4fc1158e7815e4e0 |
| SHA512 | c2109c0a0b3f57371d8f5e3dbf0c32854247bf8709291e4f53549d7fa515dc56a6cc5df75e52213d2e5af45daaf4179075a26c93d4e1f536a1596bce7e8a3fdb |
memory/64-4-0x0000000002260000-0x0000000002284000-memory.dmp
memory/64-7-0x0000000002290000-0x00000000022D0000-memory.dmp
memory/64-11-0x0000000002290000-0x00000000022D0000-memory.dmp
memory/64-8-0x0000000002290000-0x00000000022D0000-memory.dmp
Analysis: behavioral3
Detonation Overview
Submitted
2024-06-20 07:06
Reported
2024-06-20 07:09
Platform
win7-20240611-en
Max time kernel
120s
Max time network
120s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Windows\SysWOW64\rundll32.exe |
Suspicious use of WriteProcessMemory
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2940 -s 224
Network
Files
Analysis: behavioral4
Detonation Overview
Submitted
2024-06-20 07:06
Reported
2024-06-20 07:09
Platform
win10v2004-20240508-en
Max time kernel
147s
Max time network
150s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Windows\SysWOW64\rundll32.exe |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 380 wrote to memory of 3304 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 380 wrote to memory of 3304 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 380 wrote to memory of 3304 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3304 -ip 3304
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3304 -s 620
Network
Files
Analysis: behavioral6
Detonation Overview
Submitted
2024-06-20 07:06
Reported
2024-06-20 07:09
Platform
win10v2004-20240611-en
Max time kernel
139s
Max time network
125s
Command Line
Signatures
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Installs/modifies Browser Helper Object
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{E5076AF8-DD6E-490F-9485-E9043E500257} | C:\Windows\SysWOW64\regsvr32.exe | N/A |
Modifies Internet Explorer settings
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\Software\Microsoft\Internet Explorer\Main | C:\Windows\SysWOW64\regsvr32.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Internet Explorer\Main\TabProcGrowth = "1" | C:\Windows\SysWOW64\regsvr32.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E5076AF8-DD6E-490F-9485-E9043E500257}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\$R0.dll" | C:\Windows\SysWOW64\regsvr32.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E5076AF8-DD6E-490F-9485-E9043E500257}\InprocServer32\ThreadingModel = "apartment" | C:\Windows\SysWOW64\regsvr32.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E5076AF8-DD6E-490F-9485-E9043E500257}\InprocServer32 | C:\Windows\SysWOW64\regsvr32.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node | C:\Windows\SysWOW64\regsvr32.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID | C:\Windows\SysWOW64\regsvr32.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E5076AF8-DD6E-490F-9485-E9043E500257} | C:\Windows\SysWOW64\regsvr32.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2220 wrote to memory of 1340 | N/A | C:\Windows\system32\regsvr32.exe | C:\Windows\SysWOW64\regsvr32.exe |
| PID 2220 wrote to memory of 1340 | N/A | C:\Windows\system32\regsvr32.exe | C:\Windows\SysWOW64\regsvr32.exe |
| PID 2220 wrote to memory of 1340 | N/A | C:\Windows\system32\regsvr32.exe | C:\Windows\SysWOW64\regsvr32.exe |
Processes
C:\Windows\system32\regsvr32.exe
regsvr32 /s C:\Users\Admin\AppData\Local\Temp\$R0.dll
C:\Windows\SysWOW64\regsvr32.exe
/s C:\Users\Admin\AppData\Local\Temp\$R0.dll
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 241.150.49.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 82.90.14.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 13.107.21.237:443 | g.bing.com | tcp |
| NL | 23.62.61.171:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 71.31.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 237.21.107.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 171.61.62.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 58.55.71.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 86.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 134.71.91.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 89.90.14.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 13.227.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 8.8.8.8:53 | 26.35.223.20.in-addr.arpa | udp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 10.28.171.150.in-addr.arpa | udp |
Files
memory/1340-5-0x0000000002B50000-0x0000000002B90000-memory.dmp
memory/1340-1-0x0000000002B50000-0x0000000002B90000-memory.dmp
memory/1340-0-0x0000000002B50000-0x0000000002B90000-memory.dmp
memory/1340-4-0x0000000002B50000-0x0000000002B90000-memory.dmp
Analysis: behavioral8
Detonation Overview
Submitted
2024-06-20 07:06
Reported
2024-06-20 07:09
Platform
win10v2004-20240611-en
Max time kernel
149s
Max time network
149s
Command Line
Signatures
Processes
C:\Users\Admin\AppData\Local\Temp\$R2\NSIS.Library.RegTool.v3.$_0_.exe
"C:\Users\Admin\AppData\Local\Temp\$R2\NSIS.Library.RegTool.v3.$_0_.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 28.118.140.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 204.79.197.237:443 | g.bing.com | tcp |
| NL | 23.62.61.155:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 237.197.79.204.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 64.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 155.61.62.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 82.90.14.23.in-addr.arpa | udp |
| NL | 23.62.61.155:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 205.47.74.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 196.249.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 86.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 89.90.14.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 13.227.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 10.27.171.150.in-addr.arpa | udp |
| US | 8.8.8.8:53 | udp |