Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2024, 07:11
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
DSC02581.JPG.exe
Resource
win7-20231129-en
5 signatures
150 seconds
General
-
Target
DSC02581.JPG.exe
-
Size
48KB
-
MD5
0bd0a2d11798253fefadc06a2321bb8d
-
SHA1
5dba093f812b112b0dd6127ed141b5aebf2c22fd
-
SHA256
4c08000ccf5c3fa8ae797124e0dcb0c3d3338d085a4ab11eeafaddbf0921a776
-
SHA512
008e587698ab0f0c06034cbba3fd25f6a5e00df6501bd9bdaa42606b9fa4b84653206510a6c41d63862bf09c1805c78263b0e1e3d7c3d92dcaa5836d419fa8a6
-
SSDEEP
768:9EmrbY7wyc8nAwyrRgTfv+nta7orban5lP1DB8V7w:/bYhc8nGR8ctaObantB8V
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ DSC02581.JPG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ DSC02581.JPG.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\winspool.sampleclass\Clsid DSC02581.JPG.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\winspool.sampleclass DSC02581.JPG.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 424 DSC02581.JPG.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 424 wrote to memory of 3552 424 DSC02581.JPG.exe 89 PID 424 wrote to memory of 3552 424 DSC02581.JPG.exe 89 PID 424 wrote to memory of 3552 424 DSC02581.JPG.exe 89 PID 424 wrote to memory of 548 424 DSC02581.JPG.exe 92 PID 424 wrote to memory of 548 424 DSC02581.JPG.exe 92 PID 424 wrote to memory of 548 424 DSC02581.JPG.exe 92 PID 424 wrote to memory of 4648 424 DSC02581.JPG.exe 94 PID 424 wrote to memory of 4648 424 DSC02581.JPG.exe 94 PID 424 wrote to memory of 4648 424 DSC02581.JPG.exe 94 PID 424 wrote to memory of 2396 424 DSC02581.JPG.exe 97 PID 424 wrote to memory of 2396 424 DSC02581.JPG.exe 97 PID 424 wrote to memory of 2396 424 DSC02581.JPG.exe 97 PID 424 wrote to memory of 4288 424 DSC02581.JPG.exe 98 PID 424 wrote to memory of 4288 424 DSC02581.JPG.exe 98 PID 424 wrote to memory of 4288 424 DSC02581.JPG.exe 98 PID 424 wrote to memory of 1568 424 DSC02581.JPG.exe 99 PID 424 wrote to memory of 1568 424 DSC02581.JPG.exe 99 PID 424 wrote to memory of 1568 424 DSC02581.JPG.exe 99 PID 424 wrote to memory of 5044 424 DSC02581.JPG.exe 100 PID 424 wrote to memory of 5044 424 DSC02581.JPG.exe 100 PID 424 wrote to memory of 5044 424 DSC02581.JPG.exe 100 PID 424 wrote to memory of 4680 424 DSC02581.JPG.exe 101 PID 424 wrote to memory of 4680 424 DSC02581.JPG.exe 101 PID 424 wrote to memory of 4680 424 DSC02581.JPG.exe 101 PID 424 wrote to memory of 2908 424 DSC02581.JPG.exe 102 PID 424 wrote to memory of 2908 424 DSC02581.JPG.exe 102 PID 424 wrote to memory of 2908 424 DSC02581.JPG.exe 102 PID 424 wrote to memory of 1556 424 DSC02581.JPG.exe 104 PID 424 wrote to memory of 1556 424 DSC02581.JPG.exe 104 PID 424 wrote to memory of 1556 424 DSC02581.JPG.exe 104 PID 424 wrote to memory of 364 424 DSC02581.JPG.exe 105 PID 424 wrote to memory of 364 424 DSC02581.JPG.exe 105 PID 424 wrote to memory of 364 424 DSC02581.JPG.exe 105 PID 424 wrote to memory of 4512 424 DSC02581.JPG.exe 108 PID 424 wrote to memory of 4512 424 DSC02581.JPG.exe 108 PID 424 wrote to memory of 4512 424 DSC02581.JPG.exe 108 PID 424 wrote to memory of 1196 424 DSC02581.JPG.exe 109 PID 424 wrote to memory of 1196 424 DSC02581.JPG.exe 109 PID 424 wrote to memory of 1196 424 DSC02581.JPG.exe 109 PID 424 wrote to memory of 4108 424 DSC02581.JPG.exe 110 PID 424 wrote to memory of 4108 424 DSC02581.JPG.exe 110 PID 424 wrote to memory of 4108 424 DSC02581.JPG.exe 110 PID 424 wrote to memory of 4732 424 DSC02581.JPG.exe 111 PID 424 wrote to memory of 4732 424 DSC02581.JPG.exe 111 PID 424 wrote to memory of 4732 424 DSC02581.JPG.exe 111 PID 424 wrote to memory of 2864 424 DSC02581.JPG.exe 112 PID 424 wrote to memory of 2864 424 DSC02581.JPG.exe 112 PID 424 wrote to memory of 2864 424 DSC02581.JPG.exe 112 PID 424 wrote to memory of 216 424 DSC02581.JPG.exe 113 PID 424 wrote to memory of 216 424 DSC02581.JPG.exe 113 PID 424 wrote to memory of 216 424 DSC02581.JPG.exe 113 PID 424 wrote to memory of 4576 424 DSC02581.JPG.exe 114 PID 424 wrote to memory of 4576 424 DSC02581.JPG.exe 114 PID 424 wrote to memory of 4576 424 DSC02581.JPG.exe 114 PID 424 wrote to memory of 4040 424 DSC02581.JPG.exe 115 PID 424 wrote to memory of 4040 424 DSC02581.JPG.exe 115 PID 424 wrote to memory of 4040 424 DSC02581.JPG.exe 115 PID 424 wrote to memory of 4360 424 DSC02581.JPG.exe 116 PID 424 wrote to memory of 4360 424 DSC02581.JPG.exe 116 PID 424 wrote to memory of 4360 424 DSC02581.JPG.exe 116 PID 424 wrote to memory of 4792 424 DSC02581.JPG.exe 117 PID 424 wrote to memory of 4792 424 DSC02581.JPG.exe 117 PID 424 wrote to memory of 4792 424 DSC02581.JPG.exe 117 PID 424 wrote to memory of 4188 424 DSC02581.JPG.exe 118 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID DSC02581.JPG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\ = "1" DSC02581.JPG.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\DSC02581.JPG.exe"C:\Users\Admin\AppData\Local\Temp\DSC02581.JPG.exe"1⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:424 -
C:\Windows\SysWOW64\REGSVR32.EXEC:\Windows\system32\REGSVR32.EXE /s C:\WINDOWS\addins\winspool.dll2⤵PID:3552
-
-
C:\Windows\SysWOW64\REGSVR32.EXEC:\Windows\system32\REGSVR32.EXE /s C:\WINDOWS\addins\winspool.dll2⤵PID:548
-
-
C:\Windows\SysWOW64\REGSVR32.EXEC:\Windows\system32\REGSVR32.EXE /s C:\WINDOWS\addins\winspool.dll2⤵PID:4648
-
-
C:\Windows\SysWOW64\REGSVR32.EXEC:\Windows\system32\REGSVR32.EXE /s C:\WINDOWS\addins\winspool.dll2⤵PID:2396
-
-
C:\Windows\SysWOW64\REGSVR32.EXEC:\Windows\system32\REGSVR32.EXE /s C:\WINDOWS\addins\winspool.dll2⤵PID:4288
-
-
C:\Windows\SysWOW64\REGSVR32.EXEC:\Windows\system32\REGSVR32.EXE /s C:\WINDOWS\addins\winspool.dll2⤵PID:1568
-
-
C:\Windows\SysWOW64\REGSVR32.EXEC:\Windows\system32\REGSVR32.EXE /s C:\WINDOWS\addins\winspool.dll2⤵PID:5044
-
-
C:\Windows\SysWOW64\REGSVR32.EXEC:\Windows\system32\REGSVR32.EXE /s C:\WINDOWS\addins\winspool.dll2⤵PID:4680
-
-
C:\Windows\SysWOW64\REGSVR32.EXEC:\Windows\system32\REGSVR32.EXE /s C:\WINDOWS\addins\winspool.dll2⤵PID:2908
-
-
C:\Windows\SysWOW64\REGSVR32.EXEC:\Windows\system32\REGSVR32.EXE /s C:\WINDOWS\addins\winspool.dll2⤵PID:1556
-
-
C:\Windows\SysWOW64\REGSVR32.EXEC:\Windows\system32\REGSVR32.EXE /s C:\WINDOWS\addins\winspool.dll2⤵PID:364
-
-
C:\Windows\SysWOW64\REGSVR32.EXEC:\Windows\system32\REGSVR32.EXE /s C:\WINDOWS\addins\winspool.dll2⤵PID:4512
-
-
C:\Windows\SysWOW64\REGSVR32.EXEC:\Windows\system32\REGSVR32.EXE /s C:\WINDOWS\addins\winspool.dll2⤵PID:1196
-
-
C:\Windows\SysWOW64\REGSVR32.EXEC:\Windows\system32\REGSVR32.EXE /s C:\WINDOWS\addins\winspool.dll2⤵PID:4108
-
-
C:\Windows\SysWOW64\REGSVR32.EXEC:\Windows\system32\REGSVR32.EXE /s C:\WINDOWS\addins\winspool.dll2⤵PID:4732
-
-
C:\Windows\SysWOW64\REGSVR32.EXEC:\Windows\system32\REGSVR32.EXE /s C:\WINDOWS\addins\winspool.dll2⤵PID:2864
-
-
C:\Windows\SysWOW64\REGSVR32.EXEC:\Windows\system32\REGSVR32.EXE /s C:\WINDOWS\addins\winspool.dll2⤵PID:216
-
-
C:\Windows\SysWOW64\REGSVR32.EXEC:\Windows\system32\REGSVR32.EXE /s C:\WINDOWS\addins\winspool.dll2⤵PID:4576
-
-
C:\Windows\SysWOW64\REGSVR32.EXEC:\Windows\system32\REGSVR32.EXE /s C:\WINDOWS\addins\winspool.dll2⤵PID:4040
-
-
C:\Windows\SysWOW64\REGSVR32.EXEC:\Windows\system32\REGSVR32.EXE /s C:\WINDOWS\addins\winspool.dll2⤵PID:4360
-
-
C:\Windows\SysWOW64\REGSVR32.EXEC:\Windows\system32\REGSVR32.EXE /s C:\WINDOWS\addins\winspool.dll2⤵PID:4792
-
-
C:\Windows\SysWOW64\REGSVR32.EXEC:\Windows\system32\REGSVR32.EXE /s C:\WINDOWS\addins\winspool.dll2⤵PID:4188
-
-
C:\Windows\SysWOW64\REGSVR32.EXEC:\Windows\system32\REGSVR32.EXE /s C:\WINDOWS\addins\winspool.dll2⤵PID:956
-
-
C:\Windows\SysWOW64\REGSVR32.EXEC:\Windows\system32\REGSVR32.EXE /s C:\WINDOWS\addins\winspool.dll2⤵PID:852
-
-
C:\Windows\SysWOW64\REGSVR32.EXEC:\Windows\system32\REGSVR32.EXE /s C:\WINDOWS\addins\winspool.dll2⤵PID:1592
-
-
C:\Windows\SysWOW64\REGSVR32.EXEC:\Windows\system32\REGSVR32.EXE /s C:\WINDOWS\addins\winspool.dll2⤵PID:3060
-
-
C:\Windows\SysWOW64\REGSVR32.EXEC:\Windows\system32\REGSVR32.EXE /s C:\WINDOWS\addins\winspool.dll2⤵PID:548
-
-
C:\Windows\SysWOW64\REGSVR32.EXEC:\Windows\system32\REGSVR32.EXE /s C:\WINDOWS\addins\winspool.dll2⤵PID:3524
-
-
C:\Windows\SysWOW64\REGSVR32.EXEC:\Windows\system32\REGSVR32.EXE /s C:\WINDOWS\addins\winspool.dll2⤵PID:2236
-
-
C:\Windows\SysWOW64\REGSVR32.EXEC:\Windows\system32\REGSVR32.EXE /s C:\WINDOWS\addins\winspool.dll2⤵PID:2788
-
-
C:\Windows\SysWOW64\REGSVR32.EXEC:\Windows\system32\REGSVR32.EXE /s C:\WINDOWS\addins\winspool.dll2⤵PID:4264
-
-
C:\Windows\SysWOW64\REGSVR32.EXEC:\Windows\system32\REGSVR32.EXE /s C:\WINDOWS\addins\winspool.dll2⤵PID:2064
-
-
C:\Windows\SysWOW64\REGSVR32.EXEC:\Windows\system32\REGSVR32.EXE /s C:\WINDOWS\addins\winspool.dll2⤵PID:316
-
-
C:\Windows\SysWOW64\REGSVR32.EXEC:\Windows\system32\REGSVR32.EXE /s C:\WINDOWS\addins\winspool.dll2⤵PID:3164
-
-
C:\Windows\SysWOW64\REGSVR32.EXEC:\Windows\system32\REGSVR32.EXE /s C:\WINDOWS\addins\winspool.dll2⤵PID:2284
-
-
C:\Windows\SysWOW64\REGSVR32.EXEC:\Windows\system32\REGSVR32.EXE /s C:\WINDOWS\addins\winspool.dll2⤵PID:4040
-
-
C:\Windows\SysWOW64\REGSVR32.EXEC:\Windows\system32\REGSVR32.EXE /s C:\WINDOWS\addins\winspool.dll2⤵PID:4492
-
-
C:\Windows\SysWOW64\REGSVR32.EXEC:\Windows\system32\REGSVR32.EXE /s C:\WINDOWS\addins\winspool.dll2⤵PID:4856
-
-
C:\Windows\SysWOW64\REGSVR32.EXEC:\Windows\system32\REGSVR32.EXE /s C:\WINDOWS\addins\winspool.dll2⤵PID:4132
-
-
C:\Windows\SysWOW64\REGSVR32.EXEC:\Windows\system32\REGSVR32.EXE /s C:\WINDOWS\addins\winspool.dll2⤵PID:3996
-
-
C:\Windows\SysWOW64\REGSVR32.EXEC:\Windows\system32\REGSVR32.EXE /s C:\WINDOWS\addins\winspool.dll2⤵PID:2152
-
-
C:\Windows\SysWOW64\REGSVR32.EXEC:\Windows\system32\REGSVR32.EXE /s C:\WINDOWS\addins\winspool.dll2⤵PID:4508
-
-
C:\Windows\SysWOW64\REGSVR32.EXEC:\Windows\system32\REGSVR32.EXE /s C:\WINDOWS\addins\winspool.dll2⤵PID:764
-
-
C:\Windows\SysWOW64\REGSVR32.EXEC:\Windows\system32\REGSVR32.EXE /s C:\WINDOWS\addins\winspool.dll2⤵PID:392
-
-
C:\Windows\SysWOW64\REGSVR32.EXEC:\Windows\system32\REGSVR32.EXE /s C:\WINDOWS\addins\winspool.dll2⤵PID:4884
-
-
C:\Windows\SysWOW64\REGSVR32.EXEC:\Windows\system32\REGSVR32.EXE /s C:\WINDOWS\addins\winspool.dll2⤵PID:3056
-
-
C:\Windows\SysWOW64\REGSVR32.EXEC:\Windows\system32\REGSVR32.EXE /s C:\WINDOWS\addins\winspool.dll2⤵PID:2736
-