Overview
overview
7Static
static
75de592dd0c...18.exe
windows7-x64
75de592dd0c...18.exe
windows10-2004-x64
7$LOCALAPPD...ds.exe
windows7-x64
7$LOCALAPPD...ds.exe
windows10-2004-x64
7$PLUGINSDI...Ex.dll
windows7-x64
3$PLUGINSDI...Ex.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
1$PLUGINSDI...ns.dll
windows10-2004-x64
1$PLUGINSDI...ad.dll
windows7-x64
3$PLUGINSDI...ad.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...es.dll
windows7-x64
3$PLUGINSDI...es.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/Time.dll
windows7-x64
3$PLUGINSDIR/Time.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...ef.dll
windows7-x64
3$PLUGINSDI...ef.dll
windows10-2004-x64
3$PLUGINSDIR/mt.dll
windows7-x64
1$PLUGINSDIR/mt.dll
windows10-2004-x64
1$PLUGINSDI...os.dll
windows7-x64
3$PLUGINSDI...os.dll
windows10-2004-x64
1FM4ffx.exe
windows7-x64
7FM4ffx.exe
windows10-2004-x64
7$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 22:15
Behavioral task
behavioral1
Sample
5de592dd0ce0278461c2dc44f7410f8c_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5de592dd0ce0278461c2dc44f7410f8c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$LOCALAPPDATA/funmoods.exe
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
$LOCALAPPDATA/funmoods.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/ExtractDLLEx.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/ExtractDLLEx.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/IEFunctions.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/IEFunctions.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/InetLoad.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/InetLoad.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/Processes.dll
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/Processes.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/Time.dll
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/Time.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240705-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/chrmPref.dll
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/chrmPref.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/mt.dll
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/mt.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/nsisos.dll
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/nsisos.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
FM4ffx.exe
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
FM4ffx.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
General
-
Target
$LOCALAPPDATA/funmoods.exe
-
Size
1.6MB
-
MD5
badf0b8e9bc8d7352fb084951255ee4f
-
SHA1
e584634b5565fd81d7258fca86c632c9d3e1cd14
-
SHA256
73db5f6b89963d6692e3c43c8f3e5265ec4512ce87fe652e9ec3a4a0bb036db8
-
SHA512
3b704e3b0d440f1e580cc277c3c68223139f35156b00250ebf9a231f03d5f74bd19bbf948061e7b8be13b9c08aca9f30a0929cfce5a9d5cc3558cd187a05d53e
-
SSDEEP
24576:VtxBMupYpmZICsiWuu0uFYBimEuDYYmTj67rRXFO6BbwZTdNFtr6Ps7QOWxQ6NVN:p6HmZICsfujIvGmTW7rRQakZpt+xQON
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 772 FM4ie.exe 2080 FM4ffx.exe 2728 funmoodssrv.exe -
Loads dropped DLL 64 IoCs
pid Process 2988 funmoods.exe 2988 funmoods.exe 2988 funmoods.exe 2988 funmoods.exe 2988 funmoods.exe 2988 funmoods.exe 2988 funmoods.exe 2988 funmoods.exe 2988 funmoods.exe 2988 funmoods.exe 2988 funmoods.exe 2988 funmoods.exe 2988 funmoods.exe 2988 funmoods.exe 2988 funmoods.exe 2988 funmoods.exe 2988 funmoods.exe 2988 funmoods.exe 2988 funmoods.exe 2988 funmoods.exe 2988 funmoods.exe 2988 funmoods.exe 2988 funmoods.exe 2988 funmoods.exe 2988 funmoods.exe 2988 funmoods.exe 2988 funmoods.exe 2988 funmoods.exe 2988 funmoods.exe 772 FM4ie.exe 772 FM4ie.exe 772 FM4ie.exe 772 FM4ie.exe 2080 FM4ffx.exe 2080 FM4ffx.exe 2080 FM4ffx.exe 2080 FM4ffx.exe 772 FM4ie.exe 772 FM4ie.exe 2080 FM4ffx.exe 2080 FM4ffx.exe 2080 FM4ffx.exe 2080 FM4ffx.exe 2080 FM4ffx.exe 2080 FM4ffx.exe 2080 FM4ffx.exe 2080 FM4ffx.exe 2080 FM4ffx.exe 2080 FM4ffx.exe 2080 FM4ffx.exe 2080 FM4ffx.exe 2080 FM4ffx.exe 2080 FM4ffx.exe 2080 FM4ffx.exe 2080 FM4ffx.exe 2080 FM4ffx.exe 2080 FM4ffx.exe 2080 FM4ffx.exe 2080 FM4ffx.exe 2080 FM4ffx.exe 2080 FM4ffx.exe 2080 FM4ffx.exe 2080 FM4ffx.exe 2080 FM4ffx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 4 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{75EBB0AA-4214-4CB4-90EC-E3E07ECD04F7} FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{75EBB0AA-4214-4CB4-90EC-E3E07ECD04F7}\ = "Funmoods Helper Object" FM4ie.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{75EBB0AA-4214-4CB4-90EC-E3E07ECD04F7}\NoExplorer = "1" FM4ie.exe -
Drops file in Program Files directory 7 IoCs
description ioc Process File created C:\Program Files (x86)\Funmoods\funmoods\1.5.11.16\funmoodsApp.dll FM4ie.exe File created C:\Program Files (x86)\Funmoods\funmoods\1.5.11.16\funmoodsEng.dll FM4ie.exe File created C:\Program Files (x86)\Funmoods\funmoods\1.5.11.16\funmoodsTlbr.dll FM4ie.exe File created C:\Program Files (x86)\Funmoods\funmoods\1.5.11.16\funmoodssrv.exe FM4ie.exe File created C:\Program Files (x86)\Funmoods\funmoods\1.5.11.16\funmoodsOEM.crx FM4ie.exe File created C:\Program Files (x86)\Funmoods\funmoods\1.5.11.16\uninstall.exe FM4ie.exe File created C:\Program Files (x86)\Funmoods\funmoods\1.5.11.16\bh\funmoods.dll FM4ie.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 6 IoCs
resource yara_rule behavioral3/files/0x0005000000019dde-138.dat nsis_installer_1 behavioral3/files/0x0005000000019dde-138.dat nsis_installer_2 behavioral3/files/0x0005000000019ddc-142.dat nsis_installer_1 behavioral3/files/0x0005000000019ddc-142.dat nsis_installer_2 behavioral3/files/0x000400000001cb0a-1145.dat nsis_installer_1 behavioral3/files/0x000400000001cb0a-1145.dat nsis_installer_2 -
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Toolbar\ FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Toolbar\{A4C272EC-ED9E-4ACE-A6F2-9558C7F29EF3} = "Funmoods Toolbar" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{C87FC351-A80D-43E9-9A86-CF1E29DC443A} FM4ie.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{C87FC351-A80D-43E9-9A86-CF1E29DC443A}\Policy = "3" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{C87FC351-A80D-43E9-9A86-CF1E29DC443A}\AppName = "funmoodssrv.exe" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{C87FC351-A80D-43E9-9A86-CF1E29DC443A}\AppPath = "C:\\Program Files (x86)\\Funmoods\\funmoods\\1.5.11.16" FM4ie.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\esrv.funmoodsESrvc\CurVer funmoodssrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C0585B2F-74D7-4734-88DE-6C150C5D4036}\TypeLib FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{B12E99ED-69BD-437C-86BE-C862B9E5444D}\ = "escortEng" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{77A6E7D4-4A83-4A9B-A2A0-EF3B125DC29D}\ = "IEscortFctry" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{295CACB4-51F5-46FD-914E-C72BAAE1B672}\ProxyStubClsid32 FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{295CACB4-51F5-46FD-914E-C72BAAE1B672}\TypeLib FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{54291324-7A3D-4F11-B707-3FB6A2C97BD9} FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{34C1FDF7-02C1-4F23-B393-F48B16E071D1}\TypeLib\ = "{1D085C0A-E4F4-4F66-BDBF-4BE51015BFC3}" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{75EBB0AA-4214-4CB4-90EC-E3E07ECD04F7}\VersionIndependentProgID\ = "funmoods.funmoodsHlpr" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D8242E89-2F81-484A-AE5B-BA8CAD5B7347}\TypeLib\ = "{1D085C0A-E4F4-4F66-BDBF-4BE51015BFC3}" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1D085C0A-E4F4-4F66-BDBF-4BE51015BFC3}\1.0\0\win32\ = "C:\\Program Files (x86)\\Funmoods\\funmoods\\1.5.11.16\\funmoodsEng.dll\\2" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{54291324-7A3D-4F11-B707-3FB6A2C97BD9}\ProxyStubClsid32 FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{75A4D144-506D-4BE5-81DB-EC7DA1E7F840}\LocalServer32\ = "\"C:\\Program Files (x86)\\Funmoods\\funmoods\\1.5.11.16\\funmoodssrv.exe\"" funmoodssrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{965B9DBE-B104-44AC-950A-8A5F97AFF439}\InprocServer32 FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\funmoodsApp.appCore\CurVer FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0D80F1C5-D17B-4177-AC68-955F3EF9F191} FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\escortApp.DLL FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\funmoodsApp.appCore.1\CLSID\ = "{A9DB719C-7156-415E-B49D-BAD039DE4F13}" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0D80F1C5-D17B-4177-AC68-955F3EF9F191}\TypeLib\ = "{1D085C0A-E4F4-4F66-BDBF-4BE51015BFC3}" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{59C63F11-D4E5-46E7-9B8A-EE158DCA83A8}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{23C70BCA-6E23-4A65-AD2E-1389062074F1}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{75A4D144-506D-4BE5-81DB-EC7DA1E7F840}\AppID = "{960DF771-CFCB-4E53-A5B5-6EF2BBE6E706}" funmoodssrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D7EE8177-D51E-4F89-92B6-83EA2EC40800}\1.0\0\win32 FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{960DF771-CFCB-4E53-A5B5-6EF2BBE6E706} funmoodssrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{EA28B360-05E0-4F93-8150-02891F1D8D3C}\Instl\Data\vrsnTs = "1.5.11.1622:15:12" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\funmoods.funmoodsHlpr.1\CLSID\ = "{75EBB0AA-4214-4CB4-90EC-E3E07ECD04F7}" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2CE5C4B9-6DBE-4528-96FA-C9FF38EF1762}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2CE5C4B9-6DBE-4528-96FA-C9FF38EF1762}\TypeLib\ = "{1D085C0A-E4F4-4F66-BDBF-4BE51015BFC3}" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5DA22CBD-0029-4A09-B757-CF0FAFC488ED}\TypeLib FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1D085C0A-E4F4-4F66-BDBF-4BE51015BFC3}\1.0 FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{77A6E7D4-4A83-4A9B-A2A0-EF3B125DC29D}\ProxyStubClsid32 FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0D80F1C5-D17B-4177-AC68-955F3EF9F191}\ProxyStubClsid32 FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{EA28B360-05E0-4F93-8150-02891F1D8D3C}\Instl\Data\instlRef FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{34C1FDF7-02C1-4F23-B393-F48B16E071D1}\TypeLib\Version = "1.0" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{77A6E7D4-4A83-4A9B-A2A0-EF3B125DC29D}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{965B9DBE-B104-44AC-950A-8A5F97AFF439}\AppID = "{09C554C3-109B-483C-A06B-F14172F1A947}" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F03FD9D0-4F2B-497C-8A71-DD41D70B07D9}\AppID = "{B12E99ED-69BD-437C-86BE-C862B9E5444D}" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\funmoods.funmoodsHlpr\CLSID\ = "{75EBB0AA-4214-4CB4-90EC-E3E07ECD04F7}" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F03FD9D0-4F2B-497C-8A71-DD41D70B07D9}\ProgID FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\escort.escortIEPane\CurVer FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C0585B2F-74D7-4734-88DE-6C150C5D4036}\TypeLib\Version = "1.0" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{09C554C3-109B-483C-A06B-F14172F1A947}\ = "escort" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{75EBB0AA-4214-4CB4-90EC-E3E07ECD04F7}\ = "CescrtHlpr Object" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2CE5C4B9-6DBE-4528-96FA-C9FF38EF1762}\TypeLib FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{54291324-7A3D-4F11-B707-3FB6A2C97BD9}\ = "IXtrnlBsc" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F03FD9D0-4F2B-497C-8A71-DD41D70B07D9}\VersionIndependentProgID\ = "f" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A4C272EC-ED9E-4ACE-A6F2-9558C7F29EF3}\AppID = "{4E1E9D45-8BF9-4139-915C-9F83CC3D5921}" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EF0588D6-1621-4A75-B8BE-F4BC34794136}\TypeLib\Version = "1.0" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{965B9DBE-B104-44AC-950A-8A5F97AFF439} FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C0585B2F-74D7-4734-88DE-6C150C5D4036}\ = "IEHostWnd" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{EF0588D6-1621-4A75-B8BE-F4BC34794136}\ProxyStubClsid32 FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{75A4D144-506D-4BE5-81DB-EC7DA1E7F840}\ = "escrtSrvc Object" funmoodssrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\funmoods.funmoodsHlpr\CurVer\ = "funmoods.funmoodsHlpr.1" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{34C1FDF7-02C1-4F23-B393-F48B16E071D1}\ProxyStubClsid32 FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F03FD9D0-4F2B-497C-8A71-DD41D70B07D9}\InprocServer32 FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\funmoods.funmoodsHlpr\ = "CescrtHlpr Object" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F03FD9D0-4F2B-497C-8A71-DD41D70B07D9}\Programmable FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{965B9DBE-B104-44AC-950A-8A5F97AFF439}\InprocServer32\ThreadingModel = "apartment" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{EF0588D6-1621-4A75-B8BE-F4BC34794136}\TypeLib\Version = "1.0" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{5DA22CBD-0029-4A09-B757-CF0FAFC488ED}\ProxyStubClsid32 FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A4C272EC-ED9E-4ACE-A6F2-9558C7F29EF3}\TypeLib FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F03FD9D0-4F2B-497C-8A71-DD41D70B07D9} FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{54291324-7A3D-4F11-B707-3FB6A2C97BD9}\TypeLib\Version = "1.0" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{23D8EEF7-0E13-4000-B9C4-6603C1E912D1}\TypeLib\ = "{1D085C0A-E4F4-4F66-BDBF-4BE51015BFC3}" FM4ie.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2988 funmoods.exe 2988 funmoods.exe 2988 funmoods.exe 2988 funmoods.exe 2988 funmoods.exe 2988 funmoods.exe 2988 funmoods.exe 2988 funmoods.exe 2988 funmoods.exe 2988 funmoods.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2988 wrote to memory of 772 2988 funmoods.exe 31 PID 2988 wrote to memory of 772 2988 funmoods.exe 31 PID 2988 wrote to memory of 772 2988 funmoods.exe 31 PID 2988 wrote to memory of 772 2988 funmoods.exe 31 PID 2988 wrote to memory of 2080 2988 funmoods.exe 32 PID 2988 wrote to memory of 2080 2988 funmoods.exe 32 PID 2988 wrote to memory of 2080 2988 funmoods.exe 32 PID 2988 wrote to memory of 2080 2988 funmoods.exe 32 PID 772 wrote to memory of 2728 772 FM4ie.exe 33 PID 772 wrote to memory of 2728 772 FM4ie.exe 33 PID 772 wrote to memory of 2728 772 FM4ie.exe 33 PID 772 wrote to memory of 2728 772 FM4ie.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\$LOCALAPPDATA\funmoods.exe"C:\Users\Admin\AppData\Local\Temp\$LOCALAPPDATA\funmoods.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\FNMD\FM\1.5.11.16\FM4ie.exe"C:\Users\Admin\AppData\Local\Temp\FNMD\FM\1.5.11.16\FM4ie.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Program Files (x86)\Funmoods\funmoods\1.5.11.16\funmoodssrv.exe"C:\Program Files (x86)\Funmoods\funmoods\1.5.11.16\funmoodssrv.exe" /RegServer3⤵
- Executes dropped EXE
- Modifies registry class
PID:2728
-
-
-
C:\Users\Admin\AppData\Local\Temp\FNMD\FM\1.5.11.16\FM4ffx.exeC:\Users\Admin\AppData\Local\Temp\FNMD\FM\1.5.11.16\FM4ffx.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
130KB
MD5673e6109fbc2405238429562ae058f37
SHA1293a96724fc0e772706f108895db321b58051524
SHA2564dae85611b9fd18f44c36f330762ca7dae3842604999d6a5edd3d416b4ab0841
SHA5120d1db02c84d2a7502af966886889a63467fdc310c25076cd1629064f9dc5bda63248ea2cb34757f9e93e341cd89833979c8bdfffab2d09c722c3a20cd244f4c0
-
Filesize
731B
MD542d9001a39adfca06093a302a8d6d17c
SHA14c7062d47da0d9bb57bf197bb86715929e47b13e
SHA256efbdf4e16173772ec29cc0f7dfe1816f7f94c3565168c2cc0e673b27b0abea01
SHA5120068e9bbffecfb7bb42990ad70f8b2c1a90bb4eaccbbf60861c0c51699f70a239ebab91e6e06fbcdbd81a7de2bc06b6ad4555346e59063fcc98e9633983f39e3
-
Filesize
626B
MD55cce69a871c69d2bcbdb1ef7a3e65cbb
SHA16855776ad0d124708f1d886c8b53bd86209b749d
SHA2560c2b367ed5c8dda6e33080f290d679a91d2b7bf6d57e88429e06dfea67964ff3
SHA512099b108a70fdcd3f309d838ce606e6f9823328359c1640b4ca69cf5c9767c9d45cb37a916bb711f785d1f27aaa110e7559367b32a0d99ec1f726d016a333f54c
-
Filesize
781B
MD59dd965cb661b9e8b45bf69f7a9ffdfbd
SHA178da35a58e88ea2d9166a79c563ce765831b70d4
SHA2562710f9e948ee77d1b000d8d5afe5094e8be29d9e225eb85400227bd10986ae1f
SHA5122e11ae717010a3e1810b6951322bd5bc8915badc4995c660f98ae70e94993ba9074075f838c8d29c5cbb2a174c8ec4954a64fc6de9b4481ddfe54cf33e4e3854
-
Filesize
537B
MD520665fab1108e356b4cf2a08cbb2f573
SHA1f18b268e5cc1ba8967f8fb8ad4f64e98a4b5de8f
SHA256533106464d243d20cbf437e035d6144207b91eeed7b9a1bf2e83a7a303ed06e0
SHA512de72ea4e909829377177be5caff29671091f10d4b7a0e3dfed2730e39b58a390fb5df0a8010428c2f8ea1b9d58a5ed1876c20dc93917676091ccf45d89b23ec1
-
Filesize
342B
MD5e8131af4368b86d892770bd643fe340a
SHA1df8cd82e2f076f7e4dd15bc7fb2aa2a63d28b70a
SHA25608c3c6de3708c3fd87fc573eec3b99135561861c7b769e55b6a1452f0a6d49d0
SHA5129c0daad4c6e428487e971aaaf69fd87f0be7cfb46dc885c3f4a42f07729ec747758a0df9fd93fecc0ab70e746bb4f9b1c3a255d8bf870e81604278c1388abda4
-
Filesize
679B
MD534fd2baadae38617244277a987368375
SHA1d96e7aec829c7991418e804cb21205111efbd6a5
SHA256c20d8955eb0248b6ed2e7cccc5d52225ebb3c57fd6d9fefe0f6949f751afde69
SHA51261bbae72c167ba66134c679cdbeec7a87aa87f01a655b28946006219a2089e1b35642d9f60eb7c5ec09ed6e370945d95627fb22bd7d339573fd6809fefb63283
-
Filesize
830B
MD5e872f6cdfd1ef90503e61c2f20fbe79b
SHA11cdbd936e950536bb5c0cc1077af01c43b965247
SHA2560b85da263135fd2828a5e62334a62af785349f3905bae76e34f0bd4a42beaccb
SHA512125174686ca64b8824bb102b6db407f136dc3667bfc6ea442092666c55bf6525324c8e09aad7cd2c286c95cb89a92f2d86b8add3bdb4457588d3afa400c154ca
-
Filesize
14KB
MD5a5f8399a743ab7f9c88c645c35b1ebb5
SHA1168f3c158913b0367bf79fa413357fbe97018191
SHA256dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9
SHA512824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977
-
Filesize
406B
MD50d7889a328bf4c6b506dd87507ae693e
SHA121928a20080bb3bdef6457f0ffa1def8f35a14a0
SHA2561164c9ded36dbae9752329f8833729cb6b9ee0177abb8d00d1efeede0baf8ff4
SHA5122342d33faee44e84698e543d85798cd724123d7291e46d7df5f2bbf497353b2d8b7f8dabab515602177d4ff7892c19f1ebae099698e1dd046bb1da90b8b60dce
-
Filesize
592B
MD5e4e3061d4e1b3bc7797282e641147937
SHA1965a66e51bc46deeb498adc0b0e0b412a136e92e
SHA2567cbeafc29fc7a444bcf63a2e9fdcd8106d205c6a7690c236ae2bfa5484b24072
SHA512e0dfe2322bd5ca51b334dd5a3b95b080c19745efb8bfee6c5894158f56163d156705031dac18723ddd9068b11b4feb6b81852a7dd909bfb79a36f8c48324d6c2
-
Filesize
981B
MD598d5b655b4b3b923fe7205690f2f6aca
SHA1c2904ce51f54e4da6508d58a4447c17e1309f951
SHA256e5a2d645269f93aa55716ce75cbc52c0782ee5397c53f3c528ca87d75ab84040
SHA512ba40e498efbc75f1a2778a04a329be43bf11d79f95ec791a879cbb8f98aff1333b686af85ec60a4ec4aca301dfe4ea3e3dfe36fba7533f6abedac9d5994164ec
-
Filesize
1KB
MD562d1c1614fbd18748053262f5c6e708e
SHA12d5b0ab1fd112a2e80f5134b2e42e9ee3259e995
SHA2566b04e5e0f980faf7b1865fb12607a33c584667a8b54fa05d7cbd80204794286e
SHA512195a3cd5c49e07afff54493bc4fbb1f7ab611d9d81ea6fce16d02cfa1025595dce1102907e57d7a7fcea2e891fb56fdac96408a85b86a76a0626964fbfb6bd86
-
Filesize
398B
MD5ce14a55e38aeac9e773e0db57bc5ef09
SHA1189d19063eaabd6d16ae7ba0e0cdf31f0d5d646e
SHA2569c48bc08e27263ef3c6f505df02915cafc791c4e3b5895030e68f6b629ca7296
SHA5127e6ddeed1d364b4c6c617ba5e8022ed26568c927760d5aca1cde5853d0bb6779a95ceab118e02b0ed5dc665749759da5b93a451f64efdd7aa3a007e54ff2997e
-
Filesize
575B
MD5351a86c4f95969fbed23912227c80136
SHA1becf4d17fb972f7f54baaf139001922914f9130d
SHA256e862492f8b4f08d75a30345f746f0c7e7951a7fba14130914be6ef230116c4c5
SHA5126e3ff6f375a11520fc644d6bc0e7e6551203a5e08ea36f7b1db77ff7d208147996198e2bd136a5b08a1947ebcd9b1338373d0524458c126ee2cea9f013c0a52f
-
Filesize
245KB
MD57f8be790b6614f46adeafd59761abbeb
SHA1a1be7d513d40b1a0af1aa1fd73c2c2b6173ac700
SHA256b1fa4dacf9656e31588eebeca1f831c72a33d9affca07ede0d5f5d113ec14aaf
SHA5124d17c74368543092a8e7604208689bc6a5fc5bcc46c60cfb9255622d031a4265adaa13d7c0b5f410ababed802f29cb89c2dd7d7b1adc1af33fbb5f55e4a8a5ca
-
Filesize
398KB
MD5ffba0384096f7a6c2189009b3c54c8db
SHA1e1e883b9345bd74b0c7e158751c60b0ee2139677
SHA25693587b81f4e717b25a6e5fd2fb7158d7fb825f79af1c02ed0a61d5de15b6327b
SHA5127ea59cd57a0b6ecb1258af1d271dcb68236d0b95fca0d5905d177dd8df980771b0a182a459a6a6f01cb4789433d193306324fa178b88b6ec3677aa5c589571dc
-
Filesize
319KB
MD5fe768a6b82ed2a59c58254eae67b8cf9
SHA13dad9bf5011fb73b9be2fe6c601bb6281a3ceaf6
SHA2563ac3c700060a0487060724f3fd22faf70d5f633e69401641964d7ba4d6e6e570
SHA5123d8caadc61ea127bd0e3d01f35274a2ebfa34a0ac12b0932988300d011347f74a09c2bf3c85e58bfbe5200288c6e6f100b4f08916d23e56d7b52a70130aad14b
-
Filesize
1.1MB
MD5ddcada8c66d56df6e4ef2bbedf2bb865
SHA1059a7f8bb8ed2e99d5153d26ecf986e91c24df19
SHA256abcde03656f4c6f51d4d4c788ece555581b8c7b52bfe1c18ef70678cb3a2e872
SHA51263a3ca5d733cef71cc4ff61d6b5b3dd74613d57bac2b5d41efffbbf64ab6031bde66c0cd7058bf50c047e64e4ee0ef87dff3c7864a18c118521f5711ab69cc91
-
Filesize
7KB
MD5ba4063f437abb349aa9120e9c320c467
SHA1b045d785f6041e25d6be031ae2af4d4504e87b12
SHA25673acba7dd477dfd6cf4249911f4e3c781196c7cf6b28425761dcb2d4f90c36c5
SHA51248a813f55834069f8c6b90740de3df01564a136b0fe637f9f85cc1a19d7f32b1f70205ff2462526508fe3c1962d7c1e8e384c40463e328538aeba28e8d0fb92a
-
Filesize
18KB
MD5994669c5737b25c26642c94180e92fa2
SHA1d8a1836914a446b0e06881ce1be8631554adafde
SHA256bf01a1f272e0daf82df3407690b646e0ff6b2c562e36e47cf177eda71ccb6f6c
SHA512d0ab7ca7f890ef9e59015c33e6b400a0a4d1ce0d24599537e09e845f4b953e3ecd44bf3e3cbe584f57c2948743e689ed67d2d40e6caf923bd630886e89c38563
-
Filesize
56KB
MD5cc0bd4f5a79107633084471dbd4af796
SHA109dfcf182b1493161dec8044a5234c35ee24c43a
SHA2563b5388e13dab53d53e08791f492ed7d3094a0cee51e9841af83ce02534e0621c
SHA51267ba90ec04366e07d0922ffb4dbbb4f12f90b6785b87700adaae29327db9ec2a03d750b229f858db0594f439499d6346fbf1ebc17c77162bf8da027515219ee3
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
10KB
MD538977533750fe69979b2c2ac801f96e6
SHA174643c30cda909e649722ed0c7f267903558e92a
SHA256b4a95a455e53372c59f91bc1b5fb9e5c8e4a10a506fa04aaf7be27048b30ae35
SHA512e17069395ad4a17e24f7cd3c532670d40244bd5ae3887c82e3b2e4a68c250cd55e2d8b329d6ff0e2d758955ab7470534e6307779e49fe331c1fd2242ea73fd53
-
Filesize
4KB
MD57579ade7ae1747a31960a228ce02e666
SHA18ec8571a296737e819dcf86353a43fcf8ec63351
SHA256564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5
SHA512a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b
-
Filesize
194KB
MD56845d147b88de1f005d9c6ebb6596574
SHA164523302e2b1e2ee7a31580d2acac852db3c7e45
SHA256c9ccc486c3353bad0d2819a42203c0db7ba98b4826b6a2b8d4deee832e4d3d8e
SHA512cd4caa6669b5f90ead60579a2e5b01a9cd2d17fd2919651cecda6327acb32e2eb3b9953412c085d50dee89779d2f60df658236fb4c3cc54bed4ae66929590606
-
Filesize
5KB
MD5aac69f856c4540edd4ef7ce6c8571639
SHA12860f55ea9774d631219e66604051e90a43258b7
SHA2566dc2644a389feeef9e0ac65e2c8b01fc18ca6e53b253f10efffcb117e0a852dd
SHA512ebacc8117c44d298ae519705510285c576932761b3c7b697eeb91cb7620150ebe551102d1ab83d68f4c78e1496b191a55ad8f78c491f5b4af456c4de6ad72dcd
-
Filesize
5KB
MD569806691d649ef1c8703fd9e29231d44
SHA1e2193fcf5b4863605eec2a5eb17bf84c7ac00166
SHA256ba79ab7f63f02ed5d5d46b82b11d97dac5b7ef7e9b9a4df926b43ceac18483b6
SHA5125e5e0319e701d15134a01cb6472c624e271e99891058aef4dfe779c29c73899771a5b6f8b1cd61b543a3b3defeaecaa080c9cc4e76e84038ca08e12084f128eb