Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
7c158fb372a...18.exe
windows7-x64
7c158fb372a...18.exe
windows10-2004-x64
7$LOCALAPPD...ds.exe
windows7-x64
7$LOCALAPPD...ds.exe
windows10-2004-x64
7$PLUGINSDI...Ex.dll
windows7-x64
3$PLUGINSDI...Ex.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...ad.dll
windows7-x64
3$PLUGINSDI...ad.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...es.dll
windows7-x64
3$PLUGINSDI...es.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/Time.dll
windows7-x64
3$PLUGINSDIR/Time.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...ef.dll
windows7-x64
3$PLUGINSDI...ef.dll
windows10-2004-x64
3$PLUGINSDIR/mt.dll
windows7-x64
3$PLUGINSDIR/mt.dll
windows10-2004-x64
3$PLUGINSDI...os.dll
windows7-x64
3$PLUGINSDI...os.dll
windows10-2004-x64
3FM4ffx.exe
windows7-x64
7FM4ffx.exe
windows10-2004-x64
7$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2024, 18:45
Behavioral task
behavioral1
Sample
c158fb372ad6b024a5b7cc3d5205c034_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c158fb372ad6b024a5b7cc3d5205c034_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$LOCALAPPDATA/funmoods.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$LOCALAPPDATA/funmoods.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/ExtractDLLEx.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/ExtractDLLEx.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/IEFunctions.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/IEFunctions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/InetLoad.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/InetLoad.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/Processes.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/Processes.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/Time.dll
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/Time.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240705-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/chrmPref.dll
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/chrmPref.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/mt.dll
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/mt.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/nsisos.dll
Resource
win7-20240705-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/nsisos.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
FM4ffx.exe
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
FM4ffx.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240729-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
General
-
Target
$LOCALAPPDATA/funmoods.exe
-
Size
1.6MB
-
MD5
badf0b8e9bc8d7352fb084951255ee4f
-
SHA1
e584634b5565fd81d7258fca86c632c9d3e1cd14
-
SHA256
73db5f6b89963d6692e3c43c8f3e5265ec4512ce87fe652e9ec3a4a0bb036db8
-
SHA512
3b704e3b0d440f1e580cc277c3c68223139f35156b00250ebf9a231f03d5f74bd19bbf948061e7b8be13b9c08aca9f30a0929cfce5a9d5cc3558cd187a05d53e
-
SSDEEP
24576:VtxBMupYpmZICsiWuu0uFYBimEuDYYmTj67rRXFO6BbwZTdNFtr6Ps7QOWxQ6NVN:p6HmZICsfujIvGmTW7rRQakZpt+xQON
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation funmoods.exe -
Executes dropped EXE 3 IoCs
pid Process 2968 FM4ie.exe 3124 FM4ffx.exe 3228 funmoodssrv.exe -
Loads dropped DLL 64 IoCs
pid Process 4944 funmoods.exe 4944 funmoods.exe 4944 funmoods.exe 4944 funmoods.exe 4944 funmoods.exe 4944 funmoods.exe 4944 funmoods.exe 4944 funmoods.exe 4944 funmoods.exe 4944 funmoods.exe 4944 funmoods.exe 4944 funmoods.exe 4944 funmoods.exe 4944 funmoods.exe 4944 funmoods.exe 4944 funmoods.exe 4944 funmoods.exe 4944 funmoods.exe 4944 funmoods.exe 4944 funmoods.exe 4944 funmoods.exe 4944 funmoods.exe 4944 funmoods.exe 4944 funmoods.exe 4944 funmoods.exe 4944 funmoods.exe 4944 funmoods.exe 4944 funmoods.exe 4944 funmoods.exe 4944 funmoods.exe 4944 funmoods.exe 4944 funmoods.exe 4944 funmoods.exe 3124 FM4ffx.exe 2968 FM4ie.exe 2968 FM4ie.exe 2968 FM4ie.exe 3124 FM4ffx.exe 3124 FM4ffx.exe 3124 FM4ffx.exe 3124 FM4ffx.exe 3124 FM4ffx.exe 3124 FM4ffx.exe 3124 FM4ffx.exe 3124 FM4ffx.exe 3124 FM4ffx.exe 3124 FM4ffx.exe 3124 FM4ffx.exe 3124 FM4ffx.exe 3124 FM4ffx.exe 3124 FM4ffx.exe 3124 FM4ffx.exe 2968 FM4ie.exe 2968 FM4ie.exe 3124 FM4ffx.exe 3124 FM4ffx.exe 3124 FM4ffx.exe 3124 FM4ffx.exe 3124 FM4ffx.exe 3124 FM4ffx.exe 3124 FM4ffx.exe 3124 FM4ffx.exe 3124 FM4ffx.exe 3124 FM4ffx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 4 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{75EBB0AA-4214-4CB4-90EC-E3E07ECD04F7}\NoExplorer = "1" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{75EBB0AA-4214-4CB4-90EC-E3E07ECD04F7} FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{75EBB0AA-4214-4CB4-90EC-E3E07ECD04F7}\ = "Funmoods Helper Object" FM4ie.exe -
Drops file in Program Files directory 7 IoCs
description ioc Process File created C:\Program Files (x86)\Funmoods\funmoods\1.5.11.16\funmoodsOEM.crx FM4ie.exe File created C:\Program Files (x86)\Funmoods\funmoods\1.5.11.16\uninstall.exe FM4ie.exe File created C:\Program Files (x86)\Funmoods\funmoods\1.5.11.16\bh\funmoods.dll FM4ie.exe File created C:\Program Files (x86)\Funmoods\funmoods\1.5.11.16\funmoodsApp.dll FM4ie.exe File created C:\Program Files (x86)\Funmoods\funmoods\1.5.11.16\funmoodsEng.dll FM4ie.exe File created C:\Program Files (x86)\Funmoods\funmoods\1.5.11.16\funmoodsTlbr.dll FM4ie.exe File created C:\Program Files (x86)\Funmoods\funmoods\1.5.11.16\funmoodssrv.exe FM4ie.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FM4ie.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FM4ffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language funmoodssrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language funmoods.exe -
NSIS installer 4 IoCs
resource yara_rule behavioral4/files/0x00070000000234a3-152.dat nsis_installer_1 behavioral4/files/0x00070000000234a3-152.dat nsis_installer_2 behavioral4/files/0x00070000000234a2-160.dat nsis_installer_1 behavioral4/files/0x00070000000234a2-160.dat nsis_installer_2 -
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Toolbar\ FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Toolbar\{A4C272EC-ED9E-4ACE-A6F2-9558C7F29EF3} = "Funmoods Toolbar" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{C87FC351-A80D-43E9-9A86-CF1E29DC443A} FM4ie.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{C87FC351-A80D-43E9-9A86-CF1E29DC443A}\Policy = "3" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{C87FC351-A80D-43E9-9A86-CF1E29DC443A}\AppName = "funmoodssrv.exe" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{C87FC351-A80D-43E9-9A86-CF1E29DC443A}\AppPath = "C:\\Program Files (x86)\\Funmoods\\funmoods\\1.5.11.16" FM4ie.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2CE5C4B9-6DBE-4528-96FA-C9FF38EF1762}\TypeLib\Version = "1.0" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EF0588D6-1621-4A75-B8BE-F4BC34794136}\ProxyStubClsid32 FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{23D8EEF7-0E13-4000-B9C4-6603C1E912D1}\ProxyStubClsid32 FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{59C63F11-D4E5-46E7-9B8A-EE158DCA83A8}\TypeLib\Version = "1.0" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{23C70BCA-6E23-4A65-AD2E-1389062074F1}\ProxyStubClsid32 FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{EA28B360-05E0-4F93-8150-02891F1D8D3C}\Instl\Data\tlbrSrchUrl = "http://start.funmoods.com/results.php?f=3&a=orgnl&q=" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4E1E9D45-8BF9-4139-915C-9F83CC3D5921}\1.0 FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F03FD9D0-4F2B-497C-8A71-DD41D70B07D9}\InprocServer32\ThreadingModel = "apartment" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A4C272EC-ED9E-4ACE-A6F2-9558C7F29EF3}\TypeLib\ = "{4E1E9D45-8BF9-4139-915C-9F83CC3D5921}" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2CE5C4B9-6DBE-4528-96FA-C9FF38EF1762} FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{75A4D144-506D-4BE5-81DB-EC7DA1E7F840}\Programmable funmoodssrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{75A4D144-506D-4BE5-81DB-EC7DA1E7F840}\AppID = "{960DF771-CFCB-4E53-A5B5-6EF2BBE6E706}" funmoodssrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\escort.escortIEPane FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\funmoods.dskBnd.1\ = "CDskBnd Object" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\escort.DLL\AppID = "{09C554C3-109B-483C-A06B-F14172F1A947}" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{75EBB0AA-4214-4CB4-90EC-E3E07ECD04F7}\InprocServer32 FM4ie.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{EA28B360-05E0-4F93-8150-02891F1D8D3C}\Instl\Data\instlDay = "19960" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{77A6E7D4-4A83-4A9B-A2A0-EF3B125DC29D}\ProxyStubClsid32 FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D8242E89-2F81-484A-AE5B-BA8CAD5B7347}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1D085C0A-E4F4-4F66-BDBF-4BE51015BFC3} FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{34C1FDF7-02C1-4F23-B393-F48B16E071D1}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D8242E89-2F81-484A-AE5B-BA8CAD5B7347}\TypeLib FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4E1E9D45-8BF9-4139-915C-9F83CC3D5921}\1.0\0\win32\ = "C:\\Program Files (x86)\\Funmoods\\funmoods\\1.5.11.16\\funmoodsTlbr.dll" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{965B9DBE-B104-44AC-950A-8A5F97AFF439}\Programmable FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{54291324-7A3D-4F11-B707-3FB6A2C97BD9}\TypeLib\ = "{1D085C0A-E4F4-4F66-BDBF-4BE51015BFC3}" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0D80F1C5-D17B-4177-AC68-955F3EF9F191} FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\escorTlbr.DLL\AppID = "{4E1E9D45-8BF9-4139-915C-9F83CC3D5921}" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{5DA22CBD-0029-4A09-B757-CF0FAFC488ED}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{EA28B360-05E0-4F93-8150-02891F1D8D3C}\Instl\Data\instlRef FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\funmoodsApp.appCore.1\CLSID\ = "{A9DB719C-7156-415E-B49D-BAD039DE4F13}" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D7EE8177-D51E-4F89-92B6-83EA2EC40800}\1.0\FLAGS FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1D085C0A-E4F4-4F66-BDBF-4BE51015BFC3}\1.0\0\win32\ = "C:\\Program Files (x86)\\Funmoods\\funmoods\\1.5.11.16\\funmoodsEng.dll\\2" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A9DB719C-7156-415E-B49D-BAD039DE4F13}\InprocServer32\ = "C:\\Program Files (x86)\\Funmoods\\funmoods\\1.5.11.16\\funmoodsApp.dll" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1D085C0A-E4F4-4F66-BDBF-4BE51015BFC3}\1.0\FLAGS FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{59C63F11-D4E5-46E7-9B8A-EE158DCA83A8}\ProxyStubClsid32 FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C0585B2F-74D7-4734-88DE-6C150C5D4036}\ = "IEHostWnd" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{77A6E7D4-4A83-4A9B-A2A0-EF3B125DC29D} FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\funmoods.dskBnd.1\CLSID FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{960DF771-CFCB-4E53-A5B5-6EF2BBE6E706}\1.0 funmoodssrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{960DF771-CFCB-4E53-A5B5-6EF2BBE6E706}\1.0\HELPDIR\ = "C:\\Program Files (x86)\\Funmoods\\funmoods\\1.5.11.16" funmoodssrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{965B9DBE-B104-44AC-950A-8A5F97AFF439} FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{75EBB0AA-4214-4CB4-90EC-E3E07ECD04F7}\Programmable FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2CE5C4B9-6DBE-4528-96FA-C9FF38EF1762} FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{295CACB4-51F5-46FD-914E-C72BAAE1B672}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{4E1E9D45-8BF9-4139-915C-9F83CC3D5921} FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A9DB719C-7156-415E-B49D-BAD039DE4F13}\VersionIndependentProgID\ = "funmoodsApp.appCore" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{75A4D144-506D-4BE5-81DB-EC7DA1E7F840}\ProgID\ = "esrv.funmoodsESrvc.1" funmoodssrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A9DB719C-7156-415E-B49D-BAD039DE4F13}\ProgID FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C0585B2F-74D7-4734-88DE-6C150C5D4036}\ProxyStubClsid32 FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C0585B2F-74D7-4734-88DE-6C150C5D4036}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D8242E89-2F81-484A-AE5B-BA8CAD5B7347}\ = "IesrvXtrnl" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{23C70BCA-6E23-4A65-AD2E-1389062074F1} FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\f\ = "escrtAx Object" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{59C63F11-D4E5-46E7-9B8A-EE158DCA83A8}\ = "Ixtrnlmain" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\esrv.funmoodsESrvc\CLSID funmoodssrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\funmoods.funmoodsHlpr FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\funmoodsApp.appCore\CurVer FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{23C70BCA-6E23-4A65-AD2E-1389062074F1}\TypeLib\ = "{1D085C0A-E4F4-4F66-BDBF-4BE51015BFC3}" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{23C70BCA-6E23-4A65-AD2E-1389062074F1}\TypeLib\Version = "1.0" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F03FD9D0-4F2B-497C-8A71-DD41D70B07D9}\InprocServer32 FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\funmoods.dskBnd FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{960DF771-CFCB-4E53-A5B5-6EF2BBE6E706}\1.0\FLAGS funmoodssrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A9DB719C-7156-415E-B49D-BAD039DE4F13}\VersionIndependentProgID FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D7EE8177-D51E-4F89-92B6-83EA2EC40800}\1.0 FM4ie.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4944 funmoods.exe 4944 funmoods.exe 4944 funmoods.exe 4944 funmoods.exe 4944 funmoods.exe 4944 funmoods.exe 4944 funmoods.exe 4944 funmoods.exe 4944 funmoods.exe 4944 funmoods.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4944 wrote to memory of 2968 4944 funmoods.exe 87 PID 4944 wrote to memory of 2968 4944 funmoods.exe 87 PID 4944 wrote to memory of 2968 4944 funmoods.exe 87 PID 4944 wrote to memory of 3124 4944 funmoods.exe 88 PID 4944 wrote to memory of 3124 4944 funmoods.exe 88 PID 4944 wrote to memory of 3124 4944 funmoods.exe 88 PID 2968 wrote to memory of 3228 2968 FM4ie.exe 90 PID 2968 wrote to memory of 3228 2968 FM4ie.exe 90 PID 2968 wrote to memory of 3228 2968 FM4ie.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\$LOCALAPPDATA\funmoods.exe"C:\Users\Admin\AppData\Local\Temp\$LOCALAPPDATA\funmoods.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\FNMD\FM\1.5.11.16\FM4ie.exe"C:\Users\Admin\AppData\Local\Temp\FNMD\FM\1.5.11.16\FM4ie.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Program Files (x86)\Funmoods\funmoods\1.5.11.16\funmoodssrv.exe"C:\Program Files (x86)\Funmoods\funmoods\1.5.11.16\funmoodssrv.exe" /RegServer3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3228
-
-
-
C:\Users\Admin\AppData\Local\Temp\FNMD\FM\1.5.11.16\FM4ffx.exeC:\Users\Admin\AppData\Local\Temp\FNMD\FM\1.5.11.16\FM4ffx.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3124
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
329KB
MD512be59f427297e54fef41f9bb32d4233
SHA10088967a4ed52f491976136c95d43e0e1b06cc31
SHA256e4b3df5ead761fe83da367d5e2ae1d416d0f89a572480deecc20c4b4295f17eb
SHA5120f8f3826e8a9205771863c042a8386315784927e260ca8617c44f83b5f3f3a501500d6d39ae732da11c0621dbd6c8c6d75ac7af660a46bb70acac9c12991d2db
-
Filesize
535KB
MD5d5e0f923b3ee640efd6a58ec0c70cbdc
SHA174f62a9acdb9f9dd0580d69450c062ba8870deea
SHA2563d1b55bbb46e5788ca3e8ce68e515f52bdf63c0f53ceaad7236964eedf97f281
SHA512471eca5adb43ba82cfed4fdb395471414301e3eeb602ba4fa6cccb9721869847a06bd8096d7eb15cbdcab908d6dfc47d48d293e1f77b881271f6d7dd4f54f3f0
-
Filesize
245KB
MD57f8be790b6614f46adeafd59761abbeb
SHA1a1be7d513d40b1a0af1aa1fd73c2c2b6173ac700
SHA256b1fa4dacf9656e31588eebeca1f831c72a33d9affca07ede0d5f5d113ec14aaf
SHA5124d17c74368543092a8e7604208689bc6a5fc5bcc46c60cfb9255622d031a4265adaa13d7c0b5f410ababed802f29cb89c2dd7d7b1adc1af33fbb5f55e4a8a5ca
-
Filesize
319KB
MD5fe768a6b82ed2a59c58254eae67b8cf9
SHA13dad9bf5011fb73b9be2fe6c601bb6281a3ceaf6
SHA2563ac3c700060a0487060724f3fd22faf70d5f633e69401641964d7ba4d6e6e570
SHA5123d8caadc61ea127bd0e3d01f35274a2ebfa34a0ac12b0932988300d011347f74a09c2bf3c85e58bfbe5200288c6e6f100b4f08916d23e56d7b52a70130aad14b
-
Filesize
1.1MB
MD5ddcada8c66d56df6e4ef2bbedf2bb865
SHA1059a7f8bb8ed2e99d5153d26ecf986e91c24df19
SHA256abcde03656f4c6f51d4d4c788ece555581b8c7b52bfe1c18ef70678cb3a2e872
SHA51263a3ca5d733cef71cc4ff61d6b5b3dd74613d57bac2b5d41efffbbf64ab6031bde66c0cd7058bf50c047e64e4ee0ef87dff3c7864a18c118521f5711ab69cc91
-
Filesize
1KB
MD584c6dd6c0e9adecd890509c81888bd66
SHA142bf9268c5787bef608e0c1f1594b2d9843f59b0
SHA2561d565e45f7ad4b4a724c96f6430e859fdf7a4d091dd2dc990b2f8a6e99eb535d
SHA512c58975387bda030d765cd16b237863d46185bf9b9e4a201964488b5e04438b2130b9882c1d87cd56616e7df6a24f3ffd6cca441518b1437eac65313a815d30a0
-
Filesize
482B
MD520d9a2b2846d03dcef653a505ad740fa
SHA1c56867d3139ea2a4cfbc64fb9ad09d3462538141
SHA256e851881cd65f8fdf8414c6f4c1056b328af3755c73a3107dec47b1ea4099b619
SHA512a567cc32a4af4c4be9a47fea92a23fc3a18ba70fb905ce96132e3b8c089e84ad39a3fc6630da64a1ecb0ffa8c8eaff16e26135e7561f262e7b12fc3d9e06f7ec
-
Filesize
929B
MD58052b61d762e1c10b179f90e8a0a3532
SHA1cc45d53ca2b364318125a2577da3f27ddeae31b3
SHA2564b5c0c1dcf8cf7d9b6ea4658d47dd3babc30fd4baf7ec528d36eaad743054fd3
SHA512afd4c6092bd0f3e443b5e5d0712033b9e3157841a1a010ba7c2948176ba75005525b0fb754d6dad2752920e466b28be51d85d4c48da6a41495d90fcd5c8bd21e
-
Filesize
1KB
MD5d79b4c77a201baf19832bae182ea209e
SHA14c3b6eaae7130769a9e32eadf36f569d2fd2691c
SHA256e23a91716186107a22a7c258d3d10fccdc2a2a08a7fb4c72699b82d5e60dacbc
SHA512b3ec1357cc74eb55077a9d15590181210a8d884c40285ee25f7be3cd447833eb67c4b27b4b031ee769c267252bed8101603256e5d0df1995531271b14dabd460
-
Filesize
463B
MD5db9d487e93658482e7c15abff1f300ab
SHA1fdb9328c6dbc4bac12af006e3075cd2de4a53bb7
SHA25617df0edc9deee9725d8d83a76198dd1f1850d4fd293ee896c20ceaa03c022952
SHA5122d75628b9c348ccaea83afb601fda46515f45dbe1fcb5531c95af98cdcbbf712a1012f278924198af4c0a7faba220b3862f20dc77ac05cfaaf32877cce102e2f
-
Filesize
232B
MD55a18cb3db785b35c481d2fc87830db40
SHA11f6ef264e7d868d0507285fb22cffd353fa258da
SHA25655192bfc72fc46475b30d55bfa1dd9387fa6e775dba229660a8b2177d6b4df25
SHA51201921e64a535670a181d3e0a55bf0fac4923e3013f097d0664c696f6a2d37439d0087db09a76c4d21fbe6e4a88ba9d96a9eb5f44898e6b68784e2f0218eb7f6c
-
Filesize
626B
MD56703860411551ec947cf0fab19bdf207
SHA1099be56c8c220d8aa678aa5cffb99aedc5bc4a81
SHA2563919818322f3c7740de8a878a264656b76bba196a793d0010f490689e553e5e3
SHA51276ea2a98a62163ec928bfd6cc74d01861e3d8f974d0d0ce8fc3c351443e8955b53edfd70f6f3f9d0b93515cb0d139c668e8231c1b5c56713dbba618ad8a41069
-
Filesize
981B
MD591d369b52765881a30e8086b4cf76690
SHA14d193c69d418ae9fe9bd1e79eaf44547ea1ef117
SHA25684af970b9f11ea241286ae1470c0223ccbebe33e448688b87a2d085a3cdefc8f
SHA512f105131d1493dafe55d17b432f3c6d7acd0a6c57b90dce25ea2187128a7ca0106da98702d0bf842494b98deaa307387d89d59590663610dfd86d93fc1b53ed4a
-
Filesize
520B
MD568d26adb7f175b6bfddf8d384f20fa83
SHA13375b0c78639bbcff55471fbbf3a54f693c6a407
SHA256c5e92e7920f01a6463ab99648654899b0879e6e0e41b369f694e2aa793f4fc27
SHA5124bb33d9fbe30828ce8c4dba34e6013e6046231f6518ac8c7595f1ed634dd32db07ebe92cf9937a377c3fefdf9592b4f3229e088f58a1f882d5dbc5fd47058736
-
Filesize
7KB
MD5ba4063f437abb349aa9120e9c320c467
SHA1b045d785f6041e25d6be031ae2af4d4504e87b12
SHA25673acba7dd477dfd6cf4249911f4e3c781196c7cf6b28425761dcb2d4f90c36c5
SHA51248a813f55834069f8c6b90740de3df01564a136b0fe637f9f85cc1a19d7f32b1f70205ff2462526508fe3c1962d7c1e8e384c40463e328538aeba28e8d0fb92a
-
Filesize
18KB
MD5994669c5737b25c26642c94180e92fa2
SHA1d8a1836914a446b0e06881ce1be8631554adafde
SHA256bf01a1f272e0daf82df3407690b646e0ff6b2c562e36e47cf177eda71ccb6f6c
SHA512d0ab7ca7f890ef9e59015c33e6b400a0a4d1ce0d24599537e09e845f4b953e3ecd44bf3e3cbe584f57c2948743e689ed67d2d40e6caf923bd630886e89c38563
-
Filesize
14KB
MD5a5f8399a743ab7f9c88c645c35b1ebb5
SHA1168f3c158913b0367bf79fa413357fbe97018191
SHA256dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9
SHA512824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977
-
Filesize
56KB
MD5cc0bd4f5a79107633084471dbd4af796
SHA109dfcf182b1493161dec8044a5234c35ee24c43a
SHA2563b5388e13dab53d53e08791f492ed7d3094a0cee51e9841af83ce02534e0621c
SHA51267ba90ec04366e07d0922ffb4dbbb4f12f90b6785b87700adaae29327db9ec2a03d750b229f858db0594f439499d6346fbf1ebc17c77162bf8da027515219ee3
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
10KB
MD538977533750fe69979b2c2ac801f96e6
SHA174643c30cda909e649722ed0c7f267903558e92a
SHA256b4a95a455e53372c59f91bc1b5fb9e5c8e4a10a506fa04aaf7be27048b30ae35
SHA512e17069395ad4a17e24f7cd3c532670d40244bd5ae3887c82e3b2e4a68c250cd55e2d8b329d6ff0e2d758955ab7470534e6307779e49fe331c1fd2242ea73fd53
-
Filesize
4KB
MD57579ade7ae1747a31960a228ce02e666
SHA18ec8571a296737e819dcf86353a43fcf8ec63351
SHA256564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5
SHA512a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b
-
Filesize
194KB
MD56845d147b88de1f005d9c6ebb6596574
SHA164523302e2b1e2ee7a31580d2acac852db3c7e45
SHA256c9ccc486c3353bad0d2819a42203c0db7ba98b4826b6a2b8d4deee832e4d3d8e
SHA512cd4caa6669b5f90ead60579a2e5b01a9cd2d17fd2919651cecda6327acb32e2eb3b9953412c085d50dee89779d2f60df658236fb4c3cc54bed4ae66929590606
-
Filesize
5KB
MD5aac69f856c4540edd4ef7ce6c8571639
SHA12860f55ea9774d631219e66604051e90a43258b7
SHA2566dc2644a389feeef9e0ac65e2c8b01fc18ca6e53b253f10efffcb117e0a852dd
SHA512ebacc8117c44d298ae519705510285c576932761b3c7b697eeb91cb7620150ebe551102d1ab83d68f4c78e1496b191a55ad8f78c491f5b4af456c4de6ad72dcd
-
Filesize
5KB
MD569806691d649ef1c8703fd9e29231d44
SHA1e2193fcf5b4863605eec2a5eb17bf84c7ac00166
SHA256ba79ab7f63f02ed5d5d46b82b11d97dac5b7ef7e9b9a4df926b43ceac18483b6
SHA5125e5e0319e701d15134a01cb6472c624e271e99891058aef4dfe779c29c73899771a5b6f8b1cd61b543a3b3defeaecaa080c9cc4e76e84038ca08e12084f128eb
-
Filesize
825B
MD590633f0fefe30e01a930bb79e2c7e301
SHA1ad242f77d5e767d44e34db9aa9a8e1b871ae2800
SHA2567ba4d6dde38fd9d573e7713669f506abfb2f825c4f93785e0515b26d204c61e6
SHA5123ba778db4e9e22a47c2813393664303aab74f410343d836699ef3f375dcddcbf177c2a51ceffe423154486538f4177892edc865a08654fa548f83b7b5f7351f3
-
Filesize
876B
MD5a0eac76bdbe18aae2e18465c22633e92
SHA1b79ccb2e2b5860620fcc128560a660cef91071c1
SHA25697706e03713189526b78def550c7c8588d337ca34f08779153339608a1e2e0c9
SHA51218b5889fb46b8fa746df7c99e9b1434ea882bf72f9b7d4cd1723965216f2b753f2297906150028a79f840605afb2d13308e993ad0a37dfc4ff0f00f9d74996de
-
Filesize
398B
MD5a3dfb5127fafa1ecd26197021a226f34
SHA163e71429f85dc811fa0af84a7cafbc66af43fa97
SHA25667c0bbd99e55ef932bd57635b4d6aa9297dfd7a120267d680a635e10d140d69b
SHA51279a3a5b1da3f9b21f89fd4818d96d3776650e99a85c15879d27c7412d148f81796375670996014ba255d709225abfe9e313c2e8a9c386a79b35ffbda293d0ef1
-
Filesize
731B
MD5de299dfbb635a8ea66cc838cbb3868c4
SHA1a69c080ecc596bf1c3dcc709cecd14d7c409613c
SHA2567b4b26986df6602e7f23278649e6878684b2b9e970db8116420cb2e42f1a4b7b
SHA51273175284fb2e453d8646bada907a0aa393b9f64ce5e8438ad3732b74e3fcda43f7297ecd1a62170216d0850c0fb8c72852beab1c196d478b6fe529c9d05218a7
-
Filesize
830B
MD56b1ff2ee5023e8b34524697925205318
SHA1145ff95f6ce580fe7241d4304aa1ac02fe9068ab
SHA256fd9bf1805b4a6ae8bef0b7e432d943865b780dfdf0ffc83802317901bfd159d4
SHA512ded084b3120b8abe79514fac82445e6ec78d3a236fe82a93fbcf794b0132e20fbe05cf4619db4d11d47956272bae7eb0540fcdaa36222b4fa985e40d0bea2623