Overview
overview
3Static
static
3KoxpTT/ActiveX.dll
windows7-x64
3KoxpTT/ActiveX.dll
windows10-2004-x64
3KoxpTT/COMDLG32.dll
windows7-x64
3KoxpTT/COMDLG32.dll
windows10-2004-x64
3KoxpTT/DINPUT8.dll
windows7-x64
3KoxpTT/DINPUT8.dll
windows10-2004-x64
3KoxpTT/MSINET.dll
windows7-x64
3KoxpTT/MSINET.dll
windows10-2004-x64
3KoxpTT/TTBlock.dll
windows7-x64
3KoxpTT/TTBlock.dll
windows10-2004-x64
3Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 04:17
Static task
static1
Behavioral task
behavioral1
Sample
KoxpTT/ActiveX.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
KoxpTT/ActiveX.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
KoxpTT/COMDLG32.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
KoxpTT/COMDLG32.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
KoxpTT/DINPUT8.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
KoxpTT/DINPUT8.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
KoxpTT/MSINET.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
KoxpTT/MSINET.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
KoxpTT/TTBlock.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
KoxpTT/TTBlock.dll
Resource
win10v2004-20241007-en
General
-
Target
KoxpTT/ActiveX.dll
-
Size
1.7MB
-
MD5
55494584d369f207e6e1b071e7168ec0
-
SHA1
e5abfc31755947add9d5d88381a95fae3d99c114
-
SHA256
025efdc63c61b3567dc8eb244517c715dda12cf2aa4bc595e427e8d7b751fed7
-
SHA512
caa546c6812db875f373f60fd35c80d0aad3b67289719b0b116baeea91a519d82f7c44b66131d145e50f01ef3d19250390c53979533411c7a0fd539ee5dedea8
-
SSDEEP
24576:eVmjg6w58m2tEEcRDTyycxqv0jx3lcy/nP3:RTMTAIMjb1H3
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{935BF68C-858B-487B-A941-D8EA1D7F8CCF}\MiscStatus regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6579F38E-EC03-4B30-B3A4-3E31B234025C}\Version\ = "13.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{ABBB9842-AE6D-46A8-BC77-CEE7D5CE9ED7}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5F87BE9B-8784-4B18-976D-F889C1F8B1E9}\ = "_DRadioButtonEvents" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7F87BE9B-8784-4B18-976D-F889C1F8B1E9}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD589E87-C2C7-40D5-AF71-0B2BA360DEC6}\ToolboxBitmap32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0EC716DE-9CE6-4D40-B6C5-3B9425FBB55A}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D250084B-09F0-4399-A41F-51C9D58E864E}\TypeLib\Version = "d.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{FC83F08A-B438-49E5-A304-623F885FA69B}\TypeLib\ = "{A8E5842E-102B-4289-9D57-3B3F5B5E15D3}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{882B6ED7-2CC9-4BB6-A4CB-23E4E1917120}\MiscStatus\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{453DCB5B-FD7D-4678-A763-CEF0AF6721D3}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{07E01494-B3DF-47B3-98C2-37742992615B}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\KoxpTT\\ActiveX.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1BE52B7A-58AE-458F-A726-9E8AB1469C62}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\KoxpTT\\ActiveX.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{642C8188-4866-4C45-AF97-E4F95E2BA55A}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{262438B0-034B-4EFA-A7D8-94E409B7F8F1}\TypeLib\ = "{A8E5842E-102B-4289-9D57-3B3F5B5E15D3}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{4E06DED7-B768-43F0-B9AF-C31CD2103724}\TypeLib\ = "{A8E5842E-102B-4289-9D57-3B3F5B5E15D3}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2448FD7C-8961-40D1-A13D-97E355206E86}\MiscStatus regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3970B9F1-5F57-4533-8077-A3F87A1E98A9}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{63C40CBE-DE43-4B56-BCEB-E14B825CF245}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Codejock.TreeView.13.0.0\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD589E87-C2C7-40D5-AF71-0B2BA360DEC6}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{23213888-49A2-4BB8-BD90-5596014BDE1D}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\KoxpTT\\ActiveX.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F34DDD83-F4CD-42E1-A634-1BC1C1EDBBE6}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AD6AADB8-451B-4D9D-83E0-CDD3B589178D} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{569C30D0-E2D7-4AE7-ACCF-EC2209058C15}\TypeLib\ = "{A8E5842E-102B-4289-9D57-3B3F5B5E15D3}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{EE7BD35C-459D-4285-9E64-36C01E3659A4}\TypeLib\Version = "d.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{39175F9D-202C-4866-8161-87E7D292DE12}\Control\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5BB60DA3-2838-4538-A28E-B114BD160290}\Version regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1CDB9842-AE6D-46A8-BC77-CEE7D5CE9ED7}\TypeLib\Version = "d.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{FFA1CBE6-4B44-4BEE-A7A8-8F5954390D95}\ = "_DComboBoxEvents" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{EC3A369D-2593-4EC2-8C0E-6662544DCC33}\ = "TreeViewNode" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DCDB9842-AE6D-46A8-BC77-CEE7D5CE9ED7}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8EF14566-A03D-4B53-8C43-AA02C1AAFEA9}\TypeLib\ = "{A8E5842E-102B-4289-9D57-3B3F5B5E15D3}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Codejock.FormExtender.13.0.0\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{51837751-7F27-46D2-91A1-0442FD6DA0DD}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{39101C08-7787-44CF-AD0F-59D3D2737E5E} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B1DF796D-D274-417F-9252-4A5836D0A0C9} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F0AE5A41-0B8A-4298-8396-81F0F31326CB}\TypeLib\Version = "d.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CA3ED263-52CC-4177-A208-50E9F024F5E7}\Version regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{51837751-7F27-46D2-91A1-0442FD6DA0DD}\ = "_DRadioButton" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9D0D8FA7-C2DC-4C83-8840-879B3C33E6BD}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E5012C11-D6F7-4A60-BC80-6B4D58112A97}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8EF14566-A03D-4B53-8C43-AA02C1AAFEA9}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1BE52B7A-58AE-458F-A726-9E8AB1469C62}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Codejock.CommonDialog.13.0.0\ = "Xtreme CommonDialog Control" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3970B9F1-5F57-4533-8077-A3F87A1E98A9}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\KoxpTT\\ActiveX.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{63C40CBE-DE43-4B56-BCEB-E14B825CF245}\TypeLib\Version = "d.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EA6BB978-31B8-4F06-99A6-17A150A6FBE2}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F34DDD83-F4CD-42E1-A634-1BC1C1EDBBE6}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{ADAA6390-CBE7-4755-A583-F8AE70F21E8E}\MiscStatus\1\ = "132241" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CF7AF524-85DA-4F7D-9840-08724B814974}\TypeLib\ = "{A8E5842E-102B-4289-9D57-3B3F5B5E15D3}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{5EB30058-7F70-434B-9679-BEAB0B8EC24A}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{313512C9-D1EF-4F24-9B91-254D3190E959}\ = "Xtreme Label Control" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{882B6ED7-2CC9-4BB6-A4CB-23E4E1917120}\Control\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{AD6AADB8-451B-4D9D-83E0-CDD3B589178D}\ = "_DTabControl" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{569C30D0-E2D7-4AE7-ACCF-EC2209058C15}\ = "IPopupControlItem" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6DD8FFC2-771D-4652-8C75-7BE414CEA1E3}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7F87BE9B-8784-4B18-976D-F889C1F8B1E9}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{55537751-7F27-46D2-91A1-0442FD6DA0DD}\TypeLib\ = "{A8E5842E-102B-4289-9D57-3B3F5B5E15D3}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8C9C7DF1-F308-4E23-9367-28A565463100}\Implemented Categories\{7DD95801-9882-11CF-9FA9-00AA006C42C4} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{453DCB5B-FD7D-4678-A763-CEF0AF6721D3}\ToolboxBitmap32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{ABBB9842-AE6D-46A8-BC77-CEE7D5CE9ED7}\TypeLib\Version = "d.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7F87BE9B-8784-4B18-976D-F889C1F8B1E9} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A7CC1CC3-EF36-4585-941C-9FCC90A153B1} regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1312 wrote to memory of 2424 1312 regsvr32.exe 30 PID 1312 wrote to memory of 2424 1312 regsvr32.exe 30 PID 1312 wrote to memory of 2424 1312 regsvr32.exe 30 PID 1312 wrote to memory of 2424 1312 regsvr32.exe 30 PID 1312 wrote to memory of 2424 1312 regsvr32.exe 30 PID 1312 wrote to memory of 2424 1312 regsvr32.exe 30 PID 1312 wrote to memory of 2424 1312 regsvr32.exe 30
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\KoxpTT\ActiveX.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\KoxpTT\ActiveX.dll2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2424
-