Overview
overview
10Static
static
10HDDRegener...MM.dll
windows7-x64
3HDDRegener...MM.dll
windows10-2004-x64
3HDDRegener...MT.dll
windows7-x64
3HDDRegener...MT.dll
windows10-2004-x64
3HDDRegener...or.exe
windows7-x64
3HDDRegener...or.exe
windows10-2004-x64
3HDDRegener...se.exe
windows7-x64
3HDDRegener...se.exe
windows10-2004-x64
3HDDRegener...ll.dll
windows7-x64
3HDDRegener...ll.dll
windows10-2004-x64
3HDDRegener...65.dll
windows7-x64
3HDDRegener...65.dll
windows10-2004-x64
3HDDRegener...eg.exe
windows7-x64
7HDDRegener...eg.exe
windows10-2004-x64
7HDDRegener...��.exe
windows7-x64
4HDDRegener...��.exe
windows10-2004-x64
4Analysis
-
max time kernel
14s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
26/11/2024, 04:34
Behavioral task
behavioral1
Sample
HDDRegenerator2013/BORLNDMM.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
HDDRegenerator2013/BORLNDMM.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
HDDRegenerator2013/CC3280MT.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
HDDRegenerator2013/CC3280MT.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
HDDRegenerator2013/HDD Regenerator.exe
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
HDDRegenerator2013/HDD Regenerator.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
HDDRegenerator2013/Purchase.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
HDDRegenerator2013/Purchase.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
HDDRegenerator2013/WindowsShell.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
HDDRegenerator2013/WindowsShell.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
HDDRegenerator2013/eSellerateControl365.dll
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
HDDRegenerator2013/eSellerateControl365.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
HDDRegenerator2013/hddreg.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
HDDRegenerator2013/hddreg.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
HDDRegenerator2013/硬盘再生器.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
HDDRegenerator2013/硬盘再生器.exe
Resource
win10v2004-20241007-en
General
-
Target
HDDRegenerator2013/eSellerateControl365.dll
-
Size
92KB
-
MD5
a40b0b3979b5cd056109187570987696
-
SHA1
71b1807b70654a664bf90bccd0a3e0f1ceba1738
-
SHA256
9e1cfa369f2a8ecc9e0ba3b9f11c139e93c1688f50810665cbf9bb79a17bdf76
-
SHA512
6002eedf78eef369846a3c16b49a77a9bff803701ca60c80a802af1ecdfc7f03af5e053ba351644c57acec5eae7ca43db66074796ed21cf3d2fb1b015b7099f5
-
SSDEEP
1536:deSoHg4tWm5CEa2Pf+mkTRN8nwO0eHmWRL205B+2soeUV0tU2i54:dig4tWm5C4P2n8wrx/Q+2soeUV0tU2iu
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 46 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{40A9417F-F41E-40A2-BAA5-FE0ACB1CF8F8}\TypeLib\ = "{169FBBF8-0478-42A4-B386-4F5B2CF9A98B}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{40A9417F-F41E-40A2-BAA5-FE0ACB1CF8F8}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\eSellerateControl.365.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\eSellerateControl.365.1\ = "eSeller Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C915F573-4C11-4968-9080-29E611FDBE9F}\ = "eSeller Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C915F573-4C11-4968-9080-29E611FDBE9F}\TypeLib\ = "{169FBBF8-0478-42A4-B386-4F5B2CF9A98B}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{169FBBF8-0478-42A4-B386-4F5B2CF9A98B} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{40A9417F-F41E-40A2-BAA5-FE0ACB1CF8F8}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\eSellerateControl.365\CurVer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C915F573-4C11-4968-9080-29E611FDBE9F}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{40A9417F-F41E-40A2-BAA5-FE0ACB1CF8F8}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{40A9417F-F41E-40A2-BAA5-FE0ACB1CF8F8}\ = "IeSeller" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{40A9417F-F41E-40A2-BAA5-FE0ACB1CF8F8}\TypeLib\ = "{169FBBF8-0478-42A4-B386-4F5B2CF9A98B}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{40A9417F-F41E-40A2-BAA5-FE0ACB1CF8F8}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\eSellerateControl.365 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C915F573-4C11-4968-9080-29E611FDBE9F}\VersionIndependentProgID\ = "eSellerateControl.365" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C915F573-4C11-4968-9080-29E611FDBE9F}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C915F573-4C11-4968-9080-29E611FDBE9F}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C915F573-4C11-4968-9080-29E611FDBE9F}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{40A9417F-F41E-40A2-BAA5-FE0ACB1CF8F8} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\eSellerateControl.365\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C915F573-4C11-4968-9080-29E611FDBE9F}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{40A9417F-F41E-40A2-BAA5-FE0ACB1CF8F8}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{40A9417F-F41E-40A2-BAA5-FE0ACB1CF8F8}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{40A9417F-F41E-40A2-BAA5-FE0ACB1CF8F8}\ = "IeSeller" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{40A9417F-F41E-40A2-BAA5-FE0ACB1CF8F8} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\eSellerateControl.365\ = "eSeller Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\eSellerateControl.365\CLSID\ = "{C915F573-4C11-4968-9080-29E611FDBE9F}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C915F573-4C11-4968-9080-29E611FDBE9F}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\HDDREG~1\\ESELLE~1.DLL" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{169FBBF8-0478-42A4-B386-4F5B2CF9A98B}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{169FBBF8-0478-42A4-B386-4F5B2CF9A98B}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{169FBBF8-0478-42A4-B386-4F5B2CF9A98B}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\eSellerateControl.365.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C915F573-4C11-4968-9080-29E611FDBE9F} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C915F573-4C11-4968-9080-29E611FDBE9F}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{169FBBF8-0478-42A4-B386-4F5B2CF9A98B}\1.0\ = "eSellerateControl 3.6.5 Library" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{169FBBF8-0478-42A4-B386-4F5B2CF9A98B}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\eSellerateControl.365\CurVer\ = "eSellerateControl.365.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C915F573-4C11-4968-9080-29E611FDBE9F}\ProgID\ = "eSellerateControl.365.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{169FBBF8-0478-42A4-B386-4F5B2CF9A98B}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{169FBBF8-0478-42A4-B386-4F5B2CF9A98B}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{40A9417F-F41E-40A2-BAA5-FE0ACB1CF8F8}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\eSellerateControl.365.1\CLSID\ = "{C915F573-4C11-4968-9080-29E611FDBE9F}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{169FBBF8-0478-42A4-B386-4F5B2CF9A98B}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\HDDRegenerator2013\\eSellerateControl365.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{169FBBF8-0478-42A4-B386-4F5B2CF9A98B}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\HDDRegenerator2013\\" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{40A9417F-F41E-40A2-BAA5-FE0ACB1CF8F8}\TypeLib\Version = "1.0" regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2548 wrote to memory of 640 2548 regsvr32.exe 29 PID 2548 wrote to memory of 640 2548 regsvr32.exe 29 PID 2548 wrote to memory of 640 2548 regsvr32.exe 29 PID 2548 wrote to memory of 640 2548 regsvr32.exe 29 PID 2548 wrote to memory of 640 2548 regsvr32.exe 29 PID 2548 wrote to memory of 640 2548 regsvr32.exe 29 PID 2548 wrote to memory of 640 2548 regsvr32.exe 29
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\HDDRegenerator2013\eSellerateControl365.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\HDDRegenerator2013\eSellerateControl365.dll2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:640
-