Analysis Overview
SHA256
a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778
Threat Level: Shows suspicious behavior
The file a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe was found to be: Shows suspicious behavior.
Malicious Activity Summary
Event Triggered Execution: Component Object Model Hijacking
Checks installed software on the system
Checks whether UAC is enabled
System Location Discovery: System Language Discovery
Modifies Internet Explorer settings
Modifies registry class
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2025-01-08 07:19
Signatures
Analysis: behavioral2
Detonation Overview
Submitted
2025-01-08 07:19
Reported
2025-01-08 07:21
Platform
win10v2004-20241007-en
Max time kernel
95s
Max time network
96s
Command Line
Signatures
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe
"C:\Users\Admin\AppData\Local\Temp\a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 232.168.11.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 60.153.16.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 64.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 200.163.202.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 198.187.3.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 217.135.221.88.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 48.229.111.52.in-addr.arpa | udp |
Files
memory/536-2-0x0000000002AB0000-0x0000000002BF5000-memory.dmp
memory/536-9-0x0000000002AB0000-0x0000000002BF5000-memory.dmp
Analysis: behavioral1
Detonation Overview
Submitted
2025-01-08 07:19
Reported
2025-01-08 07:21
Platform
win7-20241010-en
Max time kernel
14s
Max time network
19s
Command Line
Signatures
Event Triggered Execution: Component Object Model Hijacking
Checks installed software on the system
Checks whether UAC is enabled
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA | C:\Users\Admin\AppData\Local\Temp\a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe | N/A |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe | N/A |
Modifies Internet Explorer settings
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main | C:\Users\Admin\AppData\Local\Temp\a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Wow6432Node\CLSID | C:\Users\Admin\AppData\Local\Temp\a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Wow6432Node\CLSID\{F28C2F70-47DE-4EA5-8F6D-7D1476CD1EF5}\LocalServer32\ServerExecutable = "C:\\Users\\Admin\\AppData\\Local\\Temp\\a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe" | C:\Users\Admin\AppData\Local\Temp\a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\TypeLib\{157B1AA6-3E5C-404A-9118-C1D91F537040}\1.0\ = "JSIELib" | C:\Users\Admin\AppData\Local\Temp\a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\TypeLib\{157B1AA6-3E5C-404A-9118-C1D91F537040}\1.0\HELPDIR | C:\Users\Admin\AppData\Local\Temp\a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\TypeLib\{157B1AA6-3E5C-404A-9118-C1D91F537040}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp" | C:\Users\Admin\AppData\Local\Temp\a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Wow6432Node\Interface\{3B3F3AAD-FB97-49FF-BFEE-D22869AC4326} | C:\Users\Admin\AppData\Local\Temp\a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Wow6432Node\Interface\{3B3F3AAD-FB97-49FF-BFEE-D22869AC4326}\ = "ITinyJSObject" | C:\Users\Admin\AppData\Local\Temp\a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Wow6432Node\CLSID\{F28C2F70-47DE-4EA5-8F6D-7D1476CD1EF5}\LocalServer32 | C:\Users\Admin\AppData\Local\Temp\a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Wow6432Node\CLSID\{F28C2F70-47DE-4EA5-8F6D-7D1476CD1EF5}\TypeLib | C:\Users\Admin\AppData\Local\Temp\a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Wow6432Node\CLSID\{F28C2F70-47DE-4EA5-8F6D-7D1476CD1EF5}\TypeLib\ = "{7E77E9F2-D76B-4D54-B515-9A7F93DF03DF}" | C:\Users\Admin\AppData\Local\Temp\a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Wow6432Node\CLSID\{F28C2F70-47DE-4EA5-8F6D-7D1476CD1EF5}\Version\ = "1.0" | C:\Users\Admin\AppData\Local\Temp\a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\TypeLib\{157B1AA6-3E5C-404A-9118-C1D91F537040}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe" | C:\Users\Admin\AppData\Local\Temp\a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Interface\{3B3F3AAD-FB97-49FF-BFEE-D22869AC4326} | C:\Users\Admin\AppData\Local\Temp\a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Interface\{3B3F3AAD-FB97-49FF-BFEE-D22869AC4326}\ = "ITinyJSObject" | C:\Users\Admin\AppData\Local\Temp\a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Wow6432Node\Interface | C:\Users\Admin\AppData\Local\Temp\a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Wow6432Node\Interface\{3B3F3AAD-FB97-49FF-BFEE-D22869AC4326}\ProxyStubClsid32 | C:\Users\Admin\AppData\Local\Temp\a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Wow6432Node\Interface\{3B3F3AAD-FB97-49FF-BFEE-D22869AC4326}\TypeLib\ = "{157B1AA6-3E5C-404A-9118-C1D91F537040}" | C:\Users\Admin\AppData\Local\Temp\a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Wow6432Node | C:\Users\Admin\AppData\Local\Temp\a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Wow6432Node\CLSID\{F28C2F70-47DE-4EA5-8F6D-7D1476CD1EF5}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe" | C:\Users\Admin\AppData\Local\Temp\a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Wow6432Node\CLSID\{F28C2F70-47DE-4EA5-8F6D-7D1476CD1EF5}\Version | C:\Users\Admin\AppData\Local\Temp\a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\TypeLib\{157B1AA6-3E5C-404A-9118-C1D91F537040}\1.0\FLAGS\ = "0" | C:\Users\Admin\AppData\Local\Temp\a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\TypeLib\{157B1AA6-3E5C-404A-9118-C1D91F537040}\1.0\0 | C:\Users\Admin\AppData\Local\Temp\a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Wow6432Node\CLSID\{F28C2F70-47DE-4EA5-8F6D-7D1476CD1EF5}\Programmable | C:\Users\Admin\AppData\Local\Temp\a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\TypeLib | C:\Users\Admin\AppData\Local\Temp\a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\TypeLib\{157B1AA6-3E5C-404A-9118-C1D91F537040}\1.0\FLAGS | C:\Users\Admin\AppData\Local\Temp\a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Wow6432Node\Interface\{3B3F3AAD-FB97-49FF-BFEE-D22869AC4326}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" | C:\Users\Admin\AppData\Local\Temp\a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Interface | C:\Users\Admin\AppData\Local\Temp\a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\TypeLib\{157B1AA6-3E5C-404A-9118-C1D91F537040} | C:\Users\Admin\AppData\Local\Temp\a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\TypeLib\{157B1AA6-3E5C-404A-9118-C1D91F537040}\1.0\0\win32 | C:\Users\Admin\AppData\Local\Temp\a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Interface\{3B3F3AAD-FB97-49FF-BFEE-D22869AC4326}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" | C:\Users\Admin\AppData\Local\Temp\a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Interface\{3B3F3AAD-FB97-49FF-BFEE-D22869AC4326}\TypeLib\Version = "1.0" | C:\Users\Admin\AppData\Local\Temp\a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\TypeLib\{157B1AA6-3E5C-404A-9118-C1D91F537040}\1.0 | C:\Users\Admin\AppData\Local\Temp\a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Wow6432Node\CLSID\{F28C2F70-47DE-4EA5-8F6D-7D1476CD1EF5}\ = "TinyJSObject Class" | C:\Users\Admin\AppData\Local\Temp\a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Wow6432Node\Interface\{3B3F3AAD-FB97-49FF-BFEE-D22869AC4326}\TypeLib | C:\Users\Admin\AppData\Local\Temp\a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Interface\{3B3F3AAD-FB97-49FF-BFEE-D22869AC4326}\ProxyStubClsid32 | C:\Users\Admin\AppData\Local\Temp\a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Interface\{3B3F3AAD-FB97-49FF-BFEE-D22869AC4326}\TypeLib\ = "{157B1AA6-3E5C-404A-9118-C1D91F537040}" | C:\Users\Admin\AppData\Local\Temp\a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Wow6432Node\CLSID\{F28C2F70-47DE-4EA5-8F6D-7D1476CD1EF5} | C:\Users\Admin\AppData\Local\Temp\a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Wow6432Node\Interface\{3B3F3AAD-FB97-49FF-BFEE-D22869AC4326}\TypeLib\Version = "1.0" | C:\Users\Admin\AppData\Local\Temp\a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Interface\{3B3F3AAD-FB97-49FF-BFEE-D22869AC4326}\TypeLib | C:\Users\Admin\AppData\Local\Temp\a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe
"C:\Users\Admin\AppData\Local\Temp\a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | c1.allocal.info | udp |
| US | 8.8.8.8:53 | r1.joburnt.net | udp |
| US | 8.8.8.8:53 | c2.allocal.info | udp |
Files
memory/2260-2-0x0000000001FD0000-0x0000000002115000-memory.dmp
memory/2260-11-0x0000000001FD0000-0x0000000002115000-memory.dmp
memory/2260-10-0x0000000001FD0000-0x0000000002115000-memory.dmp
memory/2260-9-0x0000000001FD0000-0x0000000002115000-memory.dmp
memory/2260-13-0x00000000002C0000-0x00000000002C1000-memory.dmp
memory/2260-15-0x00000000002C0000-0x00000000002C1000-memory.dmp