Analysis

  • max time kernel
    29s
  • max time network
    21s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    01-12-2020 14:18

General

  • Target

    Downloads3/speakoniasetup-1.0.bin.exe

  • Size

    2.6MB

  • MD5

    4e6aece633baf0155331ac4e5e537fef

  • SHA1

    daad322125235cce7742a6f95a428922843e7a6b

  • SHA256

    20652fdf3561c2f840597cf5a610ad4c581f2e41240e58caf9da8c3ce216d080

  • SHA512

    790b08a355a9e389210829e50801e6b5bf59ab80900dfafc0919ea8104b01a9d8650d9b5e045bbedc4f1f5e30f0c5566274838ef83bf4e318362ffb61f9abccd

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Modifies Installed Components in the registry 2 TTPs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 3 IoCs
  • Drops file in Program Files directory 10 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 993 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Downloads3\speakoniasetup-1.0.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\Downloads3\speakoniasetup-1.0.bin.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:980
    • C:\Users\Admin\AppData\Local\Temp\INS7E8C.tmp
      C:\Users\Admin\AppData\Local\Temp\INS7E8C.tmp /SL3 $30122 C:\Users\Admin\AppData\Local\Temp\Downloads3\speakoniasetup-1.0.bin.exe 2707411 2710888 66048
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:584
      • C:\Program Files (x86)\CFS-Technologies\Speakonia\spchapi.exe
        "C:\Program Files (x86)\CFS-Technologies\Speakonia\spchapi.exe" /Q
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:1800
        • C:\Windows\SysWOW64\grpconv.exe
          grpconv.exe -o
          4⤵
            PID:296
        • C:\Program Files (x86)\CFS-Technologies\Speakonia\tv_enua.exe
          "C:\Program Files (x86)\CFS-Technologies\Speakonia\tv_enua.exe" /Q
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in System32 directory
          • Drops file in Windows directory
          • Suspicious use of WriteProcessMemory
          PID:916
          • C:\Windows\SysWOW64\regsvr32.exe
            regsvr32 /s C:\Windows\lhsp\tv\tv_enua.dll
            4⤵
            • Loads dropped DLL
            PID:2252
          • C:\Windows\SysWOW64\regsvr32.exe
            regsvr32 /s C:\Windows\lhsp\tv\tvenuax.dll
            4⤵
            • Loads dropped DLL
            PID:2100
          • C:\Windows\SysWOW64\grpconv.exe
            grpconv.exe -o
            4⤵
              PID:512

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Registry Run Keys / Startup Folder

      2
      T1060

      Defense Evasion

      Modify Registry

      2
      T1112

      Discovery

      Query Registry

      1
      T1012

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\CFS-Technologies\Speakonia\spchapi.exe
        MD5

        d421da9b6a100bf58c7c6d585c73ed4c

        SHA1

        79521256aab1fc5d01a661ed0cdff45a88ab2ace

        SHA256

        8955ee03217bc2539e2f80e58f51d30aa97e7512d96592f098133c8036e363dd

        SHA512

        ca0b75d1a07b125cf3b774483e098a9095d18ee8c1a277a2ff6aeeeef1e1d74a5e55855dbf7f13cc96a82423203ea86336372d48d483dc600d3ead38fe746c60

      • C:\Program Files (x86)\CFS-Technologies\Speakonia\spchapi.exe
        MD5

        d421da9b6a100bf58c7c6d585c73ed4c

        SHA1

        79521256aab1fc5d01a661ed0cdff45a88ab2ace

        SHA256

        8955ee03217bc2539e2f80e58f51d30aa97e7512d96592f098133c8036e363dd

        SHA512

        ca0b75d1a07b125cf3b774483e098a9095d18ee8c1a277a2ff6aeeeef1e1d74a5e55855dbf7f13cc96a82423203ea86336372d48d483dc600d3ead38fe746c60

      • C:\Program Files (x86)\CFS-Technologies\Speakonia\tv_enua.exe
        MD5

        3f8f18c9c732151dcdd8e1d8fe655896

        SHA1

        222cc49201aa06313d4d35a62c5d494af49d1a56

        SHA256

        709936902951fb684d0a03a561fb7fd41c5e6f81ecd60d326809db66eb659331

        SHA512

        398a83f030824011f102dbcf9b25d3ff7527c489df149e9acdb492602941409cf551d16f6f03c01bc6f63a2e94645ed1f36610bdaffc7891299a8d9f89c511f7

      • C:\Program Files (x86)\CFS-Technologies\Speakonia\tv_enua.exe
        MD5

        3f8f18c9c732151dcdd8e1d8fe655896

        SHA1

        222cc49201aa06313d4d35a62c5d494af49d1a56

        SHA256

        709936902951fb684d0a03a561fb7fd41c5e6f81ecd60d326809db66eb659331

        SHA512

        398a83f030824011f102dbcf9b25d3ff7527c489df149e9acdb492602941409cf551d16f6f03c01bc6f63a2e94645ed1f36610bdaffc7891299a8d9f89c511f7

      • C:\Users\Admin\AppData\Local\Temp\INS7E8C.tmp
        MD5

        e832d7ee12db2e1f5b6a8ce6957bc8da

        SHA1

        5220371c70360cb6bf50bed9074ac817f9821a7b

        SHA256

        da1cbb483eaac174b231b553d8c6f006b9a6ddbfc734d634fc4a796535078e1e

        SHA512

        dd0fba01468250e884835f35c788f05a8f5d1d80d96b6be1dc4173c099352df9e5c647e6381a9f2b83ecb63f2cb6878078d98b196a82b55cf937fd751ce064dc

      • C:\Users\Admin\AppData\Local\Temp\INS7E8C.tmp
        MD5

        e832d7ee12db2e1f5b6a8ce6957bc8da

        SHA1

        5220371c70360cb6bf50bed9074ac817f9821a7b

        SHA256

        da1cbb483eaac174b231b553d8c6f006b9a6ddbfc734d634fc4a796535078e1e

        SHA512

        dd0fba01468250e884835f35c788f05a8f5d1d80d96b6be1dc4173c099352df9e5c647e6381a9f2b83ecb63f2cb6878078d98b196a82b55cf937fd751ce064dc

      • C:\Windows\SysWOW64\MSVCP50.dll
        MD5

        497fd4a8f5c4fcdaaac1f761a92a366a

        SHA1

        81617006e93f8a171b2c47581c1d67fac463dc93

        SHA256

        91cd76f9fa3b25008decb12c005c194bdf66c8d6526a954de7051bec9aae462a

        SHA512

        73d11a309d8f1a6624520a0bf56d539cb07adee6d46f2049a86919f5ce3556dc031437f797e3296311fe780a8a11a1a37b4a404de337d009e9ed961f75664a25

      • C:\Windows\lhsp\tv\tv_enua.dll
        MD5

        ed98e67fa8cc190aad0757cd620e6b77

        SHA1

        0317b10cdb8ac080ba2919e2c04058f1b6f2f94d

        SHA256

        e0beb19c3536561f603474e3d5e3c3dff341745d317bc4d1463e2abf182bb18d

        SHA512

        ec9c3a71ca9324644d4a2d458e9ba86f90deb9137d0a35793e0932c2aa297877ed7f1ab75729fda96690914e047f1336f100b6809cbc7a33baa1391ed588d7f0

      • C:\Windows\lhsp\tv\tvenuax.dll
        MD5

        1587bf2e99abeeae856f33bf98d3512e

        SHA1

        aa0f2a25fa5fc9edb4124e9aa906a52eb787bea9

        SHA256

        c9106198ecbd3a9cab8c2feff07f16d6bb1adfa19550148fc96076f0f28a37b0

        SHA512

        43161c65f2838aa0e8a9be5f3f73d4a6c78ad8605a6503aae16147a73f63fe985b17c17aedc3a4d0010d5216e04800d749b2625182acc84b905c344f0409765a

      • \Users\Admin\AppData\Local\Temp\IXP000.TMP\ADVPACK.DLL
        MD5

        81e5c8596a7e4e98117f5c5143293020

        SHA1

        45b7fe0989e2df1b4dfd227f8f3b73b6b7df9081

        SHA256

        7d126ed85df9705ec4f38bd52a73b621cf64dd87a3e8f9429a569f3f82f74004

        SHA512

        05b1e9eef13f7c140eb21f6dcb705ee3aaafabe94857aa86252afa4844de231815078a72e63d43725f6074aa5fefe765feb93a6b9cd510ee067291526bb95ec6

      • \Users\Admin\AppData\Local\Temp\IXP000.TMP\ADVPACK.DLL
        MD5

        81e5c8596a7e4e98117f5c5143293020

        SHA1

        45b7fe0989e2df1b4dfd227f8f3b73b6b7df9081

        SHA256

        7d126ed85df9705ec4f38bd52a73b621cf64dd87a3e8f9429a569f3f82f74004

        SHA512

        05b1e9eef13f7c140eb21f6dcb705ee3aaafabe94857aa86252afa4844de231815078a72e63d43725f6074aa5fefe765feb93a6b9cd510ee067291526bb95ec6

      • \Windows\SysWOW64\msvcp50.dll
        MD5

        497fd4a8f5c4fcdaaac1f761a92a366a

        SHA1

        81617006e93f8a171b2c47581c1d67fac463dc93

        SHA256

        91cd76f9fa3b25008decb12c005c194bdf66c8d6526a954de7051bec9aae462a

        SHA512

        73d11a309d8f1a6624520a0bf56d539cb07adee6d46f2049a86919f5ce3556dc031437f797e3296311fe780a8a11a1a37b4a404de337d009e9ed961f75664a25

      • \Windows\lhsp\tv\tv_enua.dll
        MD5

        ed98e67fa8cc190aad0757cd620e6b77

        SHA1

        0317b10cdb8ac080ba2919e2c04058f1b6f2f94d

        SHA256

        e0beb19c3536561f603474e3d5e3c3dff341745d317bc4d1463e2abf182bb18d

        SHA512

        ec9c3a71ca9324644d4a2d458e9ba86f90deb9137d0a35793e0932c2aa297877ed7f1ab75729fda96690914e047f1336f100b6809cbc7a33baa1391ed588d7f0

      • \Windows\lhsp\tv\tvenuax.dll
        MD5

        1587bf2e99abeeae856f33bf98d3512e

        SHA1

        aa0f2a25fa5fc9edb4124e9aa906a52eb787bea9

        SHA256

        c9106198ecbd3a9cab8c2feff07f16d6bb1adfa19550148fc96076f0f28a37b0

        SHA512

        43161c65f2838aa0e8a9be5f3f73d4a6c78ad8605a6503aae16147a73f63fe985b17c17aedc3a4d0010d5216e04800d749b2625182acc84b905c344f0409765a

      • memory/296-9-0x0000000000000000-mapping.dmp
      • memory/512-22-0x0000000000000000-mapping.dmp
      • memory/584-2-0x0000000000000000-mapping.dmp
      • memory/916-10-0x0000000000000000-mapping.dmp
      • memory/1800-5-0x0000000000000000-mapping.dmp
      • memory/2100-19-0x0000000000000000-mapping.dmp
      • memory/2252-14-0x0000000000000000-mapping.dmp