Overview
overview
8Static
static
speco_plugin.exe
windows10_x64
8speco_plugin.exe
windows10-2004_x64
8speco_plugin.exe
windows11_x64
8speco_plugin.exe
android_x86
speco_plugin.exe
android_x64
speco_plugin.exe
android_x64
speco_plugin.exe
macos_amd64
1speco_plugin.exe
linux_amd64
speco_plugin.exe
linux_armhf
speco_plugin.exe
linux_mips
speco_plugin.exe
linux_mipsel
Analysis
-
max time kernel
234s -
max time network
390s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
10-02-2022 22:45
Static task
static1
Behavioral task
behavioral1
Sample
speco_plugin.exe
Resource
win10-en-20211208
Behavioral task
behavioral2
Sample
speco_plugin.exe
Resource
win10v2004-en-20220112
Behavioral task
behavioral3
Sample
speco_plugin.exe
Resource
win11
Behavioral task
behavioral4
Sample
speco_plugin.exe
Resource
android-x86-arm
Behavioral task
behavioral5
Sample
speco_plugin.exe
Resource
android-x64
Behavioral task
behavioral6
Sample
speco_plugin.exe
Resource
android-x64-arm64
Behavioral task
behavioral7
Sample
speco_plugin.exe
Resource
macos
Behavioral task
behavioral8
Sample
speco_plugin.exe
Resource
ubuntu1804-amd64-en-20211208
Behavioral task
behavioral9
Sample
speco_plugin.exe
Resource
debian9-armhf-en-20211208
Behavioral task
behavioral10
Sample
speco_plugin.exe
Resource
debian9-mipsbe-en-20211208
Behavioral task
behavioral11
Sample
speco_plugin.exe
Resource
debian9-mipsel-en-20211208
General
-
Target
speco_plugin.exe
-
Size
1.1MB
-
MD5
53e4b14faf1e046d09c36b918442b06a
-
SHA1
79bd631bf2f369af6139af3b67a815d62bbbabb9
-
SHA256
5f88f1f8fb79311e568d194eee42c817d2883ebaa6d1afbccb1a9b2d4de7b5c8
-
SHA512
b6698dcf9a2db51d4c28d1f65ec7f432c3b4b6a5b14e82af08d5c4d84aa568d38f25cde3de2438db22e9615633abec3a83ad06b73ecbf190134e39660b259c15
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 3332 Setup.exe 3400 IKernel.exe 3492 IKernel.exe 1500 iKernel.exe -
Loads dropped DLL 16 IoCs
pid Process 3492 IKernel.exe 3492 IKernel.exe 3492 IKernel.exe 3492 IKernel.exe 3492 IKernel.exe 3332 Setup.exe 3492 IKernel.exe 3492 IKernel.exe 3492 IKernel.exe 3492 IKernel.exe 3492 IKernel.exe 3492 IKernel.exe 3492 IKernel.exe 3492 IKernel.exe 3492 IKernel.exe 3492 IKernel.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 26 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\InstallShield Installation Information\{7E4F8F33-EEC4-493E-8E50-9263D16DA6C9}\data1.cab IKernel.exe File opened for modification C:\Program Files (x86)\InstallShield Installation Information\{7E4F8F33-EEC4-493E-8E50-9263D16DA6C9}\Setup.ini IKernel.exe File opened for modification C:\Program Files (x86)\InstallShield Installation Information IKernel.exe File opened for modification C:\PROGRA~2\COMMON~1\INSTAL~1\engine\6\INTEL3~1\corecomp.ini IKernel.exe File created C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\ctor8071.rra IKernel.exe File opened for modification C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\objectps.dll IKernel.exe File created C:\Program Files (x86)\Common Files\InstallShield\IScript\IScr812c.rra IKernel.exe File opened for modification C:\Program Files (x86)\InstallShield Installation Information\{7E4F8F33-EEC4-493E-8E50-9263D16DA6C9}\data1.hdr IKernel.exe File created C:\Program Files (x86)\InstallShield Installation Information\{7E4F8F33-EEC4-493E-8E50-9263D16DA6C9}\Setub5f8.rra IKernel.exe File created C:\Program Files (x86)\InstallShield Installation Information\{7E4F8F33-EEC4-493E-8E50-9263D16DA6C9}\setub607.rra IKernel.exe File created C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\core8051.rra IKernel.exe File created C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\obje80ce.rra IKernel.exe File created C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\iuse80ce.rra IKernel.exe File created C:\Program Files (x86)\InstallShield Installation Information\{7E4F8F33-EEC4-493E-8E50-9263D16DA6C9}\layob5c9.rra IKernel.exe File created C:\Program Files (x86)\InstallShield Installation Information\{7E4F8F33-EEC4-493E-8E50-9263D16DA6C9}\datab5d9.rra IKernel.exe File opened for modification C:\Program Files (x86)\InstallShield Installation Information\{7E4F8F33-EEC4-493E-8E50-9263D16DA6C9}\setup.ini IKernel.exe File created C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\temp.000 Setup.exe File opened for modification C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\corecomp.ini IKernel.exe File opened for modification C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\ctor.dll IKernel.exe File opened for modification C:\Program Files (x86)\InstallShield Installation Information\{7E4F8F33-EEC4-493E-8E50-9263D16DA6C9}\Setup.exe IKernel.exe File opened for modification C:\Program Files (x86)\InstallShield Installation Information\{7E4F8F33-EEC4-493E-8E50-9263D16DA6C9}\setup.inx IKernel.exe File opened for modification C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\iuser.dll IKernel.exe File opened for modification C:\Program Files (x86)\Common Files\InstallShield\IScript\IScript.dll IKernel.exe File opened for modification C:\Program Files (x86)\InstallShield Installation Information\{7E4F8F33-EEC4-493E-8E50-9263D16DA6C9}\layout.bin IKernel.exe File created C:\Program Files (x86)\speco-plugin\np_sb617.rra IKernel.exe File opened for modification C:\Program Files (x86)\speco-plugin\np_speco_plugin.dll IKernel.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3D8B6331-D8B1-11D2-80C5-00104B1F6CEA}\TypeLib\ = "{682C25C5-D7D9-11D2-80C5-00104B1F6CEA}" IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Setup.Kernel.1\CLSID iKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{251753FA-FB3B-11D2-8842-00C04F72F303}\ProxyStubClsid32 IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8415DE38-1C1D-11D3-889D-00C04F72F303}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AA7E2067-CB55-11D2-8094-00104B1F9838} IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8c3c1b17-e59d-11d2-b40b-00a024b9dddd}\TreatAs IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Setup.User\CLSID IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3D8B6332-D8B1-11D2-80C5-00104B1F6CEA}\TypeLib IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{91814EC0-B5F0-11D2-80B9-00104B1F6CEA}\VersionIndependentProgID\ = "Setup.Kernel" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{91814EBF-B5F0-11D2-80B9-00104B1F6CEA}\TypeLib\Version = "1.0" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{91814EC5-B5F0-11D2-80B9-00104B1F6CEA}\TypeLib\ = "{91814EB1-B5F0-11D2-80B9-00104B1F6CEA}" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7BB118F1-6D5B-470E-82D0-AFB042724560}\ = "ISetupReboot2" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DED5FEEC-225A-11D3-88AA-00C04F72F303}\TypeLib\ = "{27D2CF3C-D5B0-11D2-8094-00104B1F9838}" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8c3c1b17-e59d-11d2-b40b-00a024b9dddd}\ = "SetupLogServices Class" iKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8C3C1B11-E59D-11D2-B40B-00A024B9DDDD}\ProxyStubClsid32 IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C4AAC3B1-C547-11D3-B289-00C04F59FBE9}\TypeLib IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FEBEC920-1849-11D3-A8FE-00105A088FAC}\ProxyStubClsid32 IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8C3C1B14-E59D-11D2-B40B-00A024B9DDDD}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Setup.ScriptDriverWrapper\ = "InstallShield setup object wrapper" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{00345390-4F77-11D3-A908-00105A088FAC}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3EDC2C10-66FE-11D3-A90F-00105A088FAC}\TypeLib\Version = "1.0" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{787D0980-F63F-462C-86BC-FC23847C70F4}\ = "ISetupMainWindow3" IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9E561C6B-425D-4E3D-95CA-A2D289D7C3FB}\ProxyStubClsid32 IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8C3C1B11-E59D-11D2-B40B-00A024B9DDDD}\ = "ISetupFeatureLog" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8C3C1B13-E59D-11D2-B40B-00A024B9DDDD}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AA7E2062-CB55-11D2-8094-00104B1F9838}\ = "ISetupTransfer" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00345390-4F77-11D3-A908-00105A088FAC}\ = "ISetupMultiMedia" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EDE94BF2-4FB9-11D5-ABAB-00B0D02332EB}\TypeLib\ = "{DED1EA29-3F89-11D3-BBB9-00105A1F0D68}" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AA7E2065-CB55-11D2-8094-00104B1F9838}\TypeLib\Version = "1.0" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9CFCFE67-0BB8-43E0-8425-378D0A02ACE4}\ = "ISetupCABFile2" IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7BB118F1-6D5B-470E-82D0-AFB042724560}\ProxyStubClsid32 IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1B1B8830-C559-11D3-B289-00C04F59FBE9}\ = "ISetupShellLink2" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9B697780-DBBC-11D2-80C7-00104B1F6CEA}\NumMethods\ = "5" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BDF8B49D-16D0-49A5-B133-ABE7DCC23DAF}\TypeLib\Version = "1.0" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7D795704-435D-11D3-88FF-00C04F72F303}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FEBEC920-1849-11D3-A8FE-00105A088FAC}\TypeLib\Version = "1.0" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{94F4A332-A2AE-11D3-8378-00C04F59FBE9}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{682C25C5-D7D9-11D2-80C5-00104B1F6CEA}\1.0\HELPDIR\ = "C:\\Program Files (x86)\\Common Files\\InstallShield\\engine\\6\\Intel 32\\" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{AF57A6F0-4101-11D3-88F6-00C04F72F303}\TypeLib\ = "{91814EB1-B5F0-11D2-80B9-00104B1F6CEA}" iKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{91814EBF-B5F0-11D2-80B9-00104B1F6CEA}\TypeLib\Version = "1.0" IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{44D61997-B7D4-11D2-80BA-00104B1F6CEA} IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{91814EC3-B5F0-11D2-80B9-00104B1F6CEA}\ = "ISetupComponent" IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DED5FEEC-225A-11D3-88AA-00C04F72F303} IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{AA7E2062-CB55-11D2-8094-00104B1F9838}\TypeLib\Version = "1.0" IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{AA7E2064-CB55-11D2-8094-00104B1F9838}\ProxyStubClsid32 IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8C3C1B14-E59D-11D2-B40B-00A024B9DDDD}\ = "ISetupLogService" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{61892D50-28EF-11D3-A8FF-00105A088FAC}\TypeLib\Version = "1.0" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4DFB7010-41EB-11D3-BBBA-00105A1F0D68}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2583251F-0A04-11D3-886B-00C04F72F303}\ = "ISetupBasicFeatureStateEvents" IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9CFCFE67-0BB8-43E0-8425-378D0A02ACE4}\ProxyStubClsid32 IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BDF8B49D-16D0-49A5-B133-ABE7DCC23DAF}\ProxyStubClsid32 IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Setup.LogServices.1 iKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8C3C1B12-E59D-11D2-B40B-00A024B9DDDD}\TypeLib\ = "{91814EB1-B5F0-11D2-80B9-00104B1F6CEA}" IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{44D61997-B7D4-11D2-80BA-00104B1F6CEA}\TypeLib IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D4FF39B9-1A05-11D3-8896-00C04F72F303}\TypeLib\Version = "1.0" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{65D37452-0EBB-11D3-887B-00C04F72F303}\ = "ISetupRegistry" IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{787D0980-F63F-462C-86BC-FC23847C70F4}\ProxyStubClsid32 IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{15F051E6-59A9-11D3-A25D-06D730000000}\ = "ISetupScriptError" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3D8B6331-D8B1-11D2-80C5-00104B1F6CEA}\TypeLib\Version = "1.0" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AF57A6F1-4101-11D3-88F6-00C04F72F303}\TypeLib\ = "{91814EB1-B5F0-11D2-80B9-00104B1F6CEA}" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9CFCFE67-0BB8-43E0-8425-378D0A02ACE4}\TypeLib\Version = "1.0" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1F9922A2-F026-11D2-8822-00C04F72F303}\TypeLib\ = "{91814EB1-B5F0-11D2-80B9-00104B1F6CEA}" IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8415DE38-1C1D-11D3-889D-00C04F72F303}\TypeLib IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{54DADAB3-28A6-11D3-88BA-00C04F72F303}\ProxyStubClsid32 IKernel.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4116 wrote to memory of 3332 4116 speco_plugin.exe 69 PID 4116 wrote to memory of 3332 4116 speco_plugin.exe 69 PID 4116 wrote to memory of 3332 4116 speco_plugin.exe 69 PID 3332 wrote to memory of 3400 3332 Setup.exe 70 PID 3332 wrote to memory of 3400 3332 Setup.exe 70 PID 3332 wrote to memory of 3400 3332 Setup.exe 70 PID 3492 wrote to memory of 1500 3492 IKernel.exe 72 PID 3492 wrote to memory of 1500 3492 IKernel.exe 72 PID 3492 wrote to memory of 1500 3492 IKernel.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\speco_plugin.exe"C:\Users\Admin\AppData\Local\Temp\speco_plugin.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\pft7BCF~tmp\Disk1\Setup.exe"C:\Users\Admin\AppData\Local\Temp\pft7BCF~tmp\Disk1\Setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\IKernel.exe"C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\IKernel.exe" -RegServer3⤵
- Executes dropped EXE
- Modifies registry class
PID:3400
-
-
-
C:\PROGRA~2\COMMON~1\INSTAL~1\engine\6\INTEL3~1\IKernel.exeC:\PROGRA~2\COMMON~1\INSTAL~1\engine\6\INTEL3~1\IKernel.exe -Embedding1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\iKernel.exe"C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\iKernel.exe" /REGSERVER2⤵
- Executes dropped EXE
- Modifies registry class
PID:1500
-