Overview
overview
8Static
static
speco_plugin.exe
windows10_x64
8speco_plugin.exe
windows10-2004_x64
8speco_plugin.exe
windows11_x64
8speco_plugin.exe
android_x86
speco_plugin.exe
android_x64
speco_plugin.exe
android_x64
speco_plugin.exe
macos_amd64
1speco_plugin.exe
linux_amd64
speco_plugin.exe
linux_armhf
speco_plugin.exe
linux_mips
speco_plugin.exe
linux_mipsel
Analysis
-
max time kernel
473s -
max time network
361s -
platform
windows11_x64 -
resource
win11 -
submitted
10-02-2022 22:45
Static task
static1
Behavioral task
behavioral1
Sample
speco_plugin.exe
Resource
win10-en-20211208
Behavioral task
behavioral2
Sample
speco_plugin.exe
Resource
win10v2004-en-20220112
Behavioral task
behavioral3
Sample
speco_plugin.exe
Resource
win11
Behavioral task
behavioral4
Sample
speco_plugin.exe
Resource
android-x86-arm
Behavioral task
behavioral5
Sample
speco_plugin.exe
Resource
android-x64
Behavioral task
behavioral6
Sample
speco_plugin.exe
Resource
android-x64-arm64
Behavioral task
behavioral7
Sample
speco_plugin.exe
Resource
macos
Behavioral task
behavioral8
Sample
speco_plugin.exe
Resource
ubuntu1804-amd64-en-20211208
Behavioral task
behavioral9
Sample
speco_plugin.exe
Resource
debian9-armhf-en-20211208
Behavioral task
behavioral10
Sample
speco_plugin.exe
Resource
debian9-mipsbe-en-20211208
Behavioral task
behavioral11
Sample
speco_plugin.exe
Resource
debian9-mipsel-en-20211208
General
-
Target
speco_plugin.exe
-
Size
1.1MB
-
MD5
53e4b14faf1e046d09c36b918442b06a
-
SHA1
79bd631bf2f369af6139af3b67a815d62bbbabb9
-
SHA256
5f88f1f8fb79311e568d194eee42c817d2883ebaa6d1afbccb1a9b2d4de7b5c8
-
SHA512
b6698dcf9a2db51d4c28d1f65ec7f432c3b4b6a5b14e82af08d5c4d84aa568d38f25cde3de2438db22e9615633abec3a83ad06b73ecbf190134e39660b259c15
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 3272 Setup.exe 1140 IKernel.exe 3592 IKernel.exe 1912 iKernel.exe -
Loads dropped DLL 16 IoCs
pid Process 3592 IKernel.exe 3592 IKernel.exe 3592 IKernel.exe 3592 IKernel.exe 3592 IKernel.exe 3272 Setup.exe 3592 IKernel.exe 3592 IKernel.exe 3592 IKernel.exe 3592 IKernel.exe 3592 IKernel.exe 3592 IKernel.exe 3592 IKernel.exe 3592 IKernel.exe 3592 IKernel.exe 3592 IKernel.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 26 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\corecomp.ini IKernel.exe File created C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\iuse7593.rra IKernel.exe File created C:\Program Files (x86)\InstallShield Installation Information\{7E4F8F33-EEC4-493E-8E50-9263D16DA6C9}\layof293.rra IKernel.exe File opened for modification C:\Program Files (x86)\InstallShield Installation Information\{7E4F8F33-EEC4-493E-8E50-9263D16DA6C9}\Setup.exe IKernel.exe File created C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\temp.000 Setup.exe File opened for modification C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\objectps.dll IKernel.exe File opened for modification C:\Program Files (x86)\InstallShield Installation Information\{7E4F8F33-EEC4-493E-8E50-9263D16DA6C9}\data1.cab IKernel.exe File opened for modification C:\Program Files (x86)\InstallShield Installation Information\{7E4F8F33-EEC4-493E-8E50-9263D16DA6C9}\Setup.ini IKernel.exe File opened for modification C:\Program Files (x86)\InstallShield Installation Information\{7E4F8F33-EEC4-493E-8E50-9263D16DA6C9}\setup.inx IKernel.exe File opened for modification C:\Program Files (x86)\speco-plugin\np_speco_plugin.dll IKernel.exe File created C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\ctor7545.rra IKernel.exe File opened for modification C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\ctor.dll IKernel.exe File opened for modification C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\iuser.dll IKernel.exe File created C:\Program Files (x86)\Common Files\InstallShield\IScript\IScr7630.rra IKernel.exe File opened for modification C:\Program Files (x86)\Common Files\InstallShield\IScript\IScript.dll IKernel.exe File opened for modification C:\Program Files (x86)\InstallShield Installation Information\{7E4F8F33-EEC4-493E-8E50-9263D16DA6C9}\layout.bin IKernel.exe File created C:\Program Files (x86)\InstallShield Installation Information\{7E4F8F33-EEC4-493E-8E50-9263D16DA6C9}\dataf293.rra IKernel.exe File opened for modification C:\Program Files (x86)\InstallShield Installation Information\{7E4F8F33-EEC4-493E-8E50-9263D16DA6C9}\setup.ini IKernel.exe File created C:\Program Files (x86)\speco-plugin\np_sf2d2.rra IKernel.exe File created C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\core7545.rra IKernel.exe File opened for modification C:\PROGRA~2\COMMON~1\INSTAL~1\engine\6\INTEL3~1\corecomp.ini IKernel.exe File created C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\obje7584.rra IKernel.exe File opened for modification C:\Program Files (x86)\InstallShield Installation Information\{7E4F8F33-EEC4-493E-8E50-9263D16DA6C9}\data1.hdr IKernel.exe File created C:\Program Files (x86)\InstallShield Installation Information\{7E4F8F33-EEC4-493E-8E50-9263D16DA6C9}\Setuf2b3.rra IKernel.exe File created C:\Program Files (x86)\InstallShield Installation Information\{7E4F8F33-EEC4-493E-8E50-9263D16DA6C9}\setuf2b3.rra IKernel.exe File opened for modification C:\Program Files (x86)\InstallShield Installation Information IKernel.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{91814EC3-B5F0-11D2-80B9-00104B1F6CEA}\ = "ISetupComponent" IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AA7E2060-CB55-11D2-8094-00104B1F9838} IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AA7E2060-CB55-11D2-8094-00104B1F9838}\TypeLib\ = "{91814EB1-B5F0-11D2-80B9-00104B1F6CEA}" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{682C25C5-D7D9-11D2-80C5-00104B1F6CEA}\1.0\0\win32\ = "C:\\Program Files (x86)\\Common Files\\InstallShield\\engine\\6\\Intel 32\\iuser.dll" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2583251F-0A04-11D3-886B-00C04F72F303}\TypeLib\ = "{682C25C5-D7D9-11D2-80C5-00104B1F6CEA}" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8C3C1B12-E59D-11D2-B40B-00A024B9DDDD}\TypeLib\ = "{91814EB1-B5F0-11D2-80B9-00104B1F6CEA}" IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8c3c1b17-e59d-11d2-b40b-00a024b9dddd} IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EDE94BF2-4FB9-11D5-ABAB-00B0D02332EB}\TypeLib\ = "{DED1EA29-3F89-11D3-BBB9-00105A1F0D68}" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AA7E2061-CB55-11D2-8094-00104B1F9838}\ = "ISetupObjects" IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AA7E2060-CB55-11D2-8094-00104B1F9838}\ProxyStubClsid32 IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8c3c1b17-e59d-11d2-b40b-00a024b9dddd}\ = "SetupLogServices Class" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{27D2CF3C-D5B0-11D2-8094-00104B1F9838}\1.0\HELPDIR\ = "C:\\Program Files (x86)\\Common Files\\InstallShield\\engine\\6\\Intel 32\\" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9E561C6B-425D-4E3D-95CA-A2D289D7C3FB}\ = "ISetupMainWindow4" IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4DFB7010-41EB-11D3-BBBA-00105A1F0D68} IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4DFB7010-41EB-11D3-BBBA-00105A1F0D68}\ = "ISetupScriptController" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8C3C1B16-E59D-11D2-B40B-00A024B9DDDD}\TypeLib\Version = "1.0" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{91814EC1-B5F0-11D2-80B9-00104B1F6CEA}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1F9922A2-F026-11D2-8822-00C04F72F303}\ = "ISetupObjectContext" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{251753FA-FB3B-11D2-8842-00C04F72F303}\TypeLib\ = "{91814EB1-B5F0-11D2-80B9-00104B1F6CEA}" IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DAB9BF17-267D-11D3-88B6-00C04F72F303}\TypeLib IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C4AAC3B1-C547-11D3-B289-00C04F59FBE9}\TypeLib\ = "{91814EB1-B5F0-11D2-80B9-00104B1F6CEA}" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8C3C1B16-E59D-11D2-B40B-00A024B9DDDD}\TypeLib\ = "{27D2CF3C-D5B0-11D2-8094-00104B1F9838}" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BE6115A1-7DE5-48DC-AD2A-25060E00FCE2}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D4FF39B9-1A05-11D3-8896-00C04F72F303}\ = "ISetupType" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{AF57A6F0-4101-11D3-88F6-00C04F72F303}\ = "ISetupTransferErrorInfo" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{112EB4F0-5A48-11D3-A90A-00105A088FAC}\ = "ISetupWindowBillBoards" IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{22D84EC7-E201-4432-B3ED-A9DCA3604594} iKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CC096170-E2CB-11D2-80C8-00104B1F6CEA}\TypeLib\ = "{91814EB1-B5F0-11D2-80B9-00104B1F6CEA}" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8C3C1B16-E59D-11D2-B40B-00A024B9DDDD}\ = "ISetupOpTypes" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D4FF39B9-1A05-11D3-8896-00C04F72F303}\TypeLib\ = "{91814EB1-B5F0-11D2-80B9-00104B1F6CEA}" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3EDC2C10-66FE-11D3-A90F-00105A088FAC}\ = "ISetupGUIObject" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{112EB4F0-5A48-11D3-A90A-00105A088FAC}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8C3C1B13-E59D-11D2-B40B-00A024B9DDDD}\TypeLib\ = "{91814EB1-B5F0-11D2-80B9-00104B1F6CEA}" iKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{AA7E2060-CB55-11D2-8094-00104B1F9838}\ = "ISetupObject" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8415DE38-1C1D-11D3-889D-00C04F72F303}\ = "ISetupShellLink" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1B1B8830-C559-11D3-B289-00C04F59FBE9}\ = "ISetupShellLink2" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Setup.ScriptObjectWrapper.1\ = "InstallShield setup object wrapper" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00345390-4F77-11D3-A908-00105A088FAC}\TypeLib\ = "{682C25C5-D7D9-11D2-80C5-00104B1F6CEA}" IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AA7E2065-CB55-11D2-8094-00104B1F9838}\ProxyStubClsid32 IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6B15A454-9067-4878-B10E-B9DFFE03049D}\ProxyStubClsid32 IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AA7E2060-CB55-11D2-8094-00104B1F9838}\TypeLib\ = "{27D2CF3C-D5B0-11D2-8094-00104B1F9838}" IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3D8B6332-D8B1-11D2-80C5-00104B1F6CEA}\TypeLib IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Setup.LogServices.1 iKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CC096170-E2CB-11D2-80C8-00104B1F6CEA} IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{91814EC3-B5F0-11D2-80B9-00104B1F6CEA}\TypeLib\ = "{91814EB1-B5F0-11D2-80B9-00104B1F6CEA}" IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D4FF39BB-1A05-11D3-8896-00C04F72F303}\TypeLib IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{348440B0-C79A-11D3-B28B-00C04F59FBE9} IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{91814EB1-B5F0-11D2-80B9-00104B1F6CEA}\1.0 IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{91814EC5-B5F0-11D2-80B9-00104B1F6CEA}\TypeLib IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DED5FEEC-225A-11D3-88AA-00C04F72F303}\ = "ISetupFilesCost" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AA7E2065-CB55-11D2-8094-00104B1F9838}\ = "ISetupFeatures" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8c3c1b17-e59d-11d2-b40b-00a024b9dddd}\TreatAs\ = "{22D84EC7-E201-4432-B3ED-A9DCA3604594}" IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6494206F-23EA-11D3-88B0-00C04F72F303} IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Setup.ScriptEngine.1\CLSID IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{91814EC0-B5F0-11D2-80B9-00104B1F6CEA} iKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{91814EB1-B5F0-11D2-80B9-00104B1F6CEA}\1.0\ = "Setup Kernel 1.0 Type Library" IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{91814EC3-B5F0-11D2-80B9-00104B1F6CEA} IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{AA7E2061-CB55-11D2-8094-00104B1F9838}\ProxyStubClsid32 IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{AA7E2061-CB55-11D2-8094-00104B1F9838}\TypeLib\ = "{91814EB1-B5F0-11D2-80B9-00104B1F6CEA}" IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1B1B8830-C559-11D3-B289-00C04F59FBE9} IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C9CD1A93-D7B4-11D2-80C5-00104B1F6CEA}\VersionIndependentProgID IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{067DBAA0-38DF-11D3-BBB7-00105A1F0D68}\TypeLib\Version = "1.0" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CC096170-E2CB-11D2-80C8-00104B1F6CEA}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{91814EBF-B5F0-11D2-80B9-00104B1F6CEA}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IKernel.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1472 wrote to memory of 3272 1472 speco_plugin.exe 86 PID 1472 wrote to memory of 3272 1472 speco_plugin.exe 86 PID 1472 wrote to memory of 3272 1472 speco_plugin.exe 86 PID 3272 wrote to memory of 1140 3272 Setup.exe 87 PID 3272 wrote to memory of 1140 3272 Setup.exe 87 PID 3272 wrote to memory of 1140 3272 Setup.exe 87 PID 3592 wrote to memory of 1912 3592 IKernel.exe 91 PID 3592 wrote to memory of 1912 3592 IKernel.exe 91 PID 3592 wrote to memory of 1912 3592 IKernel.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\speco_plugin.exe"C:\Users\Admin\AppData\Local\Temp\speco_plugin.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\pft6FF8~tmp\Disk1\Setup.exe"C:\Users\Admin\AppData\Local\Temp\pft6FF8~tmp\Disk1\Setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\IKernel.exe"C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\IKernel.exe" -RegServer3⤵
- Executes dropped EXE
- Modifies registry class
PID:1140
-
-
-
C:\PROGRA~2\COMMON~1\INSTAL~1\engine\6\INTEL3~1\IKernel.exeC:\PROGRA~2\COMMON~1\INSTAL~1\engine\6\INTEL3~1\IKernel.exe -Embedding1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\iKernel.exe"C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\iKernel.exe" /REGSERVER2⤵
- Executes dropped EXE
- Modifies registry class
PID:1912
-