Analysis
-
max time kernel
41s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19-09-2022 08:33
Static task
static1
Behavioral task
behavioral1
Sample
20e60ff094fb57ac2b80744aba88c61635f85d109b29fcae776af05a65550bff.exe
Resource
win7-20220812-en
General
-
Target
20e60ff094fb57ac2b80744aba88c61635f85d109b29fcae776af05a65550bff.exe
-
Size
341KB
-
MD5
59a3fb18abf76e1955b666771d04712a
-
SHA1
376983c0d74e65ec2fff72f760a94d527105c67e
-
SHA256
20e60ff094fb57ac2b80744aba88c61635f85d109b29fcae776af05a65550bff
-
SHA512
f38102d22673ceab36ccb713575ca9de7e75f33b3c8a557815aa62470f3f6d6d5c60932282fc5aac4040475fd79b050f8e13444c6223a149bf8f67dcaf94d0c3
-
SSDEEP
6144:bTfFDbRnOTrAZJUJvIV9X7PkoCLIJ/2Hzq4PqrBQZ7o+xegv83+:d5OtKl7PkRLI12HCNqEYNk3+
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 964 nsutlc.exe -
Loads dropped DLL 3 IoCs
pid Process 1804 20e60ff094fb57ac2b80744aba88c61635f85d109b29fcae776af05a65550bff.exe 1804 20e60ff094fb57ac2b80744aba88c61635f85d109b29fcae776af05a65550bff.exe 1752 regsvr32.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{3D7F8579-30EE-42E7-908E-B84654E5E2F2} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{3D7F8579-30EE-42E7-908E-B84654E5E2F2}\ regsvr32.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\zbnshua.vxd 20e60ff094fb57ac2b80744aba88c61635f85d109b29fcae776af05a65550bff.exe File opened for modification C:\Program Files (x86)\Common Files\zbnshua.vxd 20e60ff094fb57ac2b80744aba88c61635f85d109b29fcae776af05a65550bff.exe File created C:\Program Files (x86)\Common Files\cvdbsy.bat nsutlc.exe File created C:\Program Files (x86)\Common Files\nsutlc.exe 20e60ff094fb57ac2b80744aba88c61635f85d109b29fcae776af05a65550bff.exe File opened for modification C:\Program Files (x86)\Common Files\nsutlc.exe 20e60ff094fb57ac2b80744aba88c61635f85d109b29fcae776af05a65550bff.exe File created C:\Program Files (x86)\Common Files\nsutlc.dll 20e60ff094fb57ac2b80744aba88c61635f85d109b29fcae776af05a65550bff.exe File opened for modification C:\Program Files (x86)\Common Files\nsutlc.dll 20e60ff094fb57ac2b80744aba88c61635f85d109b29fcae776af05a65550bff.exe File created C:\Program Files (x86)\Common Files\__tmp_rar_sfx_access_check_7119667 20e60ff094fb57ac2b80744aba88c61635f85d109b29fcae776af05a65550bff.exe File created C:\Program Files (x86)\Common Files\xghywu.vxd 20e60ff094fb57ac2b80744aba88c61635f85d109b29fcae776af05a65550bff.exe File opened for modification C:\Program Files (x86)\Common Files\xghywu.vxd 20e60ff094fb57ac2b80744aba88c61635f85d109b29fcae776af05a65550bff.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\SearchScopes\DefaultScope = "baidu" nsutlc.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet explorer\Main nsutlc.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\SearchScopes\baidu nsutlc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\SearchScopes\baidu\DisplayName = "°Ù¶ÈËÑË÷" nsutlc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\SearchScopes\baidu\URL = "http://www.baidu.com/baidu?tn=flstudios_cb&word={searchTerms}&cl=3&ie=utf-8" nsutlc.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\SearchScopes nsutlc.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://hao.uenet.info" nsutlc.exe -
Modifies registry class 23 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell nsutlc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D} nsutlc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3D7F8579-30EE-42E7-908E-B84654E5E2F2}\InprocServer32\ = "C:\\PROGRA~2\\COMMON~1\\nsutlc.dll" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Wow6432Node nsutlc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3D7F8579-30EE-42E7-908E-B84654E5E2F2}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3D7F8579-30EE-42E7-908E-B84654E5E2F2} regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Wow6432Node\CLSID nsutlc.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage nsutlc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage\Command\ = "\"C:\\Program Files\\Internet Explorer\\iexplore.exe\" http://hao.uenet.info" nsutlc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell nsutlc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage nsutlc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3D7F8579-30EE-42E7-908E-B84654E5E2F2}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\nsutlc.mgiett\ regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage\Command nsutlc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3D7F8579-30EE-42E7-908E-B84654E5E2F2}\ProgID\ = "nsutlc.mgiett" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3D7F8579-30EE-42E7-908E-B84654E5E2F2}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage\Command nsutlc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID nsutlc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3D7F8579-30EE-42E7-908E-B84654E5E2F2}\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\nsutlc.mgiett regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\nsutlc.mgiett\Clsid regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\nsutlc.mgiett\Clsid\ = "{3D7F8579-30EE-42E7-908E-B84654E5E2F2}" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D} nsutlc.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1804 wrote to memory of 1752 1804 20e60ff094fb57ac2b80744aba88c61635f85d109b29fcae776af05a65550bff.exe 27 PID 1804 wrote to memory of 1752 1804 20e60ff094fb57ac2b80744aba88c61635f85d109b29fcae776af05a65550bff.exe 27 PID 1804 wrote to memory of 1752 1804 20e60ff094fb57ac2b80744aba88c61635f85d109b29fcae776af05a65550bff.exe 27 PID 1804 wrote to memory of 1752 1804 20e60ff094fb57ac2b80744aba88c61635f85d109b29fcae776af05a65550bff.exe 27 PID 1804 wrote to memory of 1752 1804 20e60ff094fb57ac2b80744aba88c61635f85d109b29fcae776af05a65550bff.exe 27 PID 1804 wrote to memory of 1752 1804 20e60ff094fb57ac2b80744aba88c61635f85d109b29fcae776af05a65550bff.exe 27 PID 1804 wrote to memory of 1752 1804 20e60ff094fb57ac2b80744aba88c61635f85d109b29fcae776af05a65550bff.exe 27 PID 1804 wrote to memory of 964 1804 20e60ff094fb57ac2b80744aba88c61635f85d109b29fcae776af05a65550bff.exe 28 PID 1804 wrote to memory of 964 1804 20e60ff094fb57ac2b80744aba88c61635f85d109b29fcae776af05a65550bff.exe 28 PID 1804 wrote to memory of 964 1804 20e60ff094fb57ac2b80744aba88c61635f85d109b29fcae776af05a65550bff.exe 28 PID 1804 wrote to memory of 964 1804 20e60ff094fb57ac2b80744aba88c61635f85d109b29fcae776af05a65550bff.exe 28 PID 964 wrote to memory of 2032 964 nsutlc.exe 29 PID 964 wrote to memory of 2032 964 nsutlc.exe 29 PID 964 wrote to memory of 2032 964 nsutlc.exe 29 PID 964 wrote to memory of 2032 964 nsutlc.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\20e60ff094fb57ac2b80744aba88c61635f85d109b29fcae776af05a65550bff.exe"C:\Users\Admin\AppData\Local\Temp\20e60ff094fb57ac2b80744aba88c61635f85d109b29fcae776af05a65550bff.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s nsutlc.dll2⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:1752
-
-
C:\Program Files (x86)\Common Files\nsutlc.exe"C:\Program Files (x86)\Common Files\nsutlc.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files (x86)\Common Files\cvdbsy.bat""3⤵PID:2032
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136B
MD5a88848f2c9b62a491dc20accb31b0d76
SHA1450020d5f4dfc0f4e5fd93f09efe32ffcc8e28d5
SHA25626c020a12fa73cf4bc6a9ea59a760b3901cb6fca6626e4fb14862cb459504d65
SHA51280276842743389309ad266774e9d6c394c067f4b6113c2aaa1e5c6f5b5bb1d4b9307596026110f8d5b6aea375b487a2260839839659a37bff08dd57d0a3f86da
-
Filesize
411KB
MD552682b1ba2ddd6ac1518b03de4dc7f9e
SHA1dec67d7fc12ac0580729912d352a56b97bdab386
SHA2560ea82bb80cadf6c6479be459a25aca694504435c67f22d201603616b7be4cfa0
SHA5121d16b1740171eeb600e5ebe21fcba92862677aded345dd0a6683ef42edfc9b63fc84555e629f9360f4d7ee7a816c738edd9497fb9ba5071bd666630ea4d11aaa
-
Filesize
143KB
MD5bdc21f46b98cd4dc8a6b0f36ad79657e
SHA132e97cd080d8c70c3846bb899265be0edb966ed4
SHA256dcd88bbbf11b1a37a700a01ec85f336e1c6da8f05a07e0a6122c4cf3e1d46917
SHA512f5c97d2248177e710a6d2883023d17676b5da179b6a3c1b9f4beadae9d56f0c4560c3830936a7c0ce42d7370d3bb40db553f84a8fc7ee1d32614a574203d44e6
-
Filesize
143KB
MD5bdc21f46b98cd4dc8a6b0f36ad79657e
SHA132e97cd080d8c70c3846bb899265be0edb966ed4
SHA256dcd88bbbf11b1a37a700a01ec85f336e1c6da8f05a07e0a6122c4cf3e1d46917
SHA512f5c97d2248177e710a6d2883023d17676b5da179b6a3c1b9f4beadae9d56f0c4560c3830936a7c0ce42d7370d3bb40db553f84a8fc7ee1d32614a574203d44e6
-
Filesize
411KB
MD552682b1ba2ddd6ac1518b03de4dc7f9e
SHA1dec67d7fc12ac0580729912d352a56b97bdab386
SHA2560ea82bb80cadf6c6479be459a25aca694504435c67f22d201603616b7be4cfa0
SHA5121d16b1740171eeb600e5ebe21fcba92862677aded345dd0a6683ef42edfc9b63fc84555e629f9360f4d7ee7a816c738edd9497fb9ba5071bd666630ea4d11aaa
-
Filesize
143KB
MD5bdc21f46b98cd4dc8a6b0f36ad79657e
SHA132e97cd080d8c70c3846bb899265be0edb966ed4
SHA256dcd88bbbf11b1a37a700a01ec85f336e1c6da8f05a07e0a6122c4cf3e1d46917
SHA512f5c97d2248177e710a6d2883023d17676b5da179b6a3c1b9f4beadae9d56f0c4560c3830936a7c0ce42d7370d3bb40db553f84a8fc7ee1d32614a574203d44e6
-
Filesize
143KB
MD5bdc21f46b98cd4dc8a6b0f36ad79657e
SHA132e97cd080d8c70c3846bb899265be0edb966ed4
SHA256dcd88bbbf11b1a37a700a01ec85f336e1c6da8f05a07e0a6122c4cf3e1d46917
SHA512f5c97d2248177e710a6d2883023d17676b5da179b6a3c1b9f4beadae9d56f0c4560c3830936a7c0ce42d7370d3bb40db553f84a8fc7ee1d32614a574203d44e6