Analysis
-
max time kernel
117s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-10-2022 02:10
Static task
static1
Behavioral task
behavioral1
Sample
b61ccf17f0fc2dc4b8f8aeaca7d3fafa0c413a8bba10a9597253544154471f5c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b61ccf17f0fc2dc4b8f8aeaca7d3fafa0c413a8bba10a9597253544154471f5c.exe
Resource
win10v2004-20220812-en
Errors
General
-
Target
b61ccf17f0fc2dc4b8f8aeaca7d3fafa0c413a8bba10a9597253544154471f5c.exe
-
Size
244KB
-
MD5
6f5565d772e06695dc6f52f271671a12
-
SHA1
9fc978b9822cc0350fb6dfc7a9fc5bc152bf2350
-
SHA256
b61ccf17f0fc2dc4b8f8aeaca7d3fafa0c413a8bba10a9597253544154471f5c
-
SHA512
5ec78bc18d98ada3e22ef629baab748bfab143672987a7c7b16d468bf8d3ab062126a95df3ac0e6b4ad4f53a71897b74ae856dcc5665cc7e82aad23f5dd8c11f
-
SSDEEP
3072:nwJIh/jU9dLhz1BZn2BwRJcb02UcJFnGQXcpI0JHuAEKHWNdm:nLCh/Zn2BwRJcbScJFt30hHEK2Ndm
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1504 yfm.exe -
Sets DLL path for service in the registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Iprip\Parameters\ServiceDll = "C:\\WINDOWS\\SYSTEM32\\liprip.dll" yfm.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Iprip\Parameters\ServiceDll = "C:\\Windows\\system32\\liprip.dll" svchost.exe -
Loads dropped DLL 4 IoCs
pid Process 944 b61ccf17f0fc2dc4b8f8aeaca7d3fafa0c413a8bba10a9597253544154471f5c.exe 944 b61ccf17f0fc2dc4b8f8aeaca7d3fafa0c413a8bba10a9597253544154471f5c.exe 1312 svchost.exe 1312 svchost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\repst = "C:\\Windows\\system32\\iprep.exe" svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\ svchost.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{BF50AC63-19DA-487E-AD4A-0B452D823B59}\ svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{BF50AC63-19DA-487E-AD4A-0B452D823B59}\ svchost.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\fsutk.dll b61ccf17f0fc2dc4b8f8aeaca7d3fafa0c413a8bba10a9597253544154471f5c.exe File created C:\WINDOWS\SysWOW64\liprip.dll yfm.exe File opened for modification C:\Windows\SysWOW64\fsutk.dll svchost.exe File created C:\Windows\SysWOW64\iprep.exe svchost.exe -
Modifies data under HKEY_USERS 49 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion svchost.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{BF50AC63-19DA-487E-AD4A-0B452D823B59}\Flags = "0" svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Ext svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{BF50AC63-19DA-487E-AD4A-0B452D823B59}\Version = "*" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Autodesk\AutoCAD\R17.0 svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{BF50AC63-19DA-487E-AD4A-0B452D823B59} svchost.exe Key created \REGISTRY\USER\S-1-5-18 svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Autodesk\AutoCAD\R16.1 svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Ext svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Autodesk\AutoCAD\R18.0 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{BF50AC63-19DA-487E-AD4A-0B452D823B59}\ svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{BF50AC63-19DA-487E-AD4A-0B452D823B59}\ svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{BF50AC63-19DA-487E-AD4A-0B452D823B59}\Version = "*" svchost.exe Key created \REGISTRY\USER\S-1-5-19 svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{BF50AC63-19DA-487E-AD4A-0B452D823B59}\ svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Autodesk\AutoCAD svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{BF50AC63-19DA-487E-AD4A-0B452D823B59} svchost.exe Key created \REGISTRY\USER\S-1-5-20 svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Ext\Settings svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{BF50AC63-19DA-487E-AD4A-0B452D823B59} svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{BF50AC63-19DA-487E-AD4A-0B452D823B59}\ svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Autodesk\AutoCAD\R16.0 svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{BF50AC63-19DA-487E-AD4A-0B452D823B59}\Flags = "0" svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{BF50AC63-19DA-487E-AD4A-0B452D823B59}\ svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Ext\Settings svchost.exe Set value (str) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{BF50AC63-19DA-487E-AD4A-0B452D823B59}\ svchost.exe Set value (str) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{BF50AC63-19DA-487E-AD4A-0B452D823B59}\Version = "*" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Autodesk svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{BF50AC63-19DA-487E-AD4A-0B452D823B59}\ svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{BF50AC63-19DA-487E-AD4A-0B452D823B59}\Flags = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Autodesk\AutoCAD\R17.1 svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Autodesk\AutoCAD\R17.2 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{BF50AC63-19DA-487E-AD4A-0B452D823B59} svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Autodesk\AutoCAD\R16.2 svchost.exe -
Modifies registry class 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BF50AC63-19DA-487E-AD4A-0B452D823B59}\VersionIndependentProgID\ = "IEHlprObj.IEHlprObj" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IEHlprObj.IEHlprObj\ = "QuickFlash" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IEHlprObj.IEHlprObj\CurVer\ = "IEHlprObj.IEHlprObj.1" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IEHlprObj.IEHlprObj.1\CLSID\ = "{BF50AC63-19DA-487E-AD4A-0B452D823B59}" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BF50AC63-19DA-487E-AD4A-0B452D823B59}\InprocServer32\ThreadingModel = "Apartment" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BF50AC63-19DA-487E-AD4A-0B452D823B59}\Programmable\ svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BF50AC63-19DA-487E-AD4A-0B452D823B59}\VersionIndependentProgID\ svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IEHlprObj.IEHlprObj.1\ = "QuickFlash" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0E5CBF21-D15F-11d0-8301-00AA005B4383}\InProcServer32\ svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AF604EFE-8897-11D1-B944-00A0C90312E1}\InProcServer32\ svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BF50AC63-19DA-487E-AD4A-0B452D823B59}\ProgID\ svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IEHlprObj.IEHlprObj\ svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IEHlprObj.IEHlprObj\CurVer\ svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IEHlprObj.IEHlprObj.1\CLSID\ svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BF50AC63-19DA-487E-AD4A-0B452D823B59}\InprocServer32\ = "C:\\Windows\\SysWow64\\fsutk.dll" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BF50AC63-19DA-487E-AD4A-0B452D823B59}\ svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BF50AC63-19DA-487E-AD4A-0B452D823B59}\ = "QuickFlash" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BF50AC63-19DA-487E-AD4A-0B452D823B59}\ProgID\ = "IEHlprObj.IEHlprObj.1" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IEHlprObj.IEHlprObj.1\ svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AF604EFE-8897-11D1-B944-00A0C90312E1}\InProcServer32\ yfm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BF50AC63-19DA-487E-AD4A-0B452D823B59}\InprocServer32\ svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BF50AC63-19DA-487E-AD4A-0B452D823B59}\Programmable\ svchost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 1312 svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 944 b61ccf17f0fc2dc4b8f8aeaca7d3fafa0c413a8bba10a9597253544154471f5c.exe 1504 yfm.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 944 wrote to memory of 1504 944 b61ccf17f0fc2dc4b8f8aeaca7d3fafa0c413a8bba10a9597253544154471f5c.exe 28 PID 944 wrote to memory of 1504 944 b61ccf17f0fc2dc4b8f8aeaca7d3fafa0c413a8bba10a9597253544154471f5c.exe 28 PID 944 wrote to memory of 1504 944 b61ccf17f0fc2dc4b8f8aeaca7d3fafa0c413a8bba10a9597253544154471f5c.exe 28 PID 944 wrote to memory of 1504 944 b61ccf17f0fc2dc4b8f8aeaca7d3fafa0c413a8bba10a9597253544154471f5c.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b61ccf17f0fc2dc4b8f8aeaca7d3fafa0c413a8bba10a9597253544154471f5c.exe"C:\Users\Admin\AppData\Local\Temp\b61ccf17f0fc2dc4b8f8aeaca7d3fafa0c413a8bba10a9597253544154471f5c.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Users\Admin\AppData\Local\Temp\yfm.exe"C:\Users\Admin\AppData\Local\Temp\yfm.exe"2⤵
- Executes dropped EXE
- Sets DLL path for service in the registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1504
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Sets DLL path for service in the registry
- Loads dropped DLL
- Adds Run key to start application
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1312
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:1588
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:432
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD5b4082e9abd8870e6648299c9d9400fdb
SHA120f0c4b71af3bc4f7575ec18d55e80b44d87f804
SHA256f3c9fa1648a6bdafaffa121cdd8780aae8e13af3b9c7fad4ebf2998db8e27df7
SHA512ff7fe71f28ec98896fcedcce9d76e4d5a055eac3bdf9db938c913085c351c4cd2612bc61e3ca10d60d93d258697a961da2add6f5d3aff9685a7cf9ac2c43ac8d
-
Filesize
116KB
MD5d7e31cf0efcfa901edc5ffffad2ae2dd
SHA1d3d0f50f795e703a7cf25cb46544496984bb075a
SHA2560797cf86c6688f86db529bdb23cc959add9e6b92922132fc3eb2d1516bef0959
SHA512932ca49084e94f4f72c4a9c3ffe4b584e8fe9568918a69e0e80ae443b99c3a2aa007415ec5a2ef348cef408f896db0e0988fd537d6438f75475b79a9a430cc1b
-
Filesize
220KB
MD541a1f15a2fdd68b8da022d166db428d4
SHA196ca59456498ee2ece302f0196ae4641a3ba0a1a
SHA2569e67b46fe1c222f4a1a016395b640cd578da0c5321d83c2acbc8bd8972888405
SHA5127ace3e4c7e7d6c25f7048a8f8500b72e91f27663531c4dbae5df8824d78efee9c1b7b55df92d4cbf98efa3cfae5688dd7b16eee29020dd35cebe59c0dfcdae98
-
Filesize
84KB
MD5757654f388fbf71cc3fb59bf59f38f03
SHA17624e94dbdf32bf2aeb16f715ba5604e3bdd39a0
SHA256bfa38c01611eff9b4a80caa5e70e9f0df519b2aa010de7e9c6a986c37e296e88
SHA512717e9f47e94f80dfc409445b2a596c2c5199669b6d11cb4a7b6dced5d5b65f1cc87bf17f0f6d443ed288844da5bdea938c77680a10a332131fd0f554d8004f95
-
Filesize
20KB
MD5b4082e9abd8870e6648299c9d9400fdb
SHA120f0c4b71af3bc4f7575ec18d55e80b44d87f804
SHA256f3c9fa1648a6bdafaffa121cdd8780aae8e13af3b9c7fad4ebf2998db8e27df7
SHA512ff7fe71f28ec98896fcedcce9d76e4d5a055eac3bdf9db938c913085c351c4cd2612bc61e3ca10d60d93d258697a961da2add6f5d3aff9685a7cf9ac2c43ac8d
-
Filesize
20KB
MD5b4082e9abd8870e6648299c9d9400fdb
SHA120f0c4b71af3bc4f7575ec18d55e80b44d87f804
SHA256f3c9fa1648a6bdafaffa121cdd8780aae8e13af3b9c7fad4ebf2998db8e27df7
SHA512ff7fe71f28ec98896fcedcce9d76e4d5a055eac3bdf9db938c913085c351c4cd2612bc61e3ca10d60d93d258697a961da2add6f5d3aff9685a7cf9ac2c43ac8d
-
Filesize
116KB
MD5d7e31cf0efcfa901edc5ffffad2ae2dd
SHA1d3d0f50f795e703a7cf25cb46544496984bb075a
SHA2560797cf86c6688f86db529bdb23cc959add9e6b92922132fc3eb2d1516bef0959
SHA512932ca49084e94f4f72c4a9c3ffe4b584e8fe9568918a69e0e80ae443b99c3a2aa007415ec5a2ef348cef408f896db0e0988fd537d6438f75475b79a9a430cc1b
-
Filesize
84KB
MD5757654f388fbf71cc3fb59bf59f38f03
SHA17624e94dbdf32bf2aeb16f715ba5604e3bdd39a0
SHA256bfa38c01611eff9b4a80caa5e70e9f0df519b2aa010de7e9c6a986c37e296e88
SHA512717e9f47e94f80dfc409445b2a596c2c5199669b6d11cb4a7b6dced5d5b65f1cc87bf17f0f6d443ed288844da5bdea938c77680a10a332131fd0f554d8004f95