Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 19:04
Static task
static1
Behavioral task
behavioral1
Sample
368dd94296c17999b7cb582b4f35e978.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
368dd94296c17999b7cb582b4f35e978.exe
Resource
win10v2004-20231215-en
General
-
Target
368dd94296c17999b7cb582b4f35e978.exe
-
Size
2.7MB
-
MD5
368dd94296c17999b7cb582b4f35e978
-
SHA1
2974e25a1f1bb109bce2cccff088d5f05b5fc22b
-
SHA256
72823ff5ae77ea28fc4a7437e93157dc850ee504b58ae149b43ecfb6eb1417ee
-
SHA512
73eb4b76bf5f81eedc961ebf0fc8b4e4bbdcd25d0e3e17e54a2ee7313d89e553848cdd0965c52f264c247403ed27ab1b8d678d836ccd0892ca1fca14cf9a0c98
-
SSDEEP
49152:Ox3txmK+FutA+5sk9JZ3ZwqAH8DYRIEHy97O1JmociggmtOsyEuk0ZfS:Ox3txmZUtA+O69YRriSuouLRuk0Zq
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Program Files (x86)\\Privacy components\\pc.exe" 368dd94296c17999b7cb582b4f35e978.exe -
Executes dropped EXE 1 IoCs
pid Process 1640 agent.exe -
Loads dropped DLL 1 IoCs
pid Process 1796 regsvr32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\agent.exe = "C:\\Program Files (x86)\\Privacy components\\agent.exe" 368dd94296c17999b7cb582b4f35e978.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{D032570A-5F63-4812-A094-87D007C23012} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{D032570A-5F63-4812-A094-87D007C23012}\ regsvr32.exe -
Drops file in Program Files directory 24 IoCs
description ioc Process File created C:\Program Files (x86)\Privacy components\tools\sc\libeay32.dll 368dd94296c17999b7cb582b4f35e978.exe File created C:\Program Files (x86)\Privacy components\tools\sc\tapinstall.exe 368dd94296c17999b7cb582b4f35e978.exe File created C:\Program Files (x86)\Privacy components\faq\guide.html 368dd94296c17999b7cb582b4f35e978.exe File created C:\Program Files (x86)\Privacy components\faq\images\gimg10.jpg 368dd94296c17999b7cb582b4f35e978.exe File created C:\Program Files (x86)\Privacy components\faq\images\gimg7.jpg 368dd94296c17999b7cb582b4f35e978.exe File created C:\Program Files (x86)\Privacy components\faq\images\gimg8.jpg 368dd94296c17999b7cb582b4f35e978.exe File created C:\Program Files (x86)\Privacy components\faq\images\gimg9.jpg 368dd94296c17999b7cb582b4f35e978.exe File created C:\Program Files (x86)\Privacy components\tools\sc\OemWin2k.inf 368dd94296c17999b7cb582b4f35e978.exe File created C:\Program Files (x86)\Privacy components\faq\images\gimg3.jpg 368dd94296c17999b7cb582b4f35e978.exe File created C:\Program Files (x86)\Privacy components\faq\images\gimg4.jpg 368dd94296c17999b7cb582b4f35e978.exe File created C:\Program Files (x86)\Privacy components\faq\images\gimg5.jpg 368dd94296c17999b7cb582b4f35e978.exe File created C:\Program Files (x86)\Privacy components\sounds\3.mp3 368dd94296c17999b7cb582b4f35e978.exe File created C:\Program Files (x86)\Privacy components\tools\sc\ca.crt 368dd94296c17999b7cb582b4f35e978.exe File created C:\Program Files (x86)\Privacy components\tools\sc\libssl32.dll 368dd94296c17999b7cb582b4f35e978.exe File created C:\Program Files (x86)\Privacy components\tools\sc\openvpn.exe 368dd94296c17999b7cb582b4f35e978.exe File created C:\Program Files (x86)\Privacy components\tools\sp\sp.dll 368dd94296c17999b7cb582b4f35e978.exe File created C:\Program Files (x86)\Privacy components\faq\images\gimg1.jpg 368dd94296c17999b7cb582b4f35e978.exe File created C:\Program Files (x86)\Privacy components\faq\images\gimg2.jpg 368dd94296c17999b7cb582b4f35e978.exe File created C:\Program Files (x86)\Privacy components\uninstall.exe 368dd94296c17999b7cb582b4f35e978.exe File created C:\Program Files (x86)\Privacy components\agent.exe 368dd94296c17999b7cb582b4f35e978.exe File created C:\Program Files (x86)\Privacy components\tools\sc\tap0801.sys 368dd94296c17999b7cb582b4f35e978.exe File created C:\Program Files (x86)\Privacy components\sounds\1.mp3 368dd94296c17999b7cb582b4f35e978.exe File created C:\Program Files (x86)\Privacy components\faq\images\gimg6.jpg 368dd94296c17999b7cb582b4f35e978.exe File created C:\Program Files (x86)\Privacy components\pc.exe 368dd94296c17999b7cb582b4f35e978.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D032570A-5F63-4812-A094-87D007C23012} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D032570A-5F63-4812-A094-87D007C23012}\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sp.TIEAdvBHO\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sp.TIEAdvBHO\Clsid\ = "{D032570A-5F63-4812-A094-87D007C23012}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D032570A-5F63-4812-A094-87D007C23012}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D032570A-5F63-4812-A094-87D007C23012}\ProgID\ = "sp.TIEAdvBHO" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D032570A-5F63-4812-A094-87D007C23012}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D032570A-5F63-4812-A094-87D007C23012}\InprocServer32\ = "C:\\PROGRA~2\\PRIVAC~1\\tools\\sp\\sp.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D032570A-5F63-4812-A094-87D007C23012}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sp.TIEAdvBHO regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sp.TIEAdvBHO\Clsid regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1640 agent.exe 1640 agent.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1640 agent.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1640 agent.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1380 wrote to memory of 1640 1380 368dd94296c17999b7cb582b4f35e978.exe 32 PID 1380 wrote to memory of 1640 1380 368dd94296c17999b7cb582b4f35e978.exe 32 PID 1380 wrote to memory of 1640 1380 368dd94296c17999b7cb582b4f35e978.exe 32 PID 1380 wrote to memory of 1796 1380 368dd94296c17999b7cb582b4f35e978.exe 31 PID 1380 wrote to memory of 1796 1380 368dd94296c17999b7cb582b4f35e978.exe 31 PID 1380 wrote to memory of 1796 1380 368dd94296c17999b7cb582b4f35e978.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\368dd94296c17999b7cb582b4f35e978.exe"C:\Users\Admin\AppData\Local\Temp\368dd94296c17999b7cb582b4f35e978.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Program Files (x86)\Privacy components\tools\sp\sp.dll"2⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:1796
-
-
C:\Program Files (x86)\Privacy components\agent.exe"C:\Program Files (x86)\Privacy components\agent.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1640
-