Analysis
-
max time kernel
146s -
max time network
73s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28/12/2023, 21:54
Behavioral task
behavioral1
Sample
fad992261c9fc6964804a087b8ad2ce8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
fad992261c9fc6964804a087b8ad2ce8.exe
Resource
win10v2004-20231215-en
General
-
Target
fad992261c9fc6964804a087b8ad2ce8.exe
-
Size
16KB
-
MD5
fad992261c9fc6964804a087b8ad2ce8
-
SHA1
250b57c1828b172dbafd15c97b8b8036441c6d63
-
SHA256
42a589f35ce139a85ccb74e60f8cadfd67d22cafa650ced3383fced97016478d
-
SHA512
7a1bcbfe8779a05fb8c13b351e656bac5fbd4731a5385404c4b8b97ab22f12727841f9a093854e33f31bb6d329c545c63a476188f21832a7d6000e7dd2c24c26
-
SSDEEP
384:qXfbEDC1603M9ONHYE/JHfeoUpCt82jxldpUxibv:qXfbEeYUN42/eBM1FUxib
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\C:\Windows\fonts\zjhgpyzu.nls = "{12757779-277E-4C3D-898D-2602BC5A3993}" fad992261c9fc6964804a087b8ad2ce8.exe -
Loads dropped DLL 2 IoCs
pid Process 4876 fad992261c9fc6964804a087b8ad2ce8.exe 3732 regsvr32.exe -
resource yara_rule behavioral2/memory/4876-0-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/4876-9-0x0000000000400000-0x0000000000414000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\fonts\zjhgpyzu.tmp fad992261c9fc6964804a087b8ad2ce8.exe File opened for modification C:\Windows\fonts\gbjxsj01.nls fad992261c9fc6964804a087b8ad2ce8.exe -
Modifies registry class 46 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{AA9381CD-8285-433D-9812-C0332F6D5C86}\ = "Igbjxatl" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{AA9381CD-8285-433D-9812-C0332F6D5C86}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AA9381CD-8285-433D-9812-C0332F6D5C86}\ = "Igbjxatl" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AA9381CD-8285-433D-9812-C0332F6D5C86}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B02EB679-06C3-4F82-B0DD-F55DCB76B582}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B02EB679-06C3-4F82-B0DD-F55DCB76B582}\1.0\HELPDIR\ = "C:\\Windows\\fonts" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{AA9381CD-8285-433D-9812-C0332F6D5C86} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B02EB679-06C3-4F82-B0DD-F55DCB76B582}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B02EB679-06C3-4F82-B0DD-F55DCB76B582}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{AA9381CD-8285-433D-9812-C0332F6D5C86}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\JXSJ.gbjxatl regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\JXSJ.gbjxatl\ = "gbjxatl Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{12757779-277E-4C3D-898D-2602BC5A3993}\TypeLib\ = "{B02EB679-06C3-4F82-B0DD-F55DCB76B582}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B02EB679-06C3-4F82-B0DD-F55DCB76B582}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{AA9381CD-8285-433D-9812-C0332F6D5C86}\TypeLib\ = "{B02EB679-06C3-4F82-B0DD-F55DCB76B582}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AA9381CD-8285-433D-9812-C0332F6D5C86} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\JXSJ.gbjxatl\CurVer\ = "JXSJ.gbjxatl.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{12757779-277E-4C3D-898D-2602BC5A3993}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B02EB679-06C3-4F82-B0DD-F55DCB76B582}\1.0\ = "JXSJ 1.0 Type Library" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\JXSJ.gbjxatl.1\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\JXSJ.gbjxatl.1\CLSID\ = "{12757779-277E-4C3D-898D-2602BC5A3993}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{12757779-277E-4C3D-898D-2602BC5A3993}\ = "gbjxatl Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B02EB679-06C3-4F82-B0DD-F55DCB76B582}\1.0\FLAGS\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B02EB679-06C3-4F82-B0DD-F55DCB76B582}\1.0\0\win32\ = "C:\\Windows\\fonts\\zjhgpyzu.nls" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{AA9381CD-8285-433D-9812-C0332F6D5C86}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\JXSJ.gbjxatl\CLSID\ = "{12757779-277E-4C3D-898D-2602BC5A3993}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{12757779-277E-4C3D-898D-2602BC5A3993}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{12757779-277E-4C3D-898D-2602BC5A3993}\ProgID\ = "JXSJ.gbjxatl.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B02EB679-06C3-4F82-B0DD-F55DCB76B582} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B02EB679-06C3-4F82-B0DD-F55DCB76B582}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{AA9381CD-8285-433D-9812-C0332F6D5C86}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AA9381CD-8285-433D-9812-C0332F6D5C86}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AA9381CD-8285-433D-9812-C0332F6D5C86}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\JXSJ.gbjxatl\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\JXSJ.gbjxatl\CurVer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{12757779-277E-4C3D-898D-2602BC5A3993}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AA9381CD-8285-433D-9812-C0332F6D5C86}\TypeLib\ = "{B02EB679-06C3-4F82-B0DD-F55DCB76B582}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{12757779-277E-4C3D-898D-2602BC5A3993}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{12757779-277E-4C3D-898D-2602BC5A3993}\VersionIndependentProgID\ = "JXSJ.gbjxatl" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{12757779-277E-4C3D-898D-2602BC5A3993}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{12757779-277E-4C3D-898D-2602BC5A3993}\InprocServer32\ = "C:\\Windows\\fonts\\zjhgpyzu.nls" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\JXSJ.gbjxatl.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\JXSJ.gbjxatl.1\ = "gbjxatl Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{12757779-277E-4C3D-898D-2602BC5A3993} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{12757779-277E-4C3D-898D-2602BC5A3993}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AA9381CD-8285-433D-9812-C0332F6D5C86}\ProxyStubClsid32 regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4876 fad992261c9fc6964804a087b8ad2ce8.exe 4876 fad992261c9fc6964804a087b8ad2ce8.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4876 fad992261c9fc6964804a087b8ad2ce8.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4876 fad992261c9fc6964804a087b8ad2ce8.exe 4876 fad992261c9fc6964804a087b8ad2ce8.exe 4876 fad992261c9fc6964804a087b8ad2ce8.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4876 wrote to memory of 3732 4876 fad992261c9fc6964804a087b8ad2ce8.exe 27 PID 4876 wrote to memory of 3732 4876 fad992261c9fc6964804a087b8ad2ce8.exe 27 PID 4876 wrote to memory of 3732 4876 fad992261c9fc6964804a087b8ad2ce8.exe 27 PID 4876 wrote to memory of 1528 4876 fad992261c9fc6964804a087b8ad2ce8.exe 101 PID 4876 wrote to memory of 1528 4876 fad992261c9fc6964804a087b8ad2ce8.exe 101 PID 4876 wrote to memory of 1528 4876 fad992261c9fc6964804a087b8ad2ce8.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\fad992261c9fc6964804a087b8ad2ce8.exe"C:\Users\Admin\AppData\Local\Temp\fad992261c9fc6964804a087b8ad2ce8.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Windows\fonts\zjhgpyzu.nls"2⤵
- Loads dropped DLL
- Modifies registry class
PID:3732
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\FAD992~1.EXE > nul2⤵PID:1528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD56879d32cbf084d582199d6e7e3eb97cc
SHA18c7985ca2425139fa920936920830728423b76eb
SHA2565ea833fad34b428db53f52614b38084c606502d5d059517ef77e2d1f9ab01e99
SHA5121b5f6f8cf730a08100715b4eca33baea57bb8a1b41d8efc539ccb5177360905aa7776e2911e5b63c6fa7bb4518cd60d35c66861bc74185b0f826bce0685529e3