Analysis
-
max time kernel
178s -
max time network
160s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 14:25
Behavioral task
behavioral1
Sample
39bdc80974f59b6d3b892d15a83f65ed.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
39bdc80974f59b6d3b892d15a83f65ed.exe
Resource
win10v2004-20231215-en
General
-
Target
39bdc80974f59b6d3b892d15a83f65ed.exe
-
Size
13KB
-
MD5
39bdc80974f59b6d3b892d15a83f65ed
-
SHA1
4679f8509987ae0e9f82c94b38357374b68ed27e
-
SHA256
797c3d51bb7e75222b51bf928f58781c55e92ba1fd654c310d852fb447c30322
-
SHA512
4e6e624aa624f786eea81f3e7ed4fc0e01ae790fe4ce3764352d296773a9c0a2f66012a8c03cb064d1ab59897636ed56a35b8e3cfc4ba124209f949e28d9182f
-
SSDEEP
384:p9/kjXIS4GmRH4eGXWhpLbxEUanRNFLuGQh/iRvxwvKlpIt:pejzTmV4mpLaRXuGtxms
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\C:\Windows\Fonts\supkvwhj.dll = "{4F72F83A-1C16-444C-8821-D01FF4759555}" 39bdc80974f59b6d3b892d15a83f65ed.exe -
Deletes itself 1 IoCs
pid Process 2148 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1716 39bdc80974f59b6d3b892d15a83f65ed.exe 2188 regsvr32.exe -
resource yara_rule behavioral1/memory/1716-1-0x0000000000400000-0x0000000000410000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Fonts\supkvwhj.tmp 39bdc80974f59b6d3b892d15a83f65ed.exe File opened for modification C:\Windows\Fonts\SG09124.dat 39bdc80974f59b6d3b892d15a83f65ed.exe -
Modifies registry class 46 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{558EDF92-57A1-438F-B8FF-97A8FE12F636}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{558EDF92-57A1-438F-B8FF-97A8FE12F636}\1.0\HELPDIR\ = "C:\\Windows\\Fonts" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Sg.sgatl.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Sg.sgatl\ = "sgatl Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4F72F83A-1C16-444C-8821-D01FF4759555}\ = "sgatl Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4F72F83A-1C16-444C-8821-D01FF4759555}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{558EDF92-57A1-438F-B8FF-97A8FE12F636}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{558EDF92-57A1-438F-B8FF-97A8FE12F636}\1.0\HELPDIR regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CDB466D0-56C2-4555-B4FA-3CF71C946FB8}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Sg.sgatl\CurVer\ = "Sg.sgatl.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4F72F83A-1C16-444C-8821-D01FF4759555}\TypeLib\ = "{558EDF92-57A1-438F-B8FF-97A8FE12F636}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{558EDF92-57A1-438F-B8FF-97A8FE12F636}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{558EDF92-57A1-438F-B8FF-97A8FE12F636}\1.0\ = "sg 1.0 Type Library" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{558EDF92-57A1-438F-B8FF-97A8FE12F636}\1.0\0\win32\ = "C:\\Windows\\Fonts\\supkvwhj.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{CDB466D0-56C2-4555-B4FA-3CF71C946FB8}\ = "Isgatl" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{CDB466D0-56C2-4555-B4FA-3CF71C946FB8}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CDB466D0-56C2-4555-B4FA-3CF71C946FB8}\ = "Isgatl" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Sg.sgatl.1\CLSID\ = "{4F72F83A-1C16-444C-8821-D01FF4759555}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Sg.sgatl regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4F72F83A-1C16-444C-8821-D01FF4759555}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4F72F83A-1C16-444C-8821-D01FF4759555}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{558EDF92-57A1-438F-B8FF-97A8FE12F636}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Sg.sgatl\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4F72F83A-1C16-444C-8821-D01FF4759555}\ProgID\ = "Sg.sgatl.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{CDB466D0-56C2-4555-B4FA-3CF71C946FB8} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CDB466D0-56C2-4555-B4FA-3CF71C946FB8} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{CDB466D0-56C2-4555-B4FA-3CF71C946FB8}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{CDB466D0-56C2-4555-B4FA-3CF71C946FB8}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CDB466D0-56C2-4555-B4FA-3CF71C946FB8}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CDB466D0-56C2-4555-B4FA-3CF71C946FB8}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CDB466D0-56C2-4555-B4FA-3CF71C946FB8}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{CDB466D0-56C2-4555-B4FA-3CF71C946FB8}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Sg.sgatl.1\ = "sgatl Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Sg.sgatl\CLSID\ = "{4F72F83A-1C16-444C-8821-D01FF4759555}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4F72F83A-1C16-444C-8821-D01FF4759555}\VersionIndependentProgID\ = "Sg.sgatl" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4F72F83A-1C16-444C-8821-D01FF4759555}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{CDB466D0-56C2-4555-B4FA-3CF71C946FB8}\TypeLib\ = "{558EDF92-57A1-438F-B8FF-97A8FE12F636}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Sg.sgatl.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4F72F83A-1C16-444C-8821-D01FF4759555} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4F72F83A-1C16-444C-8821-D01FF4759555}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4F72F83A-1C16-444C-8821-D01FF4759555}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CDB466D0-56C2-4555-B4FA-3CF71C946FB8}\TypeLib\ = "{558EDF92-57A1-438F-B8FF-97A8FE12F636}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Sg.sgatl\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4F72F83A-1C16-444C-8821-D01FF4759555}\InprocServer32\ = "C:\\Windows\\Fonts\\supkvwhj.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{558EDF92-57A1-438F-B8FF-97A8FE12F636} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{558EDF92-57A1-438F-B8FF-97A8FE12F636}\1.0\0 regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1716 39bdc80974f59b6d3b892d15a83f65ed.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1716 39bdc80974f59b6d3b892d15a83f65ed.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1716 39bdc80974f59b6d3b892d15a83f65ed.exe 1716 39bdc80974f59b6d3b892d15a83f65ed.exe 1716 39bdc80974f59b6d3b892d15a83f65ed.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1716 wrote to memory of 2188 1716 39bdc80974f59b6d3b892d15a83f65ed.exe 28 PID 1716 wrote to memory of 2188 1716 39bdc80974f59b6d3b892d15a83f65ed.exe 28 PID 1716 wrote to memory of 2188 1716 39bdc80974f59b6d3b892d15a83f65ed.exe 28 PID 1716 wrote to memory of 2188 1716 39bdc80974f59b6d3b892d15a83f65ed.exe 28 PID 1716 wrote to memory of 2188 1716 39bdc80974f59b6d3b892d15a83f65ed.exe 28 PID 1716 wrote to memory of 2188 1716 39bdc80974f59b6d3b892d15a83f65ed.exe 28 PID 1716 wrote to memory of 2188 1716 39bdc80974f59b6d3b892d15a83f65ed.exe 28 PID 1716 wrote to memory of 2148 1716 39bdc80974f59b6d3b892d15a83f65ed.exe 29 PID 1716 wrote to memory of 2148 1716 39bdc80974f59b6d3b892d15a83f65ed.exe 29 PID 1716 wrote to memory of 2148 1716 39bdc80974f59b6d3b892d15a83f65ed.exe 29 PID 1716 wrote to memory of 2148 1716 39bdc80974f59b6d3b892d15a83f65ed.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\39bdc80974f59b6d3b892d15a83f65ed.exe"C:\Users\Admin\AppData\Local\Temp\39bdc80974f59b6d3b892d15a83f65ed.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Windows\Fonts\supkvwhj.dll"2⤵
- Loads dropped DLL
- Modifies registry class
PID:2188
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\39BDC8~1.EXE > nul2⤵
- Deletes itself
PID:2148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD59db41596c9d033be8f1bbc599316b5f4
SHA18982c6e20d88fcb0994fb505f7b124e14d315ae4
SHA256711f43c374335a7b00abc248d4f28477e1bf0760e2b8c3f2345b65cd1bf39f71
SHA512b9e6b2166419f4caa5d38db1d66ee62c0a43213bcb9970f900b91ddb7a424c4733418241e715732653d00042df859d2a7d392f146d0cf3dc3d8e253789ed08c7