Analysis
-
max time kernel
118s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
08/01/2024, 11:58
Static task
static1
Behavioral task
behavioral1
Sample
4b5f840d0381c90787577aec69ea7495.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4b5f840d0381c90787577aec69ea7495.exe
Resource
win10v2004-20231215-en
General
-
Target
4b5f840d0381c90787577aec69ea7495.exe
-
Size
248KB
-
MD5
4b5f840d0381c90787577aec69ea7495
-
SHA1
d4f8a9670c7b694efb9fa5162a3b3fff23accdaa
-
SHA256
b342aaf34701e2e7d38d09be6e95d6e5e71950ea1e6c88b0b4d8406f58f59d46
-
SHA512
1f213978c5124dc7c844fae6c81c5680261f53eafdecc20730e13dc61d17367f97ca6b18d77dd31c78841ecf5b75a26f3cf1106d5c64f980ab1d99df55df481d
-
SSDEEP
3072:nBLj8ixG7+Y4k3ZKE8z3/evEko/Oe7aTtXIRkLIYJxDBFya:nB3/07+Yt3ZKENvEBOe7aTt4uMYHdU
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" xxggyu.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xxggyu.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 5 2716 rundll32.exe -
Deletes itself 1 IoCs
pid Process 824 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1896 xxggyu.exe -
Loads dropped DLL 7 IoCs
pid Process 2128 regsvr32.exe 2716 rundll32.exe 2716 rundll32.exe 2716 rundll32.exe 2716 rundll32.exe 2244 4b5f840d0381c90787577aec69ea7495.exe 2244 4b5f840d0381c90787577aec69ea7495.exe -
Enumerates connected drives 3 TTPs 8 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: xxggyu.exe File opened (read-only) \??\J: xxggyu.exe File opened (read-only) \??\K: xxggyu.exe File opened (read-only) \??\L: xxggyu.exe File opened (read-only) \??\M: xxggyu.exe File opened (read-only) \??\E: xxggyu.exe File opened (read-only) \??\G: xxggyu.exe File opened (read-only) \??\H: xxggyu.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\vskp3.dll 4b5f840d0381c90787577aec69ea7495.exe File created C:\Windows\SysWOW64\dllcache\vskp3.dll 4b5f840d0381c90787577aec69ea7495.exe File created C:\Windows\SysWOW64\vskpj.dll 4b5f840d0381c90787577aec69ea7495.exe File created C:\Windows\SysWOW64\xxggyu.exe 4b5f840d0381c90787577aec69ea7495.exe -
Modifies registry class 46 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F5CC5892-346B-4F19-B304-307DD1EF1A45}\ = "IATlMy" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TestAtl.ATlMy\CLSID\ = "{C4560D12-CE25-4A2E-A5D4-B5070FCBE282}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C4560D12-CE25-4A2E-A5D4-B5070FCBE282}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CE673B02-973C-4268-A819-DA005C782B5D}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CE673B02-973C-4268-A819-DA005C782B5D}\1.0\FLAGS\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CE673B02-973C-4268-A819-DA005C782B5D}\1.0\HELPDIR\ = "C:\\Windows\\System32" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F5CC5892-346B-4F19-B304-307DD1EF1A45}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F5CC5892-346B-4F19-B304-307DD1EF1A45}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TestAtl.ATlMy.1\ = "ATlMy Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TestAtl.ATlMy\ = "ATlMy Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C4560D12-CE25-4A2E-A5D4-B5070FCBE282}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TestAtl.ATlMy\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F5CC5892-346B-4F19-B304-307DD1EF1A45}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F5CC5892-346B-4F19-B304-307DD1EF1A45}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F5CC5892-346B-4F19-B304-307DD1EF1A45} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F5CC5892-346B-4F19-B304-307DD1EF1A45}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TestAtl.ATlMy.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C4560D12-CE25-4A2E-A5D4-B5070FCBE282} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CE673B02-973C-4268-A819-DA005C782B5D}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F5CC5892-346B-4F19-B304-307DD1EF1A45}\TypeLib\ = "{CE673B02-973C-4268-A819-DA005C782B5D}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F5CC5892-346B-4F19-B304-307DD1EF1A45}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CE673B02-973C-4268-A819-DA005C782B5D}\1.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CE673B02-973C-4268-A819-DA005C782B5D}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CE673B02-973C-4268-A819-DA005C782B5D}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\vskpj.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C4560D12-CE25-4A2E-A5D4-B5070FCBE282}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C4560D12-CE25-4A2E-A5D4-B5070FCBE282}\VersionIndependentProgID\ = "TestAtl.ATlMy" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C4560D12-CE25-4A2E-A5D4-B5070FCBE282}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F5CC5892-346B-4F19-B304-307DD1EF1A45}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TestAtl.ATlMy.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TestAtl.ATlMy.1\CLSID\ = "{C4560D12-CE25-4A2E-A5D4-B5070FCBE282}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TestAtl.ATlMy\CurVer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C4560D12-CE25-4A2E-A5D4-B5070FCBE282}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C4560D12-CE25-4A2E-A5D4-B5070FCBE282}\TypeLib\ = "{CE673B02-973C-4268-A819-DA005C782B5D}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CE673B02-973C-4268-A819-DA005C782B5D} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CE673B02-973C-4268-A819-DA005C782B5D}\1.0\ = "testAtl 1.0 Type Library" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C4560D12-CE25-4A2E-A5D4-B5070FCBE282}\ = "ATlMy Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C4560D12-CE25-4A2E-A5D4-B5070FCBE282}\ProgID\ = "TestAtl.ATlMy.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C4560D12-CE25-4A2E-A5D4-B5070FCBE282}\InprocServer32\ = "C:\\Windows\\SysWow64\\vskpj.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CE673B02-973C-4268-A819-DA005C782B5D}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F5CC5892-346B-4F19-B304-307DD1EF1A45}\ = "IATlMy" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F5CC5892-346B-4F19-B304-307DD1EF1A45}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F5CC5892-346B-4F19-B304-307DD1EF1A45} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F5CC5892-346B-4F19-B304-307DD1EF1A45}\TypeLib\ = "{CE673B02-973C-4268-A819-DA005C782B5D}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TestAtl.ATlMy regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TestAtl.ATlMy\CurVer\ = "TestAtl.ATlMy.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C4560D12-CE25-4A2E-A5D4-B5070FCBE282}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2244 4b5f840d0381c90787577aec69ea7495.exe 2244 4b5f840d0381c90787577aec69ea7495.exe 2716 rundll32.exe 2716 rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2244 4b5f840d0381c90787577aec69ea7495.exe 1896 xxggyu.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2128 2244 4b5f840d0381c90787577aec69ea7495.exe 28 PID 2244 wrote to memory of 2128 2244 4b5f840d0381c90787577aec69ea7495.exe 28 PID 2244 wrote to memory of 2128 2244 4b5f840d0381c90787577aec69ea7495.exe 28 PID 2244 wrote to memory of 2128 2244 4b5f840d0381c90787577aec69ea7495.exe 28 PID 2244 wrote to memory of 2128 2244 4b5f840d0381c90787577aec69ea7495.exe 28 PID 2244 wrote to memory of 2128 2244 4b5f840d0381c90787577aec69ea7495.exe 28 PID 2244 wrote to memory of 2128 2244 4b5f840d0381c90787577aec69ea7495.exe 28 PID 2244 wrote to memory of 2716 2244 4b5f840d0381c90787577aec69ea7495.exe 29 PID 2244 wrote to memory of 2716 2244 4b5f840d0381c90787577aec69ea7495.exe 29 PID 2244 wrote to memory of 2716 2244 4b5f840d0381c90787577aec69ea7495.exe 29 PID 2244 wrote to memory of 2716 2244 4b5f840d0381c90787577aec69ea7495.exe 29 PID 2244 wrote to memory of 2716 2244 4b5f840d0381c90787577aec69ea7495.exe 29 PID 2244 wrote to memory of 2716 2244 4b5f840d0381c90787577aec69ea7495.exe 29 PID 2244 wrote to memory of 2716 2244 4b5f840d0381c90787577aec69ea7495.exe 29 PID 2244 wrote to memory of 1896 2244 4b5f840d0381c90787577aec69ea7495.exe 33 PID 2244 wrote to memory of 1896 2244 4b5f840d0381c90787577aec69ea7495.exe 33 PID 2244 wrote to memory of 1896 2244 4b5f840d0381c90787577aec69ea7495.exe 33 PID 2244 wrote to memory of 1896 2244 4b5f840d0381c90787577aec69ea7495.exe 33 PID 2244 wrote to memory of 824 2244 4b5f840d0381c90787577aec69ea7495.exe 35 PID 2244 wrote to memory of 824 2244 4b5f840d0381c90787577aec69ea7495.exe 35 PID 2244 wrote to memory of 824 2244 4b5f840d0381c90787577aec69ea7495.exe 35 PID 2244 wrote to memory of 824 2244 4b5f840d0381c90787577aec69ea7495.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b5f840d0381c90787577aec69ea7495.exe"C:\Users\Admin\AppData\Local\Temp\4b5f840d0381c90787577aec69ea7495.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s C:\Windows\System32\vskpj.dll2⤵
- Loads dropped DLL
- Modifies registry class
PID:2128
-
-
C:\Windows\SysWOW64\rundll32.exerundll32 vskp3.dll , InstallMyDll2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
PID:2716
-
-
C:\Windows\SysWOW64\xxggyu.exeC:\Windows\system32\xxggyu.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of SetWindowsHookEx
PID:1896
-
-
C:\Windows\SysWOW64\cmd.execmd /c 375O540.bat2⤵
- Deletes itself
PID:824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5f5e51ed5e394b66d8e9101ab95aa9af6
SHA15941f1cf3d5b06b53863e544efe98b535aa875f6
SHA2569bcb7c6e947baad6e27b7a23311df862a4df077f9b2eae89fd20b463722d7c9f
SHA51261f24dfc80bce9cee7915e4306b1a3fdbeb09de22006886af0ca66fe23f92c0a4a4736dcfe4d010ee85e12f98f146680874e811424c5a5f5f649330e266b8a74