Overview
overview
8Static
static
3GifShower.dll
windows7-x64
1GifShower.dll
windows10-2004-x64
1RealMediaSplitter.dll
windows7-x64
1RealMediaSplitter.dll
windows10-2004-x64
1WMFDemux.dll
windows7-x64
1WMFDemux.dll
windows10-2004-x64
1asyncflt.dll
windows7-x64
1asyncflt.dll
windows10-2004-x64
1atrc.dll
windows7-x64
1atrc.dll
windows10-2004-x64
3cook.dll
windows7-x64
3cook.dll
windows10-2004-x64
3drvc.dll
windows7-x64
1drvc.dll
windows10-2004-x64
3msvcr71.dll
windows7-x64
3msvcr71.dll
windows10-2004-x64
3pncrt.dll
windows7-x64
3pncrt.dll
windows10-2004-x64
3raac.dll
windows7-x64
3raac.dll
windows10-2004-x64
3vjocx.dll
windows7-x64
8vjocx.dll
windows10-2004-x64
8Analysis
-
max time kernel
137s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
08/01/2024, 13:44
Static task
static1
Behavioral task
behavioral1
Sample
GifShower.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
GifShower.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
RealMediaSplitter.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
RealMediaSplitter.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
WMFDemux.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
WMFDemux.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
asyncflt.dll
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
asyncflt.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral9
Sample
atrc.dll
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
atrc.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
cook.dll
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
cook.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral13
Sample
drvc.dll
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
drvc.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral15
Sample
msvcr71.dll
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
msvcr71.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
pncrt.dll
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
pncrt.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
raac.dll
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
raac.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
vjocx.dll
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
vjocx.dll
Resource
win10v2004-20231222-en
General
-
Target
vjocx.dll
-
Size
1.6MB
-
MD5
a4917c2686f8aad36ca825e538fa205a
-
SHA1
988c12cc21e960b50a1ce1041a75efef7d5def4b
-
SHA256
cc92b8e35bb53c2aa47b8050c33b68c3f53208d11764b4b1b446ead933b33782
-
SHA512
745381166a32b432e0ed6ba3ddf3300ce1e3b10f264d3d77d6f6d1447be4e6cf2c453ee63e972b31062951fdb831c0e1873f1a155efa39f55545f5452a187052
-
SSDEEP
24576:s5iDxabKrQZuId5xVH9kVSDj+Jh9UfictRwsVvhBr51u:G5ZyMrtRwsVvzu
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\vvdsvc\Parameters\ServiceDll = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vjocx.dll" regsvr32.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1D416E10-79D7-4F06-9ED8-C4DF23AA6DF6} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{41A0B42A-335B-4E4D-B92D-69DAEAD1A8D8}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{154FCEAF-23C1-495D-B8DA-BE073779BB0F}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{071825D4-FA84-45A6-A82F-B492DD197E3B}\TypeLib\ = "{1D416E10-79D7-4F06-9ED8-C4DF23AA6DF6}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D4003189-95B1-4A2F-9A87-F2B03665960D}\ToolboxBitmap32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vjocx.dll, 1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{41A0B42A-335B-4E4D-B92D-69DAEAD1A8D8}\TypeLib\ = "{1D416E10-79D7-4F06-9ED8-C4DF23AA6DF6}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{41A0B42A-335B-4E4D-B92D-69DAEAD1A8D8}\ = "_IVodEvents" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{154FCEAF-23C1-495D-B8DA-BE073779BB0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D4003189-95B1-4A2F-9A87-F2B03665960D}\Implemented Categories\{7DD95802-9882-11CF-9FA9-00AA006C42C4} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1D416E10-79D7-4F06-9ED8-C4DF23AA6DF6}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1D416E10-79D7-4F06-9ED8-C4DF23AA6DF6}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vjocx.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1D416E10-79D7-4F06-9ED8-C4DF23AA6DF6}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{41A0B42A-335B-4E4D-B92D-69DAEAD1A8D8}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{154FCEAF-23C1-495D-B8DA-BE073779BB0F}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{071825D4-FA84-45A6-A82F-B492DD197E3B}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D4003189-95B1-4A2F-9A87-F2B03665960D}\AppID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D4003189-95B1-4A2F-9A87-F2B03665960D}\TypeLib\ = "{1D416E10-79D7-4F06-9ED8-C4DF23AA6DF6}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{41A0B42A-335B-4E4D-B92D-69DAEAD1A8D8}\TypeLib\ = "{1D416E10-79D7-4F06-9ED8-C4DF23AA6DF6}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{41A0B42A-335B-4E4D-B92D-69DAEAD1A8D8}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{154FCEAF-23C1-495D-B8DA-BE073779BB0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{154FCEAF-23C1-495D-B8DA-BE073779BB0F}\ = "ICVodClient2" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VJ.VodClient\CLSID\ = "{D4003189-95B1-4A2F-9A87-F2B03665960D}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D4003189-95B1-4A2F-9A87-F2B03665960D} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D4003189-95B1-4A2F-9A87-F2B03665960D}\ = "VodClient Control Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D4003189-95B1-4A2F-9A87-F2B03665960D}\InprocServer32\ThreadingModel = "apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1D416E10-79D7-4F06-9ED8-C4DF23AA6DF6}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{071825D4-FA84-45A6-A82F-B492DD197E3B}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VJ.VodClient.1\CLSID\ = "{D4003189-95B1-4A2F-9A87-F2B03665960D}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D4003189-95B1-4A2F-9A87-F2B03665960D}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D4003189-95B1-4A2F-9A87-F2B03665960D}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{154FCEAF-23C1-495D-B8DA-BE073779BB0F}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{071825D4-FA84-45A6-A82F-B492DD197E3B}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VJ.VodClient\ = "VodClient Control Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D4003189-95B1-4A2F-9A87-F2B03665960D}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vjocx.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{41A0B42A-335B-4E4D-B92D-69DAEAD1A8D8} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{154FCEAF-23C1-495D-B8DA-BE073779BB0F}\ = "ICVodClient2" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{154FCEAF-23C1-495D-B8DA-BE073779BB0F}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{071825D4-FA84-45A6-A82F-B492DD197E3B}\TypeLib\ = "{1D416E10-79D7-4F06-9ED8-C4DF23AA6DF6}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{154FCEAF-23C1-495D-B8DA-BE073779BB0F} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{154FCEAF-23C1-495D-B8DA-BE073779BB0F}\TypeLib\ = "{1D416E10-79D7-4F06-9ED8-C4DF23AA6DF6}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{071825D4-FA84-45A6-A82F-B492DD197E3B}\ = "ICVodClient" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D4003189-95B1-4A2F-9A87-F2B03665960D}\ToolboxBitmap32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D4003189-95B1-4A2F-9A87-F2B03665960D}\Version\ = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{41A0B42A-335B-4E4D-B92D-69DAEAD1A8D8}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{154FCEAF-23C1-495D-B8DA-BE073779BB0F} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VJ.VodClient.1\ = "VodClient Control Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VJ.VodClient regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VJ.VodClient\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{41A0B42A-335B-4E4D-B92D-69DAEAD1A8D8}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{41A0B42A-335B-4E4D-B92D-69DAEAD1A8D8}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{071825D4-FA84-45A6-A82F-B492DD197E3B} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{071825D4-FA84-45A6-A82F-B492DD197E3B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{071825D4-FA84-45A6-A82F-B492DD197E3B} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D4003189-95B1-4A2F-9A87-F2B03665960D}\VersionIndependentProgID\ = "VJ.VodClient" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D4003189-95B1-4A2F-9A87-F2B03665960D}\MiscStatus\1\ = "131473" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D4003189-95B1-4A2F-9A87-F2B03665960D}\Implemented Categories regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D4003189-95B1-4A2F-9A87-F2B03665960D}\Implemented Categories\{7DD95801-9882-11CF-9FA9-00AA006C42C4} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{41A0B42A-335B-4E4D-B92D-69DAEAD1A8D8} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{154FCEAF-23C1-495D-B8DA-BE073779BB0F}\TypeLib\ = "{1D416E10-79D7-4F06-9ED8-C4DF23AA6DF6}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{071825D4-FA84-45A6-A82F-B492DD197E3B}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1D416E10-79D7-4F06-9ED8-C4DF23AA6DF6}\1.0\ = "vodClient 1.0 ÀàÐÍ¿â" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1D416E10-79D7-4F06-9ED8-C4DF23AA6DF6}\1.0\FLAGS\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{41A0B42A-335B-4E4D-B92D-69DAEAD1A8D8}\ = "_IVodEvents" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VJ.VodClient\CurVer regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2220 wrote to memory of 4188 2220 regsvr32.exe 13 PID 2220 wrote to memory of 4188 2220 regsvr32.exe 13 PID 2220 wrote to memory of 4188 2220 regsvr32.exe 13
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\vjocx.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\vjocx.dll2⤵
- Sets DLL path for service in the registry
- Modifies registry class
PID:4188
-