Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
758342456b7...0b.exe
windows7-x64
358342456b7...0b.exe
windows10-2004-x64
3$APPDATA/C...er.dll
windows7-x64
7$APPDATA/C...er.dll
windows10-2004-x64
7$APPDATA/C...TV.dll
windows7-x64
1$APPDATA/C...TV.dll
windows10-2004-x64
1$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3Communicate.dll
windows7-x64
1Communicate.dll
windows10-2004-x64
1MSINET.dll
windows7-x64
1MSINET.dll
windows10-2004-x64
1PSPMencoder.exe
windows7-x64
7PSPMencoder.exe
windows10-2004-x64
7QvodPlayer.exe
windows7-x64
QvodPlayer.exe
windows10-2004-x64
VnetClinfo.dll
windows7-x64
1VnetClinfo.dll
windows10-2004-x64
1comdlg32.dll
windows7-x64
1comdlg32.dll
windows10-2004-x64
1images/list.js
windows7-x64
1images/list.js
windows10-2004-x64
1mod/CCTVPlayer.dll
windows7-x64
7mod/CCTVPlayer.dll
windows10-2004-x64
7mod/CCTVUp...ll.dll
windows7-x64
7mod/CCTVUp...ll.dll
windows10-2004-x64
7mod/Reli_CCTV.dll
windows7-x64
1mod/Reli_CCTV.dll
windows10-2004-x64
1Analysis
-
max time kernel
144s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/01/2024, 06:23
Behavioral task
behavioral1
Sample
58342456b7c97c3e03988c90778b610b.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
58342456b7c97c3e03988c90778b610b.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
$APPDATA/CCTV/tv/CCTVPlayer.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$APPDATA/CCTV/tv/CCTVPlayer.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
$APPDATA/CCTV/tv/Reli_CCTV.dll
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
$APPDATA/CCTV/tv/Reli_CCTV.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral13
Sample
Communicate.dll
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
Communicate.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral15
Sample
MSINET.dll
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
MSINET.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
PSPMencoder.exe
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
PSPMencoder.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
QvodPlayer.exe
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
QvodPlayer.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
VnetClinfo.dll
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
VnetClinfo.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral23
Sample
comdlg32.dll
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
comdlg32.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral25
Sample
images/list.js
Resource
win7-20231129-en
Behavioral task
behavioral26
Sample
images/list.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
mod/CCTVPlayer.dll
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
mod/CCTVPlayer.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral29
Sample
mod/CCTVUpdateInstall.dll
Resource
win7-20231215-en
Behavioral task
behavioral30
Sample
mod/CCTVUpdateInstall.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
mod/Reli_CCTV.dll
Resource
win7-20231215-en
Behavioral task
behavioral32
Sample
mod/Reli_CCTV.dll
Resource
win10v2004-20231215-en
General
-
Target
PSPMencoder.exe
-
Size
2.5MB
-
MD5
8464394f47d1b2b00944b6bd75ba5226
-
SHA1
b3b02c06403a64f9d360225f7923f1e19c00a539
-
SHA256
31405f0862472d9877ee66fc592c5d50e0ec5e44725831932593088202cca642
-
SHA512
f413ed1a2f966e9364138b30f23320e9d531d7926013352d70c7896bb4b8fe926b76ec7546fcf1a50e5068624012312b275d5067f3f44c82b8a406c17c029cfe
-
SSDEEP
49152:SQQ99NtzK6mlE+t7U20LlzFAhVf+5XWV6lFO9RC4LcWoRCdUPjRUir:aD+dU20LlzFAhVW5XWQLO9RoRCdUPjRJ
Malware Config
Signatures
-
Registers COM server for autorun 1 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\Wow6432Node\CLSID\{AC414988-E5BB-4C2C-873B-EA53D2F3D23A}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mod\\CCTVUpdateInstall.dll" regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\Wow6432Node\CLSID\{AC414988-E5BB-4C2C-873B-EA53D2F3D23A}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\Wow6432Node\CLSID\{38943A5A-33BB-4D28-909A-BF52B994D26A}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\Wow6432Node\CLSID\{38943A5A-33BB-4D28-909A-BF52B994D26A}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mod\\CCTVPL~1.OCX" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\Wow6432Node\CLSID\{C728DAB8-FDF5-4CD7-89DD-879D25794C77}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\Wow6432Node\CLSID\{C728DAB8-FDF5-4CD7-89DD-879D25794C77}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mod\\CCTVPL~1.OCX" regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\Wow6432Node\CLSID\{C728DAB8-FDF5-4CD7-89DD-879D25794C77}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\Wow6432Node\CLSID\{AC414988-E5BB-4C2C-873B-EA53D2F3D23A}\InprocServer32 regsvr32.exe -
resource yara_rule behavioral17/memory/2676-97-0x0000000010000000-0x00000000100F0000-memory.dmp upx behavioral17/memory/2768-99-0x0000000010000000-0x000000001001E000-memory.dmp upx behavioral17/memory/2568-101-0x0000000010000000-0x00000000100F0000-memory.dmp upx behavioral17/memory/2568-111-0x0000000010000000-0x00000000100F0000-memory.dmp upx -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: PSPMencoder.exe File opened (read-only) \??\B: PSPMencoder.exe File opened (read-only) \??\L: PSPMencoder.exe File opened (read-only) \??\Q: PSPMencoder.exe File opened (read-only) \??\T: PSPMencoder.exe File opened (read-only) \??\X: PSPMencoder.exe File opened (read-only) \??\I: PSPMencoder.exe File opened (read-only) \??\J: PSPMencoder.exe File opened (read-only) \??\R: PSPMencoder.exe File opened (read-only) \??\V: PSPMencoder.exe File opened (read-only) \??\U: PSPMencoder.exe File opened (read-only) \??\W: PSPMencoder.exe File opened (read-only) \??\Z: PSPMencoder.exe File opened (read-only) \??\E: PSPMencoder.exe File opened (read-only) \??\G: PSPMencoder.exe File opened (read-only) \??\K: PSPMencoder.exe File opened (read-only) \??\S: PSPMencoder.exe File opened (read-only) \??\O: PSPMencoder.exe File opened (read-only) \??\P: PSPMencoder.exe File opened (read-only) \??\A: PSPMencoder.exe File opened (read-only) \??\H: PSPMencoder.exe File opened (read-only) \??\M: PSPMencoder.exe File opened (read-only) \??\N: PSPMencoder.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5CE6169D-AB98-45E4-ADED-0D6CA74AA1D1}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{85BA792F-F1A6-403D-9BFA-641703E7223F}\ = "_DVnetClinfo" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AC414988-E5BB-4C2C-873B-EA53D2F3D23A}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{80F1D1E4-9D20-4501-B0F1-196A6B302060}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\TypeLib\{8DB3A21B-4F5A-4D45-AE1A-0F03E72A6E8F}\1.1\FLAGS\ = "2" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AC414988-E5BB-4C2C-873B-EA53D2F3D23A}\Insertable regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\Wow6432Node\Interface\{042C7AAC-BD4A-4450-AA0C-AAC3A30CA19E}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A7417B40-7D15-4372-882B-25849EBA17A6}\ = "VnetClinfo Property Page" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{89B2C28D-779F-4704-AD29-113B0977E8A5}\InprocServer32 PSPMencoder.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AC414988-E5BB-4C2C-873B-EA53D2F3D23A}\MiscStatus\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{7B0F8D4E-2C8D-4F2A-805B-0E35BF90B713}\1.0\HELPDIR regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\ATLDownLoadProgressBar.DownLoadProgressBar\CurVer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FB303E8E-BCBC-4E76-BC72-8D3C16D2FF08}\ProgID regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\ATLDownLoadProgressBar.DownLoadProgressBar\ = "CCTVUpdateInstall" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6B1C04D4-FE66-4828-92E0-EEBCC8959BF3}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{38943A5A-33BB-4D28-909A-BF52B994D26A}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mod\\CCTVPL~1.OCX" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\KOOPLAYER.CCTVPlayerCtrl.1\ = "KooPlayer Control" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\Interface\{6B1C04D4-FE66-4828-92E0-EEBCC8959BF3}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\HZP.ReliPlayer.CCTV\ = "ReliPlayer.CCTV Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{80F1D1E4-9D20-4501-B0F1-196A6B302060}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{603180C6-8421-4a33-9B94-E5AFC9D68CD9}\ = "ReliPlayer.CCTV" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{603180C6-8421-4a33-9B94-E5AFC9D68CD9} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8821A59C-A115-430b-9F0D-089DB4F8B7F3}\Version regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FB303E8E-BCBC-4E76-BC72-8D3C16D2FF08}\ = "VnetClinfo Control" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FB303E8E-BCBC-4E76-BC72-8D3C16D2FF08}\ToolboxBitmap32 regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\Interface\{80F1D1E4-9D20-4501-B0F1-196A6B302060} regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\Component Categories regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID PSPMencoder.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4B5BEEE2-1E16-4DE5-B69E-603581B6C018}\1.0 PSPMencoder.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\Wow6432Node\CLSID\{AC414988-E5BB-4C2C-873B-EA53D2F3D23A} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6B1C04D4-FE66-4828-92E0-EEBCC8959BF3}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6B1C04D4-FE66-4828-92E0-EEBCC8959BF3}\TypeLib\Version = "1.1" regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\Wow6432Node\CLSID\{C728DAB8-FDF5-4CD7-89DD-879D25794C77}\TypeLib\ = "{8DB3A21B-4F5A-4D45-AE1A-0F03E72A6E8F}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3D0D36F-23F8-4682-A195-74C92B03D4AF}\InprocServer32 PSPMencoder.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\Wow6432Node\CLSID\{C728DAB8-FDF5-4CD7-89DD-879D25794C77}\MiscStatus regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8821A59C-A115-430b-9F0D-089DB4F8B7F3}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C3E675CE-A02E-4F3C-95C3-74BBA404814D}\TypeLib regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\Wow6432Node\Interface\{042C7AAC-BD4A-4450-AA0C-AAC3A30CA19E}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Component Categories regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6B1C04D4-FE66-4828-92E0-EEBCC8959BF3} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{85BA792F-F1A6-403D-9BFA-641703E7223F}\TypeLib\ = "{5CE6169D-AB98-45E4-ADED-0D6CA74AA1D1}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{042C7AAC-BD4A-4450-AA0C-AAC3A30CA19E} regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\Wow6432Node\Interface\{042C7AAC-BD4A-4450-AA0C-AAC3A30CA19E} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3D0D36F-23F8-4682-A195-74C92B03D4AF}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\QvodInsert.dll" PSPMencoder.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8821A59D-A115-430B-9F0D-089DB4F8B7F3}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{80F1D1E4-9D20-4501-B0F1-196A6B302060}\TypeLib\Version = "1.1" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\Wow6432Node\Interface\{80F1D1E4-9D20-4501-B0F1-196A6B302060} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8821A59A-A115-430B-9F0D-089DB4F8B7F3}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8821A59A-A115-430B-9F0D-089DB4F8B7F3}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\Wow6432Node\CLSID\{AC414988-E5BB-4C2C-873B-EA53D2F3D23A}\MiscStatus regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8821A59A-A115-430B-9F0D-089DB4F8B7F3}\TypeLib\ = "{8821A59B-A115-430B-9F0D-089DB4F8B7F3}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FB303E8E-BCBC-4E76-BC72-8D3C16D2FF08}\Control regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2566F758-FE4A-4691-9F93-30AF685BB403} PSPMencoder.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\Wow6432Node\CLSID\{AC414988-E5BB-4C2C-873B-EA53D2F3D23A}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mod\\CCTVUpdateInstall.dll" regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\KOOPLAYER.CCTVPlayerCtrl.1\CLSID\ = "{C728DAB8-FDF5-4CD7-89DD-879D25794C77}" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\Wow6432Node\CLSID\{C728DAB8-FDF5-4CD7-89DD-879D25794C77}\Implemented Categories regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6B1C04D4-FE66-4828-92E0-EEBCC8959BF3}\ = "_DKooPlayerEvents" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6B1C04D4-FE66-4828-92E0-EEBCC8959BF3}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C728DAB8-FDF5-4CD7-89DD-879D25794C77}\Version regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\Wow6432Node\CLSID\{38943A5A-33BB-4D28-909A-BF52B994D26A} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HZP.ReliPlayer.CCTV regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4B5BEEE2-1E16-4DE5-B69E-603581B6C018}\1.0\0\win32 PSPMencoder.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SOFTWARE\RealNetworks\Preferences\DT_Codecs\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Codecs" PSPMencoder.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ATLDownLoadProgressBar.DownLoadProgressBar\CurVer regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2568 PSPMencoder.exe 2568 PSPMencoder.exe 2568 PSPMencoder.exe 2568 PSPMencoder.exe 2568 PSPMencoder.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2568 PSPMencoder.exe 2568 PSPMencoder.exe -
Suspicious use of SetWindowsHookEx 27 IoCs
pid Process 2568 PSPMencoder.exe 2568 PSPMencoder.exe 2568 PSPMencoder.exe 2568 PSPMencoder.exe 2568 PSPMencoder.exe 2568 PSPMencoder.exe 2568 PSPMencoder.exe 2568 PSPMencoder.exe 2568 PSPMencoder.exe 2568 PSPMencoder.exe 2568 PSPMencoder.exe 2568 PSPMencoder.exe 2568 PSPMencoder.exe 2568 PSPMencoder.exe 2568 PSPMencoder.exe 2568 PSPMencoder.exe 2568 PSPMencoder.exe 2568 PSPMencoder.exe 2568 PSPMencoder.exe 2568 PSPMencoder.exe 2568 PSPMencoder.exe 2568 PSPMencoder.exe 2568 PSPMencoder.exe 2568 PSPMencoder.exe 2568 PSPMencoder.exe 2568 PSPMencoder.exe 2568 PSPMencoder.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 2568 wrote to memory of 2268 2568 PSPMencoder.exe 28 PID 2568 wrote to memory of 2268 2568 PSPMencoder.exe 28 PID 2568 wrote to memory of 2268 2568 PSPMencoder.exe 28 PID 2568 wrote to memory of 2268 2568 PSPMencoder.exe 28 PID 2568 wrote to memory of 2268 2568 PSPMencoder.exe 28 PID 2568 wrote to memory of 2268 2568 PSPMencoder.exe 28 PID 2568 wrote to memory of 2268 2568 PSPMencoder.exe 28 PID 2568 wrote to memory of 2800 2568 PSPMencoder.exe 29 PID 2568 wrote to memory of 2800 2568 PSPMencoder.exe 29 PID 2568 wrote to memory of 2800 2568 PSPMencoder.exe 29 PID 2568 wrote to memory of 2800 2568 PSPMencoder.exe 29 PID 2568 wrote to memory of 2800 2568 PSPMencoder.exe 29 PID 2568 wrote to memory of 2800 2568 PSPMencoder.exe 29 PID 2568 wrote to memory of 2800 2568 PSPMencoder.exe 29 PID 2568 wrote to memory of 2704 2568 PSPMencoder.exe 30 PID 2568 wrote to memory of 2704 2568 PSPMencoder.exe 30 PID 2568 wrote to memory of 2704 2568 PSPMencoder.exe 30 PID 2568 wrote to memory of 2704 2568 PSPMencoder.exe 30 PID 2568 wrote to memory of 2704 2568 PSPMencoder.exe 30 PID 2568 wrote to memory of 2704 2568 PSPMencoder.exe 30 PID 2568 wrote to memory of 2704 2568 PSPMencoder.exe 30 PID 2568 wrote to memory of 2872 2568 PSPMencoder.exe 32 PID 2568 wrote to memory of 2872 2568 PSPMencoder.exe 32 PID 2568 wrote to memory of 2872 2568 PSPMencoder.exe 32 PID 2568 wrote to memory of 2872 2568 PSPMencoder.exe 32 PID 2568 wrote to memory of 2856 2568 PSPMencoder.exe 34 PID 2568 wrote to memory of 2856 2568 PSPMencoder.exe 34 PID 2568 wrote to memory of 2856 2568 PSPMencoder.exe 34 PID 2568 wrote to memory of 2856 2568 PSPMencoder.exe 34 PID 2872 wrote to memory of 2676 2872 cmd.exe 36 PID 2872 wrote to memory of 2676 2872 cmd.exe 36 PID 2872 wrote to memory of 2676 2872 cmd.exe 36 PID 2872 wrote to memory of 2676 2872 cmd.exe 36 PID 2872 wrote to memory of 2676 2872 cmd.exe 36 PID 2872 wrote to memory of 2676 2872 cmd.exe 36 PID 2872 wrote to memory of 2676 2872 cmd.exe 36 PID 2704 wrote to memory of 2768 2704 cmd.exe 35 PID 2704 wrote to memory of 2768 2704 cmd.exe 35 PID 2704 wrote to memory of 2768 2704 cmd.exe 35 PID 2704 wrote to memory of 2768 2704 cmd.exe 35 PID 2704 wrote to memory of 2768 2704 cmd.exe 35 PID 2704 wrote to memory of 2768 2704 cmd.exe 35 PID 2704 wrote to memory of 2768 2704 cmd.exe 35 PID 2856 wrote to memory of 2904 2856 cmd.exe 38 PID 2856 wrote to memory of 2904 2856 cmd.exe 38 PID 2856 wrote to memory of 2904 2856 cmd.exe 38 PID 2856 wrote to memory of 2904 2856 cmd.exe 38 PID 2856 wrote to memory of 2904 2856 cmd.exe 38 PID 2856 wrote to memory of 2904 2856 cmd.exe 38 PID 2856 wrote to memory of 2904 2856 cmd.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\PSPMencoder.exe"C:\Users\Admin\AppData\Local\Temp\PSPMencoder.exe"1⤵
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 "C:\Users\Admin\AppData\Local\Temp\QvodInsert.dll" /s2⤵PID:2268
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 "C:\Users\Admin\AppData\Local\Temp\VnetClinfo.ocx" /s2⤵
- Modifies registry class
PID:2800
-
-
C:\Windows\SysWOW64\cmd.execmd /c regtvdllCCTVUpdateInstall.dll.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 "C:\Users\Admin\AppData\Local\Temp\mod\CCTVUpdateInstall.dll" /s3⤵
- Registers COM server for autorun
- Modifies registry class
PID:2768
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c regtvdllCCTVPlayer.ocx.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 "C:\Users\Admin\AppData\Local\Temp\mod\CCTVPlayer.ocx" /s3⤵
- Registers COM server for autorun
- Modifies registry class
PID:2676
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c regtvdllReli_CCTV.dll.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 "C:\Users\Admin\AppData\Local\Temp\mod\Reli_CCTV.dll" /s3⤵
- Modifies registry class
PID:2904
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
292B
MD5a671d3d075bd4fb6e24efbd2ff6b984a
SHA1ec6cc7b141cdd5cd45a198dd20878f8038364040
SHA256b315b489492b336207dea7f9a956d1da68405ddac8f5e0b81b14d5dead1e1f29
SHA512bc194acfd64d274febee0d6876544c3a3ee759f84ecc0c4b098d1a88d2e26405f6c4d19d320b7ca63ff94f1e07e798eabbfbc3bebcf38489599c9b60207a56b2
-
Filesize
185B
MD53a03fd02ec2c4a8594040d25e1234ec2
SHA141c9dbc98f14f04bd88b2149d615f96758bbddb1
SHA256207ccf7b56f8a780d2cc2b744d32e52fdd4ce6074ca94ad4153160469f7e99ad
SHA512a5a3d4c8de44eb81fbf4d036809b12318f919a3941d9e99f8e8d7406c4eb4874deb274905a8d20cbf44c64b27e0b2d822cdde661e9ea88933c889e5c9e5e9461
-
Filesize
122B
MD5c444d18db692685402218008375621d5
SHA116df7100180f98f284f7e1e03b12ad2acd67bfbe
SHA256cdc0acafbe9318790cc423af79b78dbe1312566177f7968f193f0538948ed31d
SHA5127ad2265cfb2995c738652accc6e4a52ca1b8360594e54687a01972954f6179ff7228ab1ab075387b7b2b14780b7b58235312288b39b781031a87e614ff5f4784
-
Filesize
136B
MD5093157afd2189f85f6ff43f1c7d346f7
SHA1fa3bf14e8815b35ce8e7ee82d3007f06321c2b5e
SHA256f049fa2c8465660a3b10db1ecb6bc9e0d2aaa1e5176ee2b90e1ac6fc1a561a75
SHA512df5b31570160516330f6a553dbe69ebb496107df6efa0023baa3f019fad7f5cd6da66c5a80116adbd344e3068086eba6068793c5309a1ee59b4c5306bb6ba62a
-
Filesize
120B
MD5a3b3e0b89cf93ff854bac31c0f5dd47e
SHA10d92e673cc424d60eab529d8af01148fb106825b
SHA256414e23a013713aadcc561d23d04f62c95b8f74c47fef2cdd6e1c67baae4db06f
SHA512d98f8826f43a1642c23110b2c21538a145ae2ce54379deb6f55c2a291a3726337c48b519631dee7904be7810e08d21f7d3434024cda1bb1220997ec397583c61