Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19-01-2024 17:09
Static task
static1
Behavioral task
behavioral1
Sample
682db5558ce11329c208eb7e0632e63e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
682db5558ce11329c208eb7e0632e63e.exe
Resource
win10v2004-20231215-en
General
-
Target
682db5558ce11329c208eb7e0632e63e.exe
-
Size
824KB
-
MD5
682db5558ce11329c208eb7e0632e63e
-
SHA1
233b5cfec545e43d49ed558f4af95ca89c019850
-
SHA256
f005d0a23dcd8455a71971c3824ff0596e3c40f7cf7012c6829118f7d3f346d1
-
SHA512
e24146bc51a060e521941bf15e892c0bce60fe0754b8f87630af3a60d0a9e13e2583d286653f890b8616c967bcadc566601dfeb517d8387cfa333c027e39b5e6
-
SSDEEP
12288:qai/oGGwH/BTqATt9IGeIm0JFg7qFhZjGgxGwPUD0INtcs9w7Jza+esTCmOQ/0:di/oMHZ1fm0s0agxGwfINyz7pL2mvM
Malware Config
Signatures
-
resource yara_rule behavioral1/files/0x0006000000015d4f-179.dat aspack_v212_v242 behavioral1/files/0x0006000000015d17-173.dat aspack_v212_v242 behavioral1/files/0x000e00000001224d-146.dat aspack_v212_v242 -
Executes dropped EXE 2 IoCs
pid Process 1400 f259394500.exe 1452 atnppn.exe -
Loads dropped DLL 7 IoCs
pid Process 1960 682db5558ce11329c208eb7e0632e63e.exe 1960 682db5558ce11329c208eb7e0632e63e.exe 1400 f259394500.exe 2196 regsvr32.exe 1400 f259394500.exe 1400 f259394500.exe 1452 atnppn.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\winsync = "C:\\Windows\\system32\\atnppn.exe reg_run" f259394500.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\winsync = "C:\\Windows\\system32\\atnppn.exe reg_run" atnppn.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 4 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 682db5558ce11329c208eb7e0632e63e.exe File opened for modification \??\PhysicalDrive0 f259394500.exe File opened for modification \??\PhysicalDrive0 regsvr32.exe File opened for modification \??\PhysicalDrive0 atnppn.exe -
Drops file in System32 directory 15 IoCs
description ioc Process File created C:\Windows\SysWOW64\wuauclt.dll 682db5558ce11329c208eb7e0632e63e.exe File opened for modification C:\Windows\SysWOW64\aspr_keys.ini regsvr32.exe File opened for modification C:\Windows\SysWOW64\ickrrkx.dll atnppn.exe File created C:\Windows\SysWOW64\ickrrkx.dll f259394500.exe File created C:\Windows\SysWOW64\bacnncx.exe f259394500.exe File opened for modification C:\Windows\SysWOW64\fmgee.dll atnppn.exe File created C:\Windows\SysWOW64\vgactl.cpl 682db5558ce11329c208eb7e0632e63e.exe File created C:\Windows\SysWOW64\puqaa.dat f259394500.exe File created C:\Windows\SysWOW64\atnppn.exe f259394500.exe File opened for modification C:\Windows\SysWOW64\atnppn.exe f259394500.exe File created C:\Windows\SysWOW64\fmgee.dll f259394500.exe File opened for modification C:\Windows\SysWOW64\aspr_keys.ini atnppn.exe File created C:\Windows\SysWOW64\atnppn.exe atnppn.exe File created C:\Windows\SysWOW64\puqaa.dat atnppn.exe File opened for modification C:\Windows\SysWOW64\bacnncx.exe atnppn.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\vcboob.dat 682db5558ce11329c208eb7e0632e63e.exe File created C:\Windows\rpenn.dll f259394500.exe File opened for modification C:\Windows\rpenn.dll f259394500.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 682db5558ce11329c208eb7e0632e63e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 682db5558ce11329c208eb7e0632e63e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier 682db5558ce11329c208eb7e0632e63e.exe Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 f259394500.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier atnppn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier atnppn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 682db5558ce11329c208eb7e0632e63e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz f259394500.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier f259394500.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier f259394500.exe Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 atnppn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz atnppn.exe -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Extensions\{9E248641-0E24-4DDB-9A1F-705087832AD6}\CLSID = "{6EC11407-5B2E-4E25-8BDF-77445B52AB37}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Extensions\{9E248641-0E24-4DDB-9A1F-705087832AD6}\MenuText = "Java" regsvr32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Extensions\{9E248641-0E24-4DDB-9A1F-705087832AD6} regsvr32.exe -
Modifies registry class 27 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\ShellEx\ColumnHandlers\{6EC11407-5B2E-4E25-8BDF-77445B52AB37}\ = "{6EC11407-5B2E-4E25-8BDF-77445B52AB37}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3b0ffd35-11b5-432f-bbf8-29ae347b0a0b}\InProcServer32\ThreadingModel = "Apartment" f259394500.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{a3c4004e-c9f1-43a9-9b05-8ea60f29cf32}\InProcServer32 atnppn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{a3c4004e-c9f1-43a9-9b05-8ea60f29cf32}\ProgId\ = "exreerfj.class" atnppn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3b0ffd35-11b5-432f-bbf8-29ae347b0a0b}\ = "exreerfj.class" f259394500.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3b0ffd35-11b5-432f-bbf8-29ae347b0a0b}\InProcServer32\ = "C:\\Windows\\SysWow64\\fmgee.dll" f259394500.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{a3c4004e-c9f1-43a9-9b05-8ea60f29cf32} atnppn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{a3c4004e-c9f1-43a9-9b05-8ea60f29cf32}\InProcServer32\ = "C:\\Windows\\SysWow64\\fmgee.dll" atnppn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\fygnngsk\ = "{a3c4004e-c9f1-43a9-9b05-8ea60f29cf32}" atnppn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6EC11407-5B2E-4E25-8BDF-77445B52AB37}\InProcServer32\ = "C:\\Windows\\SysWow64\\wuauclt.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\fygnngsk\ = "{3b0ffd35-11b5-432f-bbf8-29ae347b0a0b}" f259394500.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\fygnngsk f259394500.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3b0ffd35-11b5-432f-bbf8-29ae347b0a0b}\ProgId f259394500.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\fygnngsk atnppn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{a3c4004e-c9f1-43a9-9b05-8ea60f29cf32}\ = "exreerfj.class" atnppn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6EC11407-5B2E-4E25-8BDF-77445B52AB37}\ProgId regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3b0ffd35-11b5-432f-bbf8-29ae347b0a0b}\InProcServer32 f259394500.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3b0ffd35-11b5-432f-bbf8-29ae347b0a0b}\ProgId\ = "exreerfj.class" f259394500.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{a3c4004e-c9f1-43a9-9b05-8ea60f29cf32}\ProgId atnppn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3b0ffd35-11b5-432f-bbf8-29ae347b0a0b} f259394500.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6EC11407-5B2E-4E25-8BDF-77445B52AB37}\ = "Columns class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6EC11407-5B2E-4E25-8BDF-77445B52AB37}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6EC11407-5B2E-4E25-8BDF-77445B52AB37}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6EC11407-5B2E-4E25-8BDF-77445B52AB37}\ProgId\ = "Columns class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ColumnHandlers\{6EC11407-5B2E-4E25-8BDF-77445B52AB37} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6EC11407-5B2E-4E25-8BDF-77445B52AB37} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{a3c4004e-c9f1-43a9-9b05-8ea60f29cf32}\InProcServer32\ThreadingModel = "Apartment" atnppn.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1960 wrote to memory of 2196 1960 682db5558ce11329c208eb7e0632e63e.exe 28 PID 1960 wrote to memory of 2196 1960 682db5558ce11329c208eb7e0632e63e.exe 28 PID 1960 wrote to memory of 2196 1960 682db5558ce11329c208eb7e0632e63e.exe 28 PID 1960 wrote to memory of 2196 1960 682db5558ce11329c208eb7e0632e63e.exe 28 PID 1960 wrote to memory of 2196 1960 682db5558ce11329c208eb7e0632e63e.exe 28 PID 1960 wrote to memory of 2196 1960 682db5558ce11329c208eb7e0632e63e.exe 28 PID 1960 wrote to memory of 2196 1960 682db5558ce11329c208eb7e0632e63e.exe 28 PID 1960 wrote to memory of 1400 1960 682db5558ce11329c208eb7e0632e63e.exe 30 PID 1960 wrote to memory of 1400 1960 682db5558ce11329c208eb7e0632e63e.exe 30 PID 1960 wrote to memory of 1400 1960 682db5558ce11329c208eb7e0632e63e.exe 30 PID 1960 wrote to memory of 1400 1960 682db5558ce11329c208eb7e0632e63e.exe 30 PID 1400 wrote to memory of 1452 1400 f259394500.exe 29 PID 1400 wrote to memory of 1452 1400 f259394500.exe 29 PID 1400 wrote to memory of 1452 1400 f259394500.exe 29 PID 1400 wrote to memory of 1452 1400 f259394500.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\682db5558ce11329c208eb7e0632e63e.exe"C:\Users\Admin\AppData\Local\Temp\682db5558ce11329c208eb7e0632e63e.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Drops file in Windows directory
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s C:\Windows\system32\wuauclt.dll2⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies registry class
PID:2196
-
-
C:\Users\Admin\AppData\Local\Temp\f259394500.exe"C:\Users\Admin\AppData\Local\Temp\f259394500.exe" first_run2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Drops file in Windows directory
- Checks processor information in registry
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1400
-
-
C:\Windows\SysWOW64\atnppn.exefirst_run1⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Checks processor information in registry
- Modifies registry class
PID:1452
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
458KB
MD5a45be0d070560ede89a8fe489ff23c75
SHA1a306186ff34f3381b8b79ec05dd382a5ae71297a
SHA2569e640592b917e6aa0108cb050fc2c30ae420f44c9abb333c58a301e60ba6309e
SHA5121b1eae5fcfb18c951032b9ba74e5ffe8b2f2c4de203c6c7110453731793f3a4b6f94dc4eb9ed6a29b842de49493000c373e1b9ac631901087f6054e47df261e3
-
Filesize
163KB
MD5eabbb6f57dac51f65b7fa7ad44dc0c85
SHA170b89bb6eda284e71271f35497f0309cde69fea7
SHA2567907745f5df59442b6a80ceb8dfbcbf139c41580e5cfad5969c92090b0e711fa
SHA512fb57dad1ca7957ff11bd915e66035380daf0ab2c78c41592bc0c5b6f326b138940737279e04248497fc58972a805fd5d7583a917f59dfc40b84e3cd2f093ecd3
-
Filesize
176KB
MD5e1900e1e64c730073c74c7bd72ef8f3e
SHA1f2a2faf02d532bf9f2c209d349c580f4525ad19a
SHA256b792a3a2b46072f6c0ef11cc0e0b4366af25a4a43e5a94476b6e387e765a1e25
SHA5129256d304e6cfb52a070276d026eb86eec713fa6054092e9d977a5b734f240cc8d767f7f1117347fe4c50f516736339e34839d7614fd603eef4d4a797e1cd0722
-
Filesize
32B
MD50ab99d33e5427a4c40a7f72fc6a46630
SHA19ddb58311426e66f7d3da6372bc5b8e2e3781166
SHA256d59bebb20d90df108b366eda743cb8a54ba07c545e447a6b8c5f061e91ae8529
SHA51237a15e91a07f05e76b61e4bda8c3e9bc4dfacb7d6a42e30b5d1310d03f5279c9c0fd301b8e7715ed5a1fa72e6c20b12ab8c4c235a6077b188736ac60650ea5b1
-
Filesize
130KB
MD578d4c669c1f3268b6cfc493e08df9d20
SHA1bc54b50630a72c86d503f435459112cac1aa9989
SHA256484e60c78e02266e8857f95511c3f2b2a7714020051b615fc5c8e6c6b1a4c5b7
SHA5125a6b2904648337b6d32cc42f6aa45733c39f0a3590a2fb8547fc02f367fc882c046ade108e159c07d3f484e37118d4894972b1edf99546ce898f762355712a34
-
Filesize
156KB
MD56451095f639ab38909988e41432f1a43
SHA10d5839203d8b31bb23ab5746019ea45b5545da2c
SHA25634ce0665cbd0125173995e8051ee5a62dbadeeb6041a1da1b74811db0a41311e
SHA512cc008c301865028adee899f80223491dd2439bcb812cc66869d1c28d1cb75427c93b3248e2718ab4abef9b5d5895e33cb4f4f3fa24cd302760055dcee4fef7e2