Analysis
-
max time kernel
16s -
max time network
21s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19-01-2024 17:09
Static task
static1
Behavioral task
behavioral1
Sample
682db5558ce11329c208eb7e0632e63e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
682db5558ce11329c208eb7e0632e63e.exe
Resource
win10v2004-20231215-en
General
-
Target
682db5558ce11329c208eb7e0632e63e.exe
-
Size
824KB
-
MD5
682db5558ce11329c208eb7e0632e63e
-
SHA1
233b5cfec545e43d49ed558f4af95ca89c019850
-
SHA256
f005d0a23dcd8455a71971c3824ff0596e3c40f7cf7012c6829118f7d3f346d1
-
SHA512
e24146bc51a060e521941bf15e892c0bce60fe0754b8f87630af3a60d0a9e13e2583d286653f890b8616c967bcadc566601dfeb517d8387cfa333c027e39b5e6
-
SSDEEP
12288:qai/oGGwH/BTqATt9IGeIm0JFg7qFhZjGgxGwPUD0INtcs9w7Jza+esTCmOQ/0:di/oMHZ1fm0s0agxGwfINyz7pL2mvM
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x000a000000022480-103.dat aspack_v212_v242 behavioral2/files/0x000600000002312e-133.dat aspack_v212_v242 behavioral2/files/0x000600000002312c-149.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 682db5558ce11329c208eb7e0632e63e.exe -
Executes dropped EXE 2 IoCs
pid Process 4984 f240655687.exe 1564 nnuizp.exe -
Loads dropped DLL 3 IoCs
pid Process 3252 regsvr32.exe 4984 f240655687.exe 1564 nnuizp.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\winsync = "C:\\Windows\\system32\\nnuizp.exe reg_run" f240655687.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\winsync = "C:\\Windows\\system32\\nnuizp.exe reg_run" nnuizp.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 682db5558ce11329c208eb7e0632e63e.exe File opened for modification \??\PhysicalDrive0 f240655687.exe File opened for modification \??\PhysicalDrive0 nnuizp.exe -
Drops file in System32 directory 15 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\aspr_keys.ini regsvr32.exe File created C:\Windows\SysWOW64\kkoonro.dll f240655687.exe File created C:\Windows\SysWOW64\ccomqno.exe f240655687.exe File opened for modification C:\Windows\SysWOW64\aspr_keys.ini nnuizp.exe File created C:\Windows\SysWOW64\qqvky.dat nnuizp.exe File opened for modification C:\Windows\SysWOW64\gglwk.dll nnuizp.exe File created C:\Windows\SysWOW64\wuauclt.dll 682db5558ce11329c208eb7e0632e63e.exe File created C:\Windows\SysWOW64\nnuizp.exe f240655687.exe File created C:\Windows\SysWOW64\qqvky.dat f240655687.exe File opened for modification C:\Windows\SysWOW64\nnuizp.exe f240655687.exe File opened for modification C:\Windows\SysWOW64\ccomqno.exe nnuizp.exe File created C:\Windows\SysWOW64\vgactl.cpl 682db5558ce11329c208eb7e0632e63e.exe File created C:\Windows\SysWOW64\gglwk.dll f240655687.exe File created C:\Windows\SysWOW64\nnuizp.exe nnuizp.exe File opened for modification C:\Windows\SysWOW64\kkoonro.dll nnuizp.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\bbpqwo.dat 682db5558ce11329c208eb7e0632e63e.exe File created C:\Windows\eetic.dll f240655687.exe File opened for modification C:\Windows\eetic.dll f240655687.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier f240655687.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz nnuizp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier nnuizp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 682db5558ce11329c208eb7e0632e63e.exe Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 f240655687.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier f240655687.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz f240655687.exe Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 nnuizp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier nnuizp.exe Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 682db5558ce11329c208eb7e0632e63e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 682db5558ce11329c208eb7e0632e63e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier 682db5558ce11329c208eb7e0632e63e.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Extensions\{9E248641-0E24-4DDB-9A1F-705087832AD6} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{9E248641-0E24-4DDB-9A1F-705087832AD6}\CLSID = "{6EC11407-5B2E-4E25-8BDF-77445B52AB37}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{9E248641-0E24-4DDB-9A1F-705087832AD6}\MenuText = "Java" regsvr32.exe -
Modifies registry class 30 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6EC11407-5B2E-4E25-8BDF-77445B52AB37}\ProgId regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ColumnHandlers regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9b3dd5fc-2e69-4878-b78f-f296539f4b8b}\ProgId\ = "rrirjeie.class" f240655687.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6EC11407-5B2E-4E25-8BDF-77445B52AB37} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6EC11407-5B2E-4E25-8BDF-77445B52AB37}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6EC11407-5B2E-4E25-8BDF-77445B52AB37}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9b3dd5fc-2e69-4878-b78f-f296539f4b8b}\ = "rrirjeie.class" f240655687.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6EC11407-5B2E-4E25-8BDF-77445B52AB37}\InProcServer32\ = "C:\\Windows\\SysWow64\\wuauclt.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9b3dd5fc-2e69-4878-b78f-f296539f4b8b}\InProcServer32\ = "C:\\Windows\\SysWow64\\gglwk.dll" f240655687.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\ggqxknqf\ = "{a8c512b0-3455-4370-9ae3-27fe8f22e911}" nnuizp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ColumnHandlers\{6EC11407-5B2E-4E25-8BDF-77445B52AB37}\ = "{6EC11407-5B2E-4E25-8BDF-77445B52AB37}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9b3dd5fc-2e69-4878-b78f-f296539f4b8b} f240655687.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{a8c512b0-3455-4370-9ae3-27fe8f22e911}\ = "rrirjeie.class" nnuizp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{a8c512b0-3455-4370-9ae3-27fe8f22e911}\InProcServer32\ThreadingModel = "Apartment" nnuizp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9b3dd5fc-2e69-4878-b78f-f296539f4b8b}\InProcServer32 f240655687.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{a8c512b0-3455-4370-9ae3-27fe8f22e911}\InProcServer32 nnuizp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{a8c512b0-3455-4370-9ae3-27fe8f22e911}\ProgId nnuizp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{a8c512b0-3455-4370-9ae3-27fe8f22e911}\ProgId\ = "rrirjeie.class" nnuizp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6EC11407-5B2E-4E25-8BDF-77445B52AB37}\ProgId\ = "Columns class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9b3dd5fc-2e69-4878-b78f-f296539f4b8b}\InProcServer32\ThreadingModel = "Apartment" f240655687.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\ggqxknqf nnuizp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9b3dd5fc-2e69-4878-b78f-f296539f4b8b}\ProgId f240655687.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{a8c512b0-3455-4370-9ae3-27fe8f22e911} nnuizp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{a8c512b0-3455-4370-9ae3-27fe8f22e911}\InProcServer32\ = "C:\\Windows\\SysWow64\\gglwk.dll" nnuizp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6EC11407-5B2E-4E25-8BDF-77445B52AB37}\ = "Columns class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ColumnHandlers\{6EC11407-5B2E-4E25-8BDF-77445B52AB37} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\ggqxknqf f240655687.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\ggqxknqf\ = "{9b3dd5fc-2e69-4878-b78f-f296539f4b8b}" f240655687.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 968 wrote to memory of 3252 968 682db5558ce11329c208eb7e0632e63e.exe 88 PID 968 wrote to memory of 3252 968 682db5558ce11329c208eb7e0632e63e.exe 88 PID 968 wrote to memory of 3252 968 682db5558ce11329c208eb7e0632e63e.exe 88 PID 968 wrote to memory of 4984 968 682db5558ce11329c208eb7e0632e63e.exe 89 PID 968 wrote to memory of 4984 968 682db5558ce11329c208eb7e0632e63e.exe 89 PID 968 wrote to memory of 4984 968 682db5558ce11329c208eb7e0632e63e.exe 89 PID 4984 wrote to memory of 1564 4984 f240655687.exe 90 PID 4984 wrote to memory of 1564 4984 f240655687.exe 90 PID 4984 wrote to memory of 1564 4984 f240655687.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\682db5558ce11329c208eb7e0632e63e.exe"C:\Users\Admin\AppData\Local\Temp\682db5558ce11329c208eb7e0632e63e.exe"1⤵
- Checks computer location settings
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Drops file in Windows directory
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s C:\Windows\system32\wuauclt.dll2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies registry class
PID:3252
-
-
C:\Users\Admin\AppData\Local\Temp\f240655687.exe"C:\Users\Admin\AppData\Local\Temp\f240655687.exe" first_run2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Drops file in Windows directory
- Checks processor information in registry
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\SysWOW64\nnuizp.exefirst_run3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Checks processor information in registry
- Modifies registry class
PID:1564
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
458KB
MD5a45be0d070560ede89a8fe489ff23c75
SHA1a306186ff34f3381b8b79ec05dd382a5ae71297a
SHA2569e640592b917e6aa0108cb050fc2c30ae420f44c9abb333c58a301e60ba6309e
SHA5121b1eae5fcfb18c951032b9ba74e5ffe8b2f2c4de203c6c7110453731793f3a4b6f94dc4eb9ed6a29b842de49493000c373e1b9ac631901087f6054e47df261e3
-
Filesize
163KB
MD5eabbb6f57dac51f65b7fa7ad44dc0c85
SHA170b89bb6eda284e71271f35497f0309cde69fea7
SHA2567907745f5df59442b6a80ceb8dfbcbf139c41580e5cfad5969c92090b0e711fa
SHA512fb57dad1ca7957ff11bd915e66035380daf0ab2c78c41592bc0c5b6f326b138940737279e04248497fc58972a805fd5d7583a917f59dfc40b84e3cd2f093ecd3
-
Filesize
130KB
MD578d4c669c1f3268b6cfc493e08df9d20
SHA1bc54b50630a72c86d503f435459112cac1aa9989
SHA256484e60c78e02266e8857f95511c3f2b2a7714020051b615fc5c8e6c6b1a4c5b7
SHA5125a6b2904648337b6d32cc42f6aa45733c39f0a3590a2fb8547fc02f367fc882c046ade108e159c07d3f484e37118d4894972b1edf99546ce898f762355712a34
-
Filesize
176KB
MD5e1900e1e64c730073c74c7bd72ef8f3e
SHA1f2a2faf02d532bf9f2c209d349c580f4525ad19a
SHA256b792a3a2b46072f6c0ef11cc0e0b4366af25a4a43e5a94476b6e387e765a1e25
SHA5129256d304e6cfb52a070276d026eb86eec713fa6054092e9d977a5b734f240cc8d767f7f1117347fe4c50f516736339e34839d7614fd603eef4d4a797e1cd0722
-
Filesize
313KB
MD54fd0c59d7dfa4e238e704042e115864c
SHA1e3f8297e16ea22799b443095ea6d0bfe4e6c622d
SHA256bc4c9ef3ee9a6bea320832e546fc71a11d8cfa1b149622b223c5fb8c2f823cd7
SHA51232303d861c733730f4b5acdf0aa7a8aa7bf44357b5cc1680441f4a1ab022d5d51ec6bf7e7945cd7b0f829f3baa1445b6c9b3fe7af6ceb855269dbbd7863aeccd
-
Filesize
156KB
MD56451095f639ab38909988e41432f1a43
SHA10d5839203d8b31bb23ab5746019ea45b5545da2c
SHA25634ce0665cbd0125173995e8051ee5a62dbadeeb6041a1da1b74811db0a41311e
SHA512cc008c301865028adee899f80223491dd2439bcb812cc66869d1c28d1cb75427c93b3248e2718ab4abef9b5d5895e33cb4f4f3fa24cd302760055dcee4fef7e2
-
Filesize
34B
MD59b5f0786ded1e8ede6bb244849e030a9
SHA1f2c88a2b52813067f98c7b8bf4c081a2d48f2a1d
SHA2560fa925a391d09f322f4febc9d2ce2183935b0d1b2df4b5d88cb0d27fe54db73d
SHA5123f29778a5362f9779f6927d55d2aeb2401d4dbfd430c562fa8d28d40302c2998cf81e174e92aa82d88594a6b843f9800915b8aa2f20bece273670b97d8d35ecd