Analysis

  • max time kernel
    142s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/01/2024, 09:14

General

  • Target

    PSPMencoder.exe

  • Size

    2.5MB

  • MD5

    11b559690c77f4ede4ec202bcac57dc0

  • SHA1

    18bf6f19ff69d834746cbcd913bdaf8e36b6005d

  • SHA256

    8b48ad51da280c7b40e1126d5bcadf5407f9fb45788323c9b9a3bffe384b0817

  • SHA512

    89d1e9a0e3f9c23268921ddda7f495629e7781df5e758681144ce1d08c2ddf36d9e38ad5ae8115bec66e5423028eb9bab85d8f2825764abdb452deae4e064585

  • SSDEEP

    49152:kMkl9vyAXNPCzvqNGgVvAtjpjEwBl5+NA2qlsGSfFC4LcWoRCdUPjRUiZ:6vN9VvAtjpjEwBlANA28rSf1oRCdUPjF

Score
7/10

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs 8 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 17 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PSPMencoder.exe
    "C:\Users\Admin\AppData\Local\Temp\PSPMencoder.exe"
    1⤵
    • Enumerates connected drives
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4484
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32 "C:\Users\Admin\AppData\Local\Temp\QvodInsert.dll" /s
      2⤵
        PID:5076
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32 "C:\Users\Admin\AppData\Local\Temp\VnetClinfo.ocx" /s
        2⤵
        • Modifies registry class
        PID:4116
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c regtvdllCCTVUpdateInstall.dll.bat
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:396
        • C:\Windows\SysWOW64\regsvr32.exe
          regsvr32 "C:\Users\Admin\AppData\Local\Temp\mod\CCTVUpdateInstall.dll" /s
          3⤵
          • Registers COM server for autorun
          • Modifies registry class
          PID:4772
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c regtvdllCCTVPlayer.ocx.bat
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1608
        • C:\Windows\SysWOW64\regsvr32.exe
          regsvr32 "C:\Users\Admin\AppData\Local\Temp\mod\CCTVPlayer.ocx" /s
          3⤵
          • Registers COM server for autorun
          • Modifies registry class
          PID:3000
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c regtvdllReli_CCTV.dll.bat
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4300
        • C:\Windows\SysWOW64\regsvr32.exe
          regsvr32 "C:\Users\Admin\AppData\Local\Temp\mod\Reli_CCTV.dll" /s
          3⤵
          • Modifies registry class
          PID:4328

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML.bak

      Filesize

      9KB

      MD5

      7050d5ae8acfbe560fa11073fef8185d

      SHA1

      5bc38e77ff06785fe0aec5a345c4ccd15752560e

      SHA256

      cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

      SHA512

      a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

    • C:\Users\Admin\AppData\Local\Temp\QvodCfg.ini

      Filesize

      292B

      MD5

      a671d3d075bd4fb6e24efbd2ff6b984a

      SHA1

      ec6cc7b141cdd5cd45a198dd20878f8038364040

      SHA256

      b315b489492b336207dea7f9a956d1da68405ddac8f5e0b81b14d5dead1e1f29

      SHA512

      bc194acfd64d274febee0d6876544c3a3ee759f84ecc0c4b098d1a88d2e26405f6c4d19d320b7ca63ff94f1e07e798eabbfbc3bebcf38489599c9b60207a56b2

    • C:\Users\Admin\AppData\Local\Temp\config.dll

      Filesize

      185B

      MD5

      3c67e841ee3260bdade7cfd0256d2bb0

      SHA1

      427ec711687486e7e44424ed3ca7c3d439931b28

      SHA256

      e8f9b15786e1954715fd0a238be23a336ac8530d19bb3df56b725b567273ca02

      SHA512

      b72cf0983ec465bfcf7a0835488426b4a00c14404f1bef183e966793f5cc8ee8034ef7f5d001b0efea1e20ffe41082849f22bd1932b27f454a1b3851b3ff15ac

    • C:\Users\Admin\AppData\Local\Temp\regtvdllCCTVPlayer.ocx.bat

      Filesize

      122B

      MD5

      c444d18db692685402218008375621d5

      SHA1

      16df7100180f98f284f7e1e03b12ad2acd67bfbe

      SHA256

      cdc0acafbe9318790cc423af79b78dbe1312566177f7968f193f0538948ed31d

      SHA512

      7ad2265cfb2995c738652accc6e4a52ca1b8360594e54687a01972954f6179ff7228ab1ab075387b7b2b14780b7b58235312288b39b781031a87e614ff5f4784

    • C:\Users\Admin\AppData\Local\Temp\regtvdllCCTVUpdateInstall.dll.bat

      Filesize

      136B

      MD5

      093157afd2189f85f6ff43f1c7d346f7

      SHA1

      fa3bf14e8815b35ce8e7ee82d3007f06321c2b5e

      SHA256

      f049fa2c8465660a3b10db1ecb6bc9e0d2aaa1e5176ee2b90e1ac6fc1a561a75

      SHA512

      df5b31570160516330f6a553dbe69ebb496107df6efa0023baa3f019fad7f5cd6da66c5a80116adbd344e3068086eba6068793c5309a1ee59b4c5306bb6ba62a

    • C:\Users\Admin\AppData\Local\Temp\regtvdllReli_CCTV.dll.bat

      Filesize

      120B

      MD5

      a3b3e0b89cf93ff854bac31c0f5dd47e

      SHA1

      0d92e673cc424d60eab529d8af01148fb106825b

      SHA256

      414e23a013713aadcc561d23d04f62c95b8f74c47fef2cdd6e1c67baae4db06f

      SHA512

      d98f8826f43a1642c23110b2c21538a145ae2ce54379deb6f55c2a291a3726337c48b519631dee7904be7810e08d21f7d3434024cda1bb1220997ec397583c61

    • memory/3000-85-0x0000000010000000-0x00000000100F0000-memory.dmp

      Filesize

      960KB

    • memory/4116-2-0x0000000000EA0000-0x0000000000EAD000-memory.dmp

      Filesize

      52KB

    • memory/4484-87-0x00000000047F0000-0x0000000004C6C000-memory.dmp

      Filesize

      4.5MB

    • memory/4484-86-0x0000000010000000-0x00000000100F0000-memory.dmp

      Filesize

      960KB

    • memory/4484-89-0x0000000004660000-0x0000000004661000-memory.dmp

      Filesize

      4KB

    • memory/4484-118-0x0000000010000000-0x00000000100F0000-memory.dmp

      Filesize

      960KB

    • memory/4484-120-0x0000000004660000-0x0000000004661000-memory.dmp

      Filesize

      4KB

    • memory/4772-84-0x0000000010000000-0x000000001001E000-memory.dmp

      Filesize

      120KB