Overview
overview
8Static
static
3spvod_player.exe
windows7-x64
8spvod_player.exe
windows10-2004-x64
8$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$SYSDIR/pncrt.dll
windows7-x64
3$SYSDIR/pncrt.dll
windows10-2004-x64
3Codecs/Rea...er.dll
windows7-x64
1Codecs/Rea...er.dll
windows10-2004-x64
1Codecs/WMFDemux.dll
windows7-x64
1Codecs/WMFDemux.dll
windows10-2004-x64
1Codecs/asyncflt.dll
windows7-x64
1Codecs/asyncflt.dll
windows10-2004-x64
1Codecs/atrc.dll
windows7-x64
1Codecs/atrc.dll
windows10-2004-x64
1Codecs/cook.dll
windows7-x64
1Codecs/cook.dll
windows10-2004-x64
1Codecs/drvc.dll
windows7-x64
3Codecs/drvc.dll
windows10-2004-x64
3Codecs/msvcr71.dll
windows7-x64
3Codecs/msvcr71.dll
windows10-2004-x64
3Codecs/raac.dll
windows7-x64
1Codecs/raac.dll
windows10-2004-x64
1GifShower.dll
windows7-x64
1GifShower.dll
windows10-2004-x64
1Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7vjocx.dll
windows7-x64
8vjocx.dll
windows10-2004-x64
8新云软件.url
windows7-x64
1新云软件.url
windows10-2004-x64
1Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-01-2024 00:28
Static task
static1
Behavioral task
behavioral1
Sample
spvod_player.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
spvod_player.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
$SYSDIR/pncrt.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
$SYSDIR/pncrt.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
Codecs/RealMediaSplitter.dll
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
Codecs/RealMediaSplitter.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
Codecs/WMFDemux.dll
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
Codecs/WMFDemux.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
Codecs/asyncflt.dll
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
Codecs/asyncflt.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral13
Sample
Codecs/atrc.dll
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
Codecs/atrc.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
Codecs/cook.dll
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
Codecs/cook.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
Codecs/drvc.dll
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
Codecs/drvc.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
Codecs/msvcr71.dll
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
Codecs/msvcr71.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
Codecs/raac.dll
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
Codecs/raac.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
GifShower.dll
Resource
win7-20231129-en
Behavioral task
behavioral24
Sample
GifShower.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral25
Sample
Uninstall.exe
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
Uninstall.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral27
Sample
vjocx.dll
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
vjocx.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral29
Sample
新云软件.url
Resource
win7-20231215-en
Behavioral task
behavioral30
Sample
新云软件.url
Resource
win10v2004-20231215-en
General
-
Target
vjocx.dll
-
Size
1.5MB
-
MD5
da162564646da62c40238153a1cbf268
-
SHA1
b0314c89f0060d69f82d1bd057cc0cec84694794
-
SHA256
cfd9e9cd51d43f2366191ff5fefa4446b44961b37f203b943454f228d827d00c
-
SHA512
51c5c881395f516e9f670148e9853ef2ed3583270847cc32d66b39ae4cb72020dc8546ba845da8c8c132d24e489987987f8c0dae5b858c70dbc0e7bef5612393
-
SSDEEP
24576:w+giCmGVhE+TatkF+OtwxDgQuqcPSx4Da:QZFV0Rbjx4Da
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\vvdsvc\Parameters\ServiceDll = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vjocx.dll" regsvr32.exe -
Modifies registry class 58 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VJ.VodClient.1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D4003189-95B1-4A2F-9A87-F2B03665960D}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1D416E10-79D7-4F06-9ED8-C4DF23AA6DF6}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VJ.VodClient.1\CLSID\ = "{D4003189-95B1-4A2F-9A87-F2B03665960D}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VJ.VodClient regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D4003189-95B1-4A2F-9A87-F2B03665960D}\Control regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D4003189-95B1-4A2F-9A87-F2B03665960D}\ToolboxBitmap32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vjocx.dll, 1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D4003189-95B1-4A2F-9A87-F2B03665960D}\MiscStatus\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D4003189-95B1-4A2F-9A87-F2B03665960D}\Implemented Categories\{7DD95802-9882-11CF-9FA9-00AA006C42C4} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1D416E10-79D7-4F06-9ED8-C4DF23AA6DF6}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D4003189-95B1-4A2F-9A87-F2B03665960D}\AppID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D4003189-95B1-4A2F-9A87-F2B03665960D}\Implemented Categories\{7DD95801-9882-11CF-9FA9-00AA006C42C4} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1D416E10-79D7-4F06-9ED8-C4DF23AA6DF6}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{071825D4-FA84-45A6-A82F-B492DD197E3B}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D4003189-95B1-4A2F-9A87-F2B03665960D}\ = "VodClient Control Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{071825D4-FA84-45A6-A82F-B492DD197E3B}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{071825D4-FA84-45A6-A82F-B492DD197E3B}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VJ.VodClient.1\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D4003189-95B1-4A2F-9A87-F2B03665960D}\MiscStatus\1\ = "131473" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1D416E10-79D7-4F06-9ED8-C4DF23AA6DF6}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vjocx.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VJ.VodClient\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{071825D4-FA84-45A6-A82F-B492DD197E3B}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{071825D4-FA84-45A6-A82F-B492DD197E3B}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D4003189-95B1-4A2F-9A87-F2B03665960D}\InprocServer32\ThreadingModel = "apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D4003189-95B1-4A2F-9A87-F2B03665960D}\Version regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1D416E10-79D7-4F06-9ED8-C4DF23AA6DF6}\1.0\FLAGS\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{071825D4-FA84-45A6-A82F-B492DD197E3B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{071825D4-FA84-45A6-A82F-B492DD197E3B}\TypeLib\ = "{1D416E10-79D7-4F06-9ED8-C4DF23AA6DF6}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VJ.VodClient\CurVer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D4003189-95B1-4A2F-9A87-F2B03665960D}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D4003189-95B1-4A2F-9A87-F2B03665960D}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vjocx.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D4003189-95B1-4A2F-9A87-F2B03665960D}\ToolboxBitmap32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D4003189-95B1-4A2F-9A87-F2B03665960D}\TypeLib\ = "{1D416E10-79D7-4F06-9ED8-C4DF23AA6DF6}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D4003189-95B1-4A2F-9A87-F2B03665960D}\Implemented Categories regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{071825D4-FA84-45A6-A82F-B492DD197E3B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D4003189-95B1-4A2F-9A87-F2B03665960D}\ProgID\ = "VJ.VodClient.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{071825D4-FA84-45A6-A82F-B492DD197E3B}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VJ.VodClient\CurVer\ = "VJ.VodClient.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D4003189-95B1-4A2F-9A87-F2B03665960D}\MiscStatus regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D4003189-95B1-4A2F-9A87-F2B03665960D}\MiscStatus\1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D4003189-95B1-4A2F-9A87-F2B03665960D} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D4003189-95B1-4A2F-9A87-F2B03665960D}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1D416E10-79D7-4F06-9ED8-C4DF23AA6DF6}\1.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D4003189-95B1-4A2F-9A87-F2B03665960D}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1D416E10-79D7-4F06-9ED8-C4DF23AA6DF6}\1.0\ = "vodClient 1.0 ÀàÐÍ¿â" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1D416E10-79D7-4F06-9ED8-C4DF23AA6DF6}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{071825D4-FA84-45A6-A82F-B492DD197E3B} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{071825D4-FA84-45A6-A82F-B492DD197E3B} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VJ.VodClient.1\ = "VodClient Control Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1D416E10-79D7-4F06-9ED8-C4DF23AA6DF6}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{071825D4-FA84-45A6-A82F-B492DD197E3B}\ = "ICVodClient" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VJ.VodClient\ = "VodClient Control Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D4003189-95B1-4A2F-9A87-F2B03665960D}\Version\ = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{071825D4-FA84-45A6-A82F-B492DD197E3B}\TypeLib\ = "{1D416E10-79D7-4F06-9ED8-C4DF23AA6DF6}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VJ.VodClient\CLSID\ = "{D4003189-95B1-4A2F-9A87-F2B03665960D}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D4003189-95B1-4A2F-9A87-F2B03665960D}\VersionIndependentProgID\ = "VJ.VodClient" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1D416E10-79D7-4F06-9ED8-C4DF23AA6DF6} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{071825D4-FA84-45A6-A82F-B492DD197E3B}\ = "ICVodClient" regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1320 wrote to memory of 860 1320 regsvr32.exe 28 PID 1320 wrote to memory of 860 1320 regsvr32.exe 28 PID 1320 wrote to memory of 860 1320 regsvr32.exe 28 PID 1320 wrote to memory of 860 1320 regsvr32.exe 28 PID 1320 wrote to memory of 860 1320 regsvr32.exe 28 PID 1320 wrote to memory of 860 1320 regsvr32.exe 28 PID 1320 wrote to memory of 860 1320 regsvr32.exe 28
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\vjocx.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\vjocx.dll2⤵
- Sets DLL path for service in the registry
- Modifies registry class
PID:860
-