Overview
overview
7Static
static
37b6e0e0a98...92.exe
windows7-x64
77b6e0e0a98...92.exe
windows10-2004-x64
7$TEMP/DSCT...30.dll
windows7-x64
1$TEMP/DSCT...30.dll
windows10-2004-x64
3$TEMP/DSCertEx.dll
windows7-x64
1$TEMP/DSCertEx.dll
windows10-2004-x64
1$TEMP/Mobi...32.dll
windows7-x64
1$TEMP/Mobi...32.dll
windows10-2004-x64
3$TEMP/NFil...eb.dll
windows7-x64
3$TEMP/NFil...eb.dll
windows10-2004-x64
3$TEMP/NpkiCard.dll
windows7-x64
1$TEMP/NpkiCard.dll
windows10-2004-x64
3$TEMP/SCSKAPPLink.dll
windows7-x64
1$TEMP/SCSKAPPLink.dll
windows10-2004-x64
1$TEMP/UBIK...In.exe
windows7-x64
7$TEMP/UBIK...In.exe
windows10-2004-x64
7$TEMP/UBIK...ce.exe
windows7-x64
1$TEMP/UBIK...ce.exe
windows10-2004-x64
1$TEMP/UbiKey.dll
windows7-x64
1$TEMP/UbiKey.dll
windows10-2004-x64
3$TEMP/UbiK...ll.exe
windows7-x64
1$TEMP/UbiK...ll.exe
windows10-2004-x64
1$TEMP/UbiKeyWin32.dll
windows7-x64
1$TEMP/UbiKeyWin32.dll
windows10-2004-x64
1$TEMP/Ubik...to.dll
windows7-x64
1$TEMP/Ubik...to.dll
windows10-2004-x64
1$TEMP/certadm.dll
windows7-x64
1$TEMP/certadm.dll
windows10-2004-x64
1$TEMP/certcli.dll
windows7-x64
1$TEMP/certcli.dll
windows10-2004-x64
1$TEMP/certutil.exe
windows7-x64
1$TEMP/certutil.exe
windows10-2004-x64
1Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
27/01/2024, 22:19
Static task
static1
Behavioral task
behavioral1
Sample
7b6e0e0a9844777fe52da9bd0a573d92.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7b6e0e0a9844777fe52da9bd0a573d92.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
$TEMP/DSCToolkitV30.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$TEMP/DSCToolkitV30.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
$TEMP/DSCertEx.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
$TEMP/DSCertEx.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
$TEMP/MobileCertWin32.dll
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
$TEMP/MobileCertWin32.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral9
Sample
$TEMP/NFilterOpenWeb.dll
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
$TEMP/NFilterOpenWeb.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
$TEMP/NpkiCard.dll
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
$TEMP/NpkiCard.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
$TEMP/SCSKAPPLink.dll
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
$TEMP/SCSKAPPLink.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
$TEMP/UBIKeyPlugIn.exe
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
$TEMP/UBIKeyPlugIn.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
$TEMP/UBIKeyService.exe
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
$TEMP/UBIKeyService.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
$TEMP/UbiKey.dll
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
$TEMP/UbiKey.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
$TEMP/UbiKeyUninstall.exe
Resource
win7-20231129-en
Behavioral task
behavioral22
Sample
$TEMP/UbiKeyUninstall.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral23
Sample
$TEMP/UbiKeyWin32.dll
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
$TEMP/UbiKeyWin32.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral25
Sample
$TEMP/UbikeyCrypto.dll
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
$TEMP/UbikeyCrypto.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
$TEMP/certadm.dll
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
$TEMP/certadm.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral29
Sample
$TEMP/certcli.dll
Resource
win7-20231215-en
Behavioral task
behavioral30
Sample
$TEMP/certcli.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
$TEMP/certutil.exe
Resource
win7-20231215-en
Behavioral task
behavioral32
Sample
$TEMP/certutil.exe
Resource
win10v2004-20231222-en
General
-
Target
$TEMP/UBIKeyPlugIn.exe
-
Size
65KB
-
MD5
a4aceddcc388b5f27099e45eee5491be
-
SHA1
e417a140ba3b047a8ca81c10117ade245d0f1571
-
SHA256
9b798ac9ebf4d526082b55a83764217345dee83cc95c43ce0ac363b24e186646
-
SHA512
67649a58009979075c3a5fe19c4b5b60083d432b3849602fd35a868c8aac603c988e96095f01cceac1a140524b5ddd84327f62e32581afce627e6601d58daee3
-
SSDEEP
1536:fLv+zvAOsOn/7UJKarrMnnP3o94eh3hYE:QHnnwJKa0nP3o9HAE
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\UBIKey = "\"C:\\Program Files (x86)\\INFovine\\UBIKeyService.exe\"" UBIKeyPlugIn.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 2556 netsh.exe 2896 netsh.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\UbiKey.dll UBIKeyPlugIn.exe File opened for modification C:\Windows\SysWOW64\UbiKey.dll UBIKeyPlugIn.exe File created C:\Windows\SysWOW64\UbiKeyWin32.dll UBIKeyPlugIn.exe File created C:\Windows\SysWOW64\UbiKeyUninstall.exe UBIKeyPlugIn.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 18 IoCs
description ioc Process File created C:\Program Files (x86)\INFovine\oid.ifv UBIKeyPlugIn.exe File created C:\Program Files (x86)\INFovine\UbikeyCrypto.dll UBIKeyPlugIn.exe File created C:\Program Files (x86)\INFovine\kdfapi2.dll UBIKeyPlugIn.exe File created C:\Program Files (x86)\INFovine\UBIKey_Root.key UBIKeyPlugIn.exe File created C:\Program Files (x86)\INFovine\list.ifv UBIKeyPlugIn.exe File created C:\Program Files (x86)\INFovine\DSCToolkitV30.dll UBIKeyPlugIn.exe File created C:\Program Files (x86)\INFovine\MobileCertWin32.dll UBIKeyPlugIn.exe File created C:\Program Files (x86)\INFovine\UBIKey_svr.key UBIKeyPlugIn.exe File created C:\Program Files (x86)\INFovine\SCSKAPPLink.dll UBIKeyPlugIn.exe File created C:\Program Files (x86)\INFovine\NFilterOpenWeb.dll UBIKeyPlugIn.exe File created C:\Program Files (x86)\INFovine\UBIKeyService.exe UBIKeyPlugIn.exe File created C:\Program Files (x86)\INFovine\UBIKey_svr.crt UBIKeyPlugIn.exe File created C:\Program Files (x86)\INFovine\UBIKey_Root.crt UBIKeyPlugIn.exe File created C:\Program Files (x86)\INFovine\DSCertEx.dll UBIKeyPlugIn.exe File created C:\Program Files (x86)\INFovine\mc.ifv UBIKeyPlugIn.exe File created C:\Program Files (x86)\INFovine\NpkiCard.dll UBIKeyPlugIn.exe File created C:\Program Files (x86)\INFovine\sc.ifv UBIKeyPlugIn.exe File created C:\Program Files (x86)\INFovine\msvcr120.dll UBIKeyPlugIn.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\certutil.log certutil_win.exe -
Executes dropped EXE 1 IoCs
pid Process 2952 UbikeyService.exe -
Loads dropped DLL 9 IoCs
pid Process 832 UBIKeyPlugIn.exe 832 UBIKeyPlugIn.exe 832 UBIKeyPlugIn.exe 832 UBIKeyPlugIn.exe 832 UBIKeyPlugIn.exe 832 UBIKeyPlugIn.exe 832 UBIKeyPlugIn.exe 832 UBIKeyPlugIn.exe 832 UBIKeyPlugIn.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 832 UBIKeyPlugIn.exe 2952 UbikeyService.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 832 UBIKeyPlugIn.exe 832 UBIKeyPlugIn.exe 832 UBIKeyPlugIn.exe 2952 UbikeyService.exe 2952 UbikeyService.exe 2952 UbikeyService.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 832 wrote to memory of 2848 832 UBIKeyPlugIn.exe 28 PID 832 wrote to memory of 2848 832 UBIKeyPlugIn.exe 28 PID 832 wrote to memory of 2848 832 UBIKeyPlugIn.exe 28 PID 832 wrote to memory of 2848 832 UBIKeyPlugIn.exe 28 PID 832 wrote to memory of 2072 832 UBIKeyPlugIn.exe 30 PID 832 wrote to memory of 2072 832 UBIKeyPlugIn.exe 30 PID 832 wrote to memory of 2072 832 UBIKeyPlugIn.exe 30 PID 832 wrote to memory of 2072 832 UBIKeyPlugIn.exe 30 PID 832 wrote to memory of 2612 832 UBIKeyPlugIn.exe 32 PID 832 wrote to memory of 2612 832 UBIKeyPlugIn.exe 32 PID 832 wrote to memory of 2612 832 UBIKeyPlugIn.exe 32 PID 832 wrote to memory of 2612 832 UBIKeyPlugIn.exe 32 PID 832 wrote to memory of 2748 832 UBIKeyPlugIn.exe 34 PID 832 wrote to memory of 2748 832 UBIKeyPlugIn.exe 34 PID 832 wrote to memory of 2748 832 UBIKeyPlugIn.exe 34 PID 832 wrote to memory of 2748 832 UBIKeyPlugIn.exe 34 PID 832 wrote to memory of 2556 832 UBIKeyPlugIn.exe 36 PID 832 wrote to memory of 2556 832 UBIKeyPlugIn.exe 36 PID 832 wrote to memory of 2556 832 UBIKeyPlugIn.exe 36 PID 832 wrote to memory of 2556 832 UBIKeyPlugIn.exe 36 PID 832 wrote to memory of 2896 832 UBIKeyPlugIn.exe 38 PID 832 wrote to memory of 2896 832 UBIKeyPlugIn.exe 38 PID 832 wrote to memory of 2896 832 UBIKeyPlugIn.exe 38 PID 832 wrote to memory of 2896 832 UBIKeyPlugIn.exe 38 PID 832 wrote to memory of 2952 832 UBIKeyPlugIn.exe 40 PID 832 wrote to memory of 2952 832 UBIKeyPlugIn.exe 40 PID 832 wrote to memory of 2952 832 UBIKeyPlugIn.exe 40 PID 832 wrote to memory of 2952 832 UBIKeyPlugIn.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\$TEMP\UBIKeyPlugIn.exe"C:\Users\Admin\AppData\Local\Temp\$TEMP\UBIKeyPlugIn.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Users\Admin\AppData\Local\Temp\$TEMP\certutil_win.exe"C:\Users\Admin\AppData\Local\Temp\$TEMP\certutil_win.exe" -addstore root UBIKey_Root.crt2⤵
- Drops file in Windows directory
PID:2848
-
-
C:\Users\Admin\AppData\Local\Temp\$TEMP\certutil.exe"C:\Users\Admin\AppData\Local\Temp\$TEMP\certutil.exe" -D -n UBIKey -d "C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\x5f9h1ra.Admin"2⤵PID:2072
-
-
C:\Users\Admin\AppData\Local\Temp\$TEMP\certutil.exe"C:\Users\Admin\AppData\Local\Temp\$TEMP\certutil.exe" -A -n UBIKey -t "CT,C,c" -i UBIKey_Root.crt -d "C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\x5f9h1ra.Admin"2⤵PID:2612
-
-
C:\Users\Admin\AppData\Local\Temp\$TEMP\certutil.exe"C:\Users\Admin\AppData\Local\Temp\$TEMP\certutil.exe" -A -n UBIKey -t "CT,C,c" -i UBIKey_Root.crt -d sql:"C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\x5f9h1ra.Admin"2⤵PID:2748
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" firewall add allowedprogram "C:\Program Files (x86)\INFovine\UbikeyService.exe" "UBIKey" ENABLE2⤵
- Modifies Windows Firewall
PID:2556
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" firewall show2⤵
- Modifies Windows Firewall
PID:2896
-
-
C:\Program Files (x86)\INFovine\UbikeyService.exe"C:\Program Files (x86)\INFovine\UbikeyService.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2952
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD558141645c3c353c9d31e7622381f38f8
SHA1afa438affd318103d12fdd0f40841f5e00dcd247
SHA256f2fcfba20bfe42a6aa1466e4e2d04f01c47fe878d217f95ccb249621151c2fa0
SHA5121a428c3620ca74450f8d5eddd2e49f6c6c5fac196b55edd2091d59952718dc4daa0b328b7d8f5f96767a1426be6016b5d5da30f3fbf804ad4e9d95d1791866a1
-
Filesize
1KB
MD59aa54a652397bdcc2b241c94d54dad52
SHA1b095cd09752c9645390f3cb5d4695a160f6944fc
SHA256f4a1a4aabcf3b044d42a5f79756c22e3aefc6b799b059374282f43ecd04db5ef
SHA51273419d759da7066747c6cd187089eaee856f36d03cdc4cd7db06bfc60a803fbdf27ddd7b52548b67b3a4a6a486c2cce2b558fcb80dee12645adaef797d1f6680
-
Filesize
64KB
MD55ed677ba541f087479591fafb449c336
SHA182b0edf7955102e0eac314dec266f576ffe96e23
SHA256ce54c140c2041a0dbaf95b8b095caec358cf260b106f3c312c3a594270c19c00
SHA5123ec79b37741d8153cd289b689a1f2cd05bbc57e40d1543efa5b200302fdd61d3adfc8dae421c62cceb855effce333c9f9764855bea221f9bef51580eb89ad068
-
Filesize
16KB
MD5b8f91a41319231ea653dd6993299c70a
SHA1116690c11c4637e8ffb8a6cd8b977abee9e68098
SHA256a3f55fb3e27f8a9d0e917355912b1d0444a9231f3ef9dc20cd66c4258d34a467
SHA5122d0275c49fbe7f64c6981a5c581d2e73ae74f952a72fa4e92ecb3d3797aa1f5c4d52b88a51e65247454e6e62999e27435457a49ee1d57cf668a21cbe7ef8ecf5
-
Filesize
9KB
MD5e45c3fb0f28fe6590e3d75c785e65c1f
SHA1d96690392e6428cac59bbaa9b2bcdbac27e683e5
SHA256020b3c13b4dc97a12af70e1330d364ff2b17d08b6e4f607f3527ebcf962a2421
SHA512be49505abd641bfd4a1bf6698578dab5951dbd1b254cf540f863f586a76576833d9f52f82810b047582ff379884d7452085b277132e6627c7fbc4733a0246e2f
-
Filesize
16KB
MD57cf160a4d2a0fc7cccc7720186022635
SHA193e47be0853373c4a5714a60444ca0621c53107c
SHA256e263694998d10fe09c887a66ba882feaed87abbd44fb8f7887604dcaac7fafaf
SHA512567e72ed69a020e591735eb0e28519e4962c4602a3d6863df29455752e2f08d0976141c2093e88d7471d9115c24402f74a6a2763586bec041d2cb4565b8b7524
-
Filesize
925KB
MD54e459af1454c80755092c7456cb04259
SHA1456f8a13dc1744c64d2b93da86b6141087c066bc
SHA25653f89189bee930b2512978be079978bcea3bb6004c45d8ccb52d96b51eb22002
SHA5129af836489bf21e3ef8b87e7a33cf7a54d0ccbf15d9bb385c04b1848522ec91bcc5358d85fb8284d922986d4101ee5503c74bc24a5adb5b3355ef1f9f74a5fa1a
-
Filesize
53KB
MD5b89218255384b587056cb1e948c295d5
SHA10b13185c5152a221bc69cf27bccdc8cc9aeb1c7a
SHA25603810ba96b08824141ef982dcdb76c42ef8bd7f91c852ff26120a0b82fba99cb
SHA51248b181547448507c39465942ded6d18da9ff318fbc3abff042d18f70043a471050546b3e0b387b5d689e69baec5a027fb234c935d3068eeee867dc7d4a8b857f
-
Filesize
57KB
MD527ac04ae932f911c29ec56c7e75b7b82
SHA1342459632c0af7d7142475abb3f82b9269f11a1c
SHA256743097d53417609448988f4498d05c780feee5d946b20d6ada023d1597864eb8
SHA5121b233145129b05d2a3650409034825de951e7cfbf3d1f39fcd2debb1e49e916a3f6abbad7d01b424fbc54074e09c3276c48ca648aaac68244ba71ccc6e2dad57