Overview
overview
7Static
static
37b6e0e0a98...92.exe
windows7-x64
77b6e0e0a98...92.exe
windows10-2004-x64
7$TEMP/DSCT...30.dll
windows7-x64
1$TEMP/DSCT...30.dll
windows10-2004-x64
3$TEMP/DSCertEx.dll
windows7-x64
1$TEMP/DSCertEx.dll
windows10-2004-x64
1$TEMP/Mobi...32.dll
windows7-x64
1$TEMP/Mobi...32.dll
windows10-2004-x64
3$TEMP/NFil...eb.dll
windows7-x64
3$TEMP/NFil...eb.dll
windows10-2004-x64
3$TEMP/NpkiCard.dll
windows7-x64
1$TEMP/NpkiCard.dll
windows10-2004-x64
3$TEMP/SCSKAPPLink.dll
windows7-x64
1$TEMP/SCSKAPPLink.dll
windows10-2004-x64
1$TEMP/UBIK...In.exe
windows7-x64
7$TEMP/UBIK...In.exe
windows10-2004-x64
7$TEMP/UBIK...ce.exe
windows7-x64
1$TEMP/UBIK...ce.exe
windows10-2004-x64
1$TEMP/UbiKey.dll
windows7-x64
1$TEMP/UbiKey.dll
windows10-2004-x64
3$TEMP/UbiK...ll.exe
windows7-x64
1$TEMP/UbiK...ll.exe
windows10-2004-x64
1$TEMP/UbiKeyWin32.dll
windows7-x64
1$TEMP/UbiKeyWin32.dll
windows10-2004-x64
1$TEMP/Ubik...to.dll
windows7-x64
1$TEMP/Ubik...to.dll
windows10-2004-x64
1$TEMP/certadm.dll
windows7-x64
1$TEMP/certadm.dll
windows10-2004-x64
1$TEMP/certcli.dll
windows7-x64
1$TEMP/certcli.dll
windows10-2004-x64
1$TEMP/certutil.exe
windows7-x64
1$TEMP/certutil.exe
windows10-2004-x64
1Analysis
-
max time kernel
144s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
27/01/2024, 22:19
Static task
static1
Behavioral task
behavioral1
Sample
7b6e0e0a9844777fe52da9bd0a573d92.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7b6e0e0a9844777fe52da9bd0a573d92.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
$TEMP/DSCToolkitV30.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$TEMP/DSCToolkitV30.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
$TEMP/DSCertEx.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
$TEMP/DSCertEx.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
$TEMP/MobileCertWin32.dll
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
$TEMP/MobileCertWin32.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral9
Sample
$TEMP/NFilterOpenWeb.dll
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
$TEMP/NFilterOpenWeb.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
$TEMP/NpkiCard.dll
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
$TEMP/NpkiCard.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
$TEMP/SCSKAPPLink.dll
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
$TEMP/SCSKAPPLink.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
$TEMP/UBIKeyPlugIn.exe
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
$TEMP/UBIKeyPlugIn.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
$TEMP/UBIKeyService.exe
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
$TEMP/UBIKeyService.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
$TEMP/UbiKey.dll
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
$TEMP/UbiKey.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
$TEMP/UbiKeyUninstall.exe
Resource
win7-20231129-en
Behavioral task
behavioral22
Sample
$TEMP/UbiKeyUninstall.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral23
Sample
$TEMP/UbiKeyWin32.dll
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
$TEMP/UbiKeyWin32.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral25
Sample
$TEMP/UbikeyCrypto.dll
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
$TEMP/UbikeyCrypto.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
$TEMP/certadm.dll
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
$TEMP/certadm.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral29
Sample
$TEMP/certcli.dll
Resource
win7-20231215-en
Behavioral task
behavioral30
Sample
$TEMP/certcli.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
$TEMP/certutil.exe
Resource
win7-20231215-en
Behavioral task
behavioral32
Sample
$TEMP/certutil.exe
Resource
win10v2004-20231222-en
General
-
Target
$TEMP/UBIKeyPlugIn.exe
-
Size
65KB
-
MD5
a4aceddcc388b5f27099e45eee5491be
-
SHA1
e417a140ba3b047a8ca81c10117ade245d0f1571
-
SHA256
9b798ac9ebf4d526082b55a83764217345dee83cc95c43ce0ac363b24e186646
-
SHA512
67649a58009979075c3a5fe19c4b5b60083d432b3849602fd35a868c8aac603c988e96095f01cceac1a140524b5ddd84327f62e32581afce627e6601d58daee3
-
SSDEEP
1536:fLv+zvAOsOn/7UJKarrMnnP3o94eh3hYE:QHnnwJKa0nP3o9HAE
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\UBIKey = "\"C:\\Program Files (x86)\\INFovine\\UBIKeyService.exe\"" UBIKeyPlugIn.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 552 netsh.exe 4380 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\International\Geo\Nation UBIKeyPlugIn.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\UbiKey.dll UBIKeyPlugIn.exe File opened for modification C:\Windows\SysWOW64\UbiKey.dll UBIKeyPlugIn.exe File created C:\Windows\SysWOW64\UbiKeyWin32.dll UBIKeyPlugIn.exe File created C:\Windows\SysWOW64\UbiKeyUninstall.exe UBIKeyPlugIn.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 18 IoCs
description ioc Process File created C:\Program Files (x86)\INFovine\DSCToolkitV30.dll UBIKeyPlugIn.exe File created C:\Program Files (x86)\INFovine\UbikeyCrypto.dll UBIKeyPlugIn.exe File created C:\Program Files (x86)\INFovine\UBIKey_svr.key UBIKeyPlugIn.exe File created C:\Program Files (x86)\INFovine\MobileCertWin32.dll UBIKeyPlugIn.exe File created C:\Program Files (x86)\INFovine\NpkiCard.dll UBIKeyPlugIn.exe File created C:\Program Files (x86)\INFovine\kdfapi2.dll UBIKeyPlugIn.exe File created C:\Program Files (x86)\INFovine\UBIKey_svr.crt UBIKeyPlugIn.exe File created C:\Program Files (x86)\INFovine\list.ifv UBIKeyPlugIn.exe File created C:\Program Files (x86)\INFovine\DSCertEx.dll UBIKeyPlugIn.exe File created C:\Program Files (x86)\INFovine\oid.ifv UBIKeyPlugIn.exe File created C:\Program Files (x86)\INFovine\sc.ifv UBIKeyPlugIn.exe File created C:\Program Files (x86)\INFovine\UBIKeyService.exe UBIKeyPlugIn.exe File created C:\Program Files (x86)\INFovine\UBIKey_Root.crt UBIKeyPlugIn.exe File created C:\Program Files (x86)\INFovine\msvcr120.dll UBIKeyPlugIn.exe File created C:\Program Files (x86)\INFovine\mc.ifv UBIKeyPlugIn.exe File created C:\Program Files (x86)\INFovine\SCSKAPPLink.dll UBIKeyPlugIn.exe File created C:\Program Files (x86)\INFovine\NFilterOpenWeb.dll UBIKeyPlugIn.exe File created C:\Program Files (x86)\INFovine\UBIKey_Root.key UBIKeyPlugIn.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\certutil.log certutil_win.exe -
Executes dropped EXE 1 IoCs
pid Process 3532 UbikeyService.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3180 UBIKeyPlugIn.exe 3180 UBIKeyPlugIn.exe 3532 UbikeyService.exe 3532 UbikeyService.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3180 UBIKeyPlugIn.exe 3180 UBIKeyPlugIn.exe 3180 UBIKeyPlugIn.exe 3532 UbikeyService.exe 3532 UbikeyService.exe 3532 UbikeyService.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3180 wrote to memory of 2900 3180 UBIKeyPlugIn.exe 87 PID 3180 wrote to memory of 2900 3180 UBIKeyPlugIn.exe 87 PID 3180 wrote to memory of 2900 3180 UBIKeyPlugIn.exe 87 PID 3180 wrote to memory of 4128 3180 UBIKeyPlugIn.exe 91 PID 3180 wrote to memory of 4128 3180 UBIKeyPlugIn.exe 91 PID 3180 wrote to memory of 4128 3180 UBIKeyPlugIn.exe 91 PID 3180 wrote to memory of 2240 3180 UBIKeyPlugIn.exe 93 PID 3180 wrote to memory of 2240 3180 UBIKeyPlugIn.exe 93 PID 3180 wrote to memory of 2240 3180 UBIKeyPlugIn.exe 93 PID 3180 wrote to memory of 1440 3180 UBIKeyPlugIn.exe 95 PID 3180 wrote to memory of 1440 3180 UBIKeyPlugIn.exe 95 PID 3180 wrote to memory of 1440 3180 UBIKeyPlugIn.exe 95 PID 3180 wrote to memory of 4380 3180 UBIKeyPlugIn.exe 97 PID 3180 wrote to memory of 4380 3180 UBIKeyPlugIn.exe 97 PID 3180 wrote to memory of 4380 3180 UBIKeyPlugIn.exe 97 PID 3180 wrote to memory of 552 3180 UBIKeyPlugIn.exe 99 PID 3180 wrote to memory of 552 3180 UBIKeyPlugIn.exe 99 PID 3180 wrote to memory of 552 3180 UBIKeyPlugIn.exe 99 PID 3180 wrote to memory of 3532 3180 UBIKeyPlugIn.exe 101 PID 3180 wrote to memory of 3532 3180 UBIKeyPlugIn.exe 101 PID 3180 wrote to memory of 3532 3180 UBIKeyPlugIn.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\$TEMP\UBIKeyPlugIn.exe"C:\Users\Admin\AppData\Local\Temp\$TEMP\UBIKeyPlugIn.exe"1⤵
- Adds Run key to start application
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Users\Admin\AppData\Local\Temp\$TEMP\certutil_win.exe"C:\Users\Admin\AppData\Local\Temp\$TEMP\certutil_win.exe" -addstore root UBIKey_Root.crt2⤵
- Drops file in Windows directory
PID:2900
-
-
C:\Users\Admin\AppData\Local\Temp\$TEMP\certutil.exe"C:\Users\Admin\AppData\Local\Temp\$TEMP\certutil.exe" -D -n UBIKey -d "C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\b47qywhs.Admin"2⤵PID:4128
-
-
C:\Users\Admin\AppData\Local\Temp\$TEMP\certutil.exe"C:\Users\Admin\AppData\Local\Temp\$TEMP\certutil.exe" -A -n UBIKey -t "CT,C,c" -i UBIKey_Root.crt -d "C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\b47qywhs.Admin"2⤵PID:2240
-
-
C:\Users\Admin\AppData\Local\Temp\$TEMP\certutil.exe"C:\Users\Admin\AppData\Local\Temp\$TEMP\certutil.exe" -A -n UBIKey -t "CT,C,c" -i UBIKey_Root.crt -d sql:"C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\b47qywhs.Admin"2⤵PID:1440
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" firewall add allowedprogram "C:\Program Files (x86)\INFovine\UbikeyService.exe" "UBIKey" ENABLE2⤵
- Modifies Windows Firewall
PID:4380
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" firewall show2⤵
- Modifies Windows Firewall
PID:552
-
-
C:\Program Files (x86)\INFovine\UbikeyService.exe"C:\Program Files (x86)\INFovine\UbikeyService.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3532
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD558141645c3c353c9d31e7622381f38f8
SHA1afa438affd318103d12fdd0f40841f5e00dcd247
SHA256f2fcfba20bfe42a6aa1466e4e2d04f01c47fe878d217f95ccb249621151c2fa0
SHA5121a428c3620ca74450f8d5eddd2e49f6c6c5fac196b55edd2091d59952718dc4daa0b328b7d8f5f96767a1426be6016b5d5da30f3fbf804ad4e9d95d1791866a1
-
Filesize
1KB
MD59aa54a652397bdcc2b241c94d54dad52
SHA1b095cd09752c9645390f3cb5d4695a160f6944fc
SHA256f4a1a4aabcf3b044d42a5f79756c22e3aefc6b799b059374282f43ecd04db5ef
SHA51273419d759da7066747c6cd187089eaee856f36d03cdc4cd7db06bfc60a803fbdf27ddd7b52548b67b3a4a6a486c2cce2b558fcb80dee12645adaef797d1f6680
-
Filesize
925KB
MD54e459af1454c80755092c7456cb04259
SHA1456f8a13dc1744c64d2b93da86b6141087c066bc
SHA25653f89189bee930b2512978be079978bcea3bb6004c45d8ccb52d96b51eb22002
SHA5129af836489bf21e3ef8b87e7a33cf7a54d0ccbf15d9bb385c04b1848522ec91bcc5358d85fb8284d922986d4101ee5503c74bc24a5adb5b3355ef1f9f74a5fa1a
-
Filesize
64KB
MD55ed677ba541f087479591fafb449c336
SHA182b0edf7955102e0eac314dec266f576ffe96e23
SHA256ce54c140c2041a0dbaf95b8b095caec358cf260b106f3c312c3a594270c19c00
SHA5123ec79b37741d8153cd289b689a1f2cd05bbc57e40d1543efa5b200302fdd61d3adfc8dae421c62cceb855effce333c9f9764855bea221f9bef51580eb89ad068
-
Filesize
16KB
MD544c3761845a39d966d27ed1844f408e8
SHA10813f1a289642eb8d69402383c892ed14addd715
SHA2568069316ee0cb4d905e2ab8da8b8e5b94bfbdf887af2128c72b8d174b7989ea51
SHA5129d6d4209d8961486257a113523b7d47ee73617f6e4f0c30d4e689e573e7838ac9c09c6ebb805e57299ef024913650e754fa9b381487bfd18714955eac1676981
-
Filesize
9KB
MD5e45c3fb0f28fe6590e3d75c785e65c1f
SHA1d96690392e6428cac59bbaa9b2bcdbac27e683e5
SHA256020b3c13b4dc97a12af70e1330d364ff2b17d08b6e4f607f3527ebcf962a2421
SHA512be49505abd641bfd4a1bf6698578dab5951dbd1b254cf540f863f586a76576833d9f52f82810b047582ff379884d7452085b277132e6627c7fbc4733a0246e2f
-
Filesize
16KB
MD59f841b2f70c7bb54bb83aa2f5d07b0e3
SHA1813a2fafc895f87f80f0f22fe2cffa623fe4f7f6
SHA25632ed6ae9d5e7e6c03b66da42fb312f47059397f6a9043d7250486fb2a7644dc2
SHA51259184d18ce2656f7ec761765d8120ce0278fe192cdaad8f1a55ac36d23cd0666ca898bdd31ed7cc00d2e8371f7abf9e9530db5451b11b578ee038929ce8850f6