Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
27/01/2024, 07:40
Behavioral task
behavioral1
Sample
SggMMt.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
SggMMt.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
smtiestarter.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
smtiestarter.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
smtuninst.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
smtuninst.exe
Resource
win10v2004-20231222-en
General
-
Target
smtiestarter.dll
-
Size
194KB
-
MD5
e78aea971de3c3dbcfb70c0b08293fa6
-
SHA1
7151e06e4f2c2902d01a8548693adfa02bf09d53
-
SHA256
d30e8d6a356d110102c1e2edcc2b013dc2897398fffc5f5c2d1aa83d20cca0ce
-
SHA512
025a5e437d2c2f7ce476dbf268e912a47562e163f93d7641a8f10c86c201da3d9a3b1ad3c30bc69507c1a270f32eca477f274678e2c8b7d280f3619fbbf3d8a1
-
SSDEEP
6144:6mXy8TQdqfiI8zhVXjnb4iElu41oeZ/X:WEfiLhVP4iCBZ
Malware Config
Signatures
-
resource yara_rule behavioral3/memory/2272-0-0x00000000006D0000-0x0000000000753000-memory.dmp upx -
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{71C1129C-1253-4C97-82CA-B6D1E568072E} regsvr32.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\SearchScopes\{71C1129C-1253-4C97-82CA-B6D1E568072E}\DisplayName = "Naver" regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\SearchScopes\{71C1129C-1253-4C97-82CA-B6D1E568072E}\URL = "http://search.naver.com/search.naver?where=nexearch&query={searchTerms}" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{F4D18791-01AD-4A13-A43F-677A85EACB08} regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Low Rights regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{F4D18791-01AD-4A13-A43F-677A85EACB08}\AppName = "SggMMt.exe" regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\SearchScopes\DefaultScope = "{71C1129C-1253-4C97-82CA-B6D1E568072E}" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\SearchScopes\{71C1129C-1253-4C97-82CA-B6D1E568072E} regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{F4D18791-01AD-4A13-A43F-677A85EACB08}\AppPath = "C:\\Program Files (x86)\\SmartAppUpdate" regsvr32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{F4D18791-01AD-4A13-A43F-677A85EACB08}\Policy = "3" regsvr32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{71C1129C-1253-4C97-82CA-B6D1E568072E} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{71C1129C-1253-4C97-82CA-B6D1E568072E}\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{71C1129C-1253-4C97-82CA-B6D1E568072E}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{71C1129C-1253-4C97-82CA-B6D1E568072E}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\smtiestarter.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{71C1129C-1253-4C97-82CA-B6D1E568072E}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2272 2548 regsvr32.exe 28 PID 2548 wrote to memory of 2272 2548 regsvr32.exe 28 PID 2548 wrote to memory of 2272 2548 regsvr32.exe 28 PID 2548 wrote to memory of 2272 2548 regsvr32.exe 28 PID 2548 wrote to memory of 2272 2548 regsvr32.exe 28 PID 2548 wrote to memory of 2272 2548 regsvr32.exe 28 PID 2548 wrote to memory of 2272 2548 regsvr32.exe 28
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\smtiestarter.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\smtiestarter.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies Internet Explorer settings
- Modifies registry class
PID:2272
-