Overview
overview
8Static
static
3fb71a9372f...18.exe
windows7-x64
8fb71a9372f...18.exe
windows10-2004-x64
8$_2_/Ad.exe
windows7-x64
1$_2_/Ad.exe
windows10-2004-x64
1$_2_/Downl...PS.dll
windows7-x64
1$_2_/Downl...PS.dll
windows10-2004-x64
1$_2_/QQVip...er.exe
windows7-x64
8$_2_/QQVip...er.exe
windows10-2004-x64
8$_2_/TXSSOSetup.exe
windows7-x64
7$_2_/TXSSOSetup.exe
windows10-2004-x64
7$_2_/Tencentdl.exe
windows7-x64
1$_2_/Tencentdl.exe
windows10-2004-x64
1$_2_/bugreport.exe
windows7-x64
1$_2_/bugreport.exe
windows10-2004-x64
$_2_/curllib.dll
windows7-x64
3$_2_/curllib.dll
windows10-2004-x64
3$_2_/dlcore.dll
windows7-x64
1$_2_/dlcore.dll
windows10-2004-x64
1$_2_/extract.dll
windows7-x64
1$_2_/extract.dll
windows10-2004-x64
1$_2_/tinyxml.dll
windows7-x64
3$_2_/tinyxml.dll
windows10-2004-x64
3$_2_/tnproxy.dll
windows7-x64
1$_2_/tnproxy.dll
windows10-2004-x64
1Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19-04-2024 23:51
Static task
static1
Behavioral task
behavioral1
Sample
fb71a9372f7195356b87f195e68b534a_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fb71a9372f7195356b87f195e68b534a_JaffaCakes118.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
$_2_/Ad.exe
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
$_2_/Ad.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
$_2_/DownloadProxyPS.dll
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
$_2_/DownloadProxyPS.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
$_2_/QQVipDownloader.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$_2_/QQVipDownloader.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
$_2_/TXSSOSetup.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$_2_/TXSSOSetup.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral11
Sample
$_2_/Tencentdl.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
$_2_/Tencentdl.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral13
Sample
$_2_/bugreport.exe
Resource
win7-20240215-en
Behavioral task
behavioral14
Sample
$_2_/bugreport.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral15
Sample
$_2_/curllib.dll
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
$_2_/curllib.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral17
Sample
$_2_/dlcore.dll
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
$_2_/dlcore.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral19
Sample
$_2_/extract.dll
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
$_2_/extract.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral21
Sample
$_2_/tinyxml.dll
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
$_2_/tinyxml.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral23
Sample
$_2_/tnproxy.dll
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
$_2_/tnproxy.dll
Resource
win10v2004-20240412-en
General
-
Target
$_2_/dlcore.dll
-
Size
1.9MB
-
MD5
0ed92ed82d4d1b22fe231c177b45eac5
-
SHA1
d858a692e6c0a364137c4d0190816809b8c37f7f
-
SHA256
ad1425b8497cf8b5891adbd51371c3ceb0f977e6e417b6c3f3262e6b6f01e2fc
-
SHA512
8d7d60e84314ba2b5b1a9248e6ddf1f2723844ebde1953343ee5f825f1d3e30a5a9a504d028c9311f9aa82c17929c4927769b7ae6df986003b2c1aaef0be3aa1
-
SSDEEP
49152:JSGO70WM3G4HmQohT02dkqQsEhAtyhBFVTCzNG6TxD3mOXA:cf0WKGIQ0+QsDCO
Malware Config
Signatures
-
Modifies registry class 35 IoCs
Processes:
regsvr32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{362B8108-62ED-4F80-BC1D-FE904A262CE2}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{362B8108-62ED-4F80-BC1D-FE904A262CE2}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{362B8108-62ED-4F80-BC1D-FE904A262CE2}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{B85AFBF6-2E43-4F13-8AAE-332C9A18A866}\ = "VqqSpeedDl" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VqqSpeedDl.VqqDownload.1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VqqSpeedDl.VqqDownload.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AF6C6F71-5822-463A-8CA1-EA496D0CA2C7}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AF6C6F71-5822-463A-8CA1-EA496D0CA2C7}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\VqqSpeedDl.DLL regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VqqSpeedDl.VqqDownload\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AF6C6F71-5822-463A-8CA1-EA496D0CA2C7}\ = "VqqDownload Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AF6C6F71-5822-463A-8CA1-EA496D0CA2C7}\VersionIndependentProgID\ = "VqqSpeedDl.VqqDownload" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{362B8108-62ED-4F80-BC1D-FE904A262CE2}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VqqSpeedDl.VqqDownload regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AF6C6F71-5822-463A-8CA1-EA496D0CA2C7} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{362B8108-62ED-4F80-BC1D-FE904A262CE2}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VqqSpeedDl.VqqDownload\CLSID\ = "{AF6C6F71-5822-463A-8CA1-EA496D0CA2C7}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AF6C6F71-5822-463A-8CA1-EA496D0CA2C7}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AF6C6F71-5822-463A-8CA1-EA496D0CA2C7}\TypeLib\ = "{25BD9BB7-33EC-4220-B725-56C470146288}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{362B8108-62ED-4F80-BC1D-FE904A262CE2}\1.0\HELPDIR\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{B85AFBF6-2E43-4F13-8AAE-332C9A18A866} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VqqSpeedDl.VqqDownload\CurVer\ = "VqqSpeedDl.VqqDownload.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\VqqSpeedDl.DLL\AppID = "{B85AFBF6-2E43-4F13-8AAE-332C9A18A866}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AF6C6F71-5822-463A-8CA1-EA496D0CA2C7}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\$_2_\\dlcore.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AF6C6F71-5822-463A-8CA1-EA496D0CA2C7}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{362B8108-62ED-4F80-BC1D-FE904A262CE2}\1.0\FLAGS\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AF6C6F71-5822-463A-8CA1-EA496D0CA2C7}\AppID = "{B85AFBF6-2E43-4F13-8AAE-332C9A18A866}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{362B8108-62ED-4F80-BC1D-FE904A262CE2}\1.0\ = "VqqSpeedDl 1.0 ÀàÐÍ¿â" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{362B8108-62ED-4F80-BC1D-FE904A262CE2} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{362B8108-62ED-4F80-BC1D-FE904A262CE2}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\$_2_\\dlcore.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VqqSpeedDl.VqqDownload.1\ = "VqqDownload Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VqqSpeedDl.VqqDownload.1\CLSID\ = "{AF6C6F71-5822-463A-8CA1-EA496D0CA2C7}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VqqSpeedDl.VqqDownload\ = "VqqDownload Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VqqSpeedDl.VqqDownload\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AF6C6F71-5822-463A-8CA1-EA496D0CA2C7}\ProgID\ = "VqqSpeedDl.VqqDownload.1" regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
regsvr32.exedescription pid process target process PID 3344 wrote to memory of 1188 3344 regsvr32.exe regsvr32.exe PID 3344 wrote to memory of 1188 3344 regsvr32.exe regsvr32.exe PID 3344 wrote to memory of 1188 3344 regsvr32.exe regsvr32.exe