Overview
overview
8Static
static
3AutoSnap.exe
windows7-x64
1AutoSnap.exe
windows10-2004-x64
1Client/DeskSide.exe
windows7-x64
1Client/DeskSide.exe
windows10-2004-x64
1Client/Des...��.url
windows7-x64
1Client/Des...��.url
windows10-2004-x64
1Client/FAKEDISK.sys
windows7-x64
1Client/FAKEDISK.sys
windows10-2004-x64
1Client/IMA...Ƭ.url
windows7-x64
1Client/IMA...Ƭ.url
windows10-2004-x64
1Client/InsFilt.exe
windows7-x64
8Client/InsFilt.exe
windows10-2004-x64
8Client/NUpdate.exe
windows7-x64
1Client/NUpdate.exe
windows10-2004-x64
1Client/NoClose.dll
windows7-x64
1Client/NoClose.dll
windows10-2004-x64
1Client/SEBarClt.exe
windows7-x64
6Client/SEBarClt.exe
windows10-2004-x64
6Client/SEBarVD.dll
windows7-x64
6Client/SEBarVD.dll
windows10-2004-x64
6Client/SEIEBho.dll
windows7-x64
6Client/SEIEBho.dll
windows10-2004-x64
6Client/SExpMenu.exe
windows7-x64
3Client/SExpMenu.exe
windows10-2004-x64
3Client/SyncExp.exe
windows7-x64
1Client/SyncExp.exe
windows10-2004-x64
1Client/SyncExpSim.exe
windows7-x64
6Client/SyncExpSim.exe
windows10-2004-x64
6Client/board.rtf
windows7-x64
4Client/board.rtf
windows10-2004-x64
1Client/nQMailer.exe
windows7-x64
5Client/nQMailer.exe
windows10-2004-x64
5Analysis
-
max time kernel
133s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 01:39
Static task
static1
Behavioral task
behavioral1
Sample
AutoSnap.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
AutoSnap.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
Client/DeskSide.exe
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
Client/DeskSide.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
Client/DeskSideù.url
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Client/DeskSideù.url
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
Client/FAKEDISK.sys
Resource
win7-20240215-en
Behavioral task
behavioral8
Sample
Client/FAKEDISK.sys
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
Client/IMAGES/ͼƬ.url
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
Client/IMAGES/ͼƬ.url
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
Client/InsFilt.exe
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
Client/InsFilt.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
Client/NUpdate.exe
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
Client/NUpdate.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
Client/NoClose.dll
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
Client/NoClose.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
Client/SEBarClt.exe
Resource
win7-20240419-en
Behavioral task
behavioral18
Sample
Client/SEBarClt.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
Client/SEBarVD.dll
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
Client/SEBarVD.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
Client/SEIEBho.dll
Resource
win7-20240220-en
Behavioral task
behavioral22
Sample
Client/SEIEBho.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral23
Sample
Client/SExpMenu.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
Client/SExpMenu.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
Client/SyncExp.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
Client/SyncExp.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
Client/SyncExpSim.exe
Resource
win7-20240419-en
Behavioral task
behavioral28
Sample
Client/SyncExpSim.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
Client/board.rtf
Resource
win7-20240220-en
Behavioral task
behavioral30
Sample
Client/board.rtf
Resource
win10v2004-20240426-en
Behavioral task
behavioral31
Sample
Client/nQMailer.exe
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
Client/nQMailer.exe
Resource
win10v2004-20240508-en
General
-
Target
Client/SEIEBho.dll
-
Size
432KB
-
MD5
91b1fb94c35384f946485ce49a829c74
-
SHA1
61933446cfe318778aa74af842a96961bbfa046d
-
SHA256
6a98274d799bfe1ad2bf58698793fc0f6d1313c74364fc5e90446e2a5347d68b
-
SHA512
53d93d5e2d2f6d8f8001eb7763f7d792dbd563218df4b9c561a94789669ea6fef1beda0b266bfadfb8c095c5713c04d239f77f373f84155a539b0acbebd1cd87
-
SSDEEP
6144:I6epeOiQotv6HSIJA7f/r2TYvSEo34DmX2yXyj92JcmnWzwlN/gR7cM/XO8GlXR1:Fepeaotv6HgT16X2wyRknFICmO8hc
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
regsvr32.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{00007D99-2433-4F0F-86E6-BF7458F38078} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{00007D99-2433-4F0F-86E6-BF7458F38078}\ regsvr32.exe -
Modifies registry class 11 IoCs
Processes:
regsvr32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SEIEBho.TAdHelperBHO\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SEIEBho.TAdHelperBHO\Clsid regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SEIEBho.TAdHelperBHO\Clsid\ = "{00007D99-2433-4F0F-86E6-BF7458F38078}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00007D99-2433-4F0F-86E6-BF7458F38078}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00007D99-2433-4F0F-86E6-BF7458F38078}\ProgID\ = "SEIEBho.TAdHelperBHO" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00007D99-2433-4F0F-86E6-BF7458F38078}\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00007D99-2433-4F0F-86E6-BF7458F38078}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00007D99-2433-4F0F-86E6-BF7458F38078}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SEIEBho.TAdHelperBHO regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00007D99-2433-4F0F-86E6-BF7458F38078} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00007D99-2433-4F0F-86E6-BF7458F38078}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Client\\SEIEBho.dll" regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
regsvr32.exedescription pid process target process PID 3800 wrote to memory of 2104 3800 regsvr32.exe regsvr32.exe PID 3800 wrote to memory of 2104 3800 regsvr32.exe regsvr32.exe PID 3800 wrote to memory of 2104 3800 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\Client\SEIEBho.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\Client\SEIEBho.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:2104