Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 19:55
Static task
static1
Behavioral task
behavioral1
Sample
347050855cb2bf86e7df79c2c443006f42bf9008eb82e82a59e814d84b58783d.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
347050855cb2bf86e7df79c2c443006f42bf9008eb82e82a59e814d84b58783d.exe
Resource
win10v2004-20240426-en
General
-
Target
347050855cb2bf86e7df79c2c443006f42bf9008eb82e82a59e814d84b58783d.exe
-
Size
7.5MB
-
MD5
4df7b6b2c0b2af911d07ce647e4fde06
-
SHA1
a6b3d14d44038f7f562a28146e560e2c79502ce1
-
SHA256
347050855cb2bf86e7df79c2c443006f42bf9008eb82e82a59e814d84b58783d
-
SHA512
9d2842a9e23884d2b0fd83bacf59474d866f36cfed04525a8dd5484af25052086ad699a771e7a501684f560b4094de0c485982572cea8e7cb55a745d52a4f5fe
-
SSDEEP
98304:Z8B8QTBVA/I7Cw1vYXvafY9DCMGLd51YkPu4cJMGBj4DhDZANxBYtsoIsS8LRsSr:08I0i2aQQM0LNPy8DpZ+C2o7X
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
Processes:
regsvr32.exe347050855cb2bf86e7df79c2c443006f42bf9008eb82e82a59e814d84b58783d.exepid process 4716 regsvr32.exe 1788 347050855cb2bf86e7df79c2c443006f42bf9008eb82e82a59e814d84b58783d.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
347050855cb2bf86e7df79c2c443006f42bf9008eb82e82a59e814d84b58783d.exedescription ioc process File opened for modification \??\PhysicalDrive0 347050855cb2bf86e7df79c2c443006f42bf9008eb82e82a59e814d84b58783d.exe -
Modifies registry class 46 IoCs
Processes:
regsvr32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\EyLogin.EyLoginSoft regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C691BF80-87AF-43A7-AD56-28D5DA857FBD}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C691BF80-87AF-43A7-AD56-28D5DA857FBD}\VersionIndependentProgID\ = "EyLogin.EyLoginSoft" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C691BF80-87AF-43A7-AD56-28D5DA857FBD}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B9096DAC-F8A6-4874-BDAC-C5A79217CE98}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B9096DAC-F8A6-4874-BDAC-C5A79217CE98}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6C8E441E-B77B-44AF-BBDA-548EA8FF0638}\TypeLib\ = "{B9096DAC-F8A6-4874-BDAC-C5A79217CE98}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6C8E441E-B77B-44AF-BBDA-548EA8FF0638}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6C8E441E-B77B-44AF-BBDA-548EA8FF0638}\ = "IEyLoginSoft" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\EyLogin.EyLoginSoft\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\EyLogin.EyLoginSoft\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C691BF80-87AF-43A7-AD56-28D5DA857FBD}\ProgID\ = "EyLogin.EyLoginSoft" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C691BF80-87AF-43A7-AD56-28D5DA857FBD}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B9096DAC-F8A6-4874-BDAC-C5A79217CE98}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\eylogin.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6C8E441E-B77B-44AF-BBDA-548EA8FF0638}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\EyLogin.DLL regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\EyLogin.EyLoginSoft\CLSID\ = "{C691BF80-87AF-43A7-AD56-28D5DA857FBD}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C691BF80-87AF-43A7-AD56-28D5DA857FBD}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C691BF80-87AF-43A7-AD56-28D5DA857FBD}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\eylogin.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C691BF80-87AF-43A7-AD56-28D5DA857FBD}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C691BF80-87AF-43A7-AD56-28D5DA857FBD}\TypeLib\ = "{B9096DAC-F8A6-4874-BDAC-C5A79217CE98}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{29D16463-BCC9-4BD5-B4E7-07CB4AC0768A}\ = "EyLogin" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B9096DAC-F8A6-4874-BDAC-C5A79217CE98}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6C8E441E-B77B-44AF-BBDA-548EA8FF0638}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6C8E441E-B77B-44AF-BBDA-548EA8FF0638} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\EyLogin.DLL\AppID = "{29D16463-BCC9-4BD5-B4E7-07CB4AC0768A}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B9096DAC-F8A6-4874-BDAC-C5A79217CE98} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B9096DAC-F8A6-4874-BDAC-C5A79217CE98}\1.0\ = "EyLogin 1.0.2.5 ÀàÐÍ¿â" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B9096DAC-F8A6-4874-BDAC-C5A79217CE98}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B9096DAC-F8A6-4874-BDAC-C5A79217CE98}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6C8E441E-B77B-44AF-BBDA-548EA8FF0638}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6C8E441E-B77B-44AF-BBDA-548EA8FF0638}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{29D16463-BCC9-4BD5-B4E7-07CB4AC0768A} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C691BF80-87AF-43A7-AD56-28D5DA857FBD} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6C8E441E-B77B-44AF-BBDA-548EA8FF0638} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6C8E441E-B77B-44AF-BBDA-548EA8FF0638}\ = "IEyLoginSoft" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6C8E441E-B77B-44AF-BBDA-548EA8FF0638}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6C8E441E-B77B-44AF-BBDA-548EA8FF0638}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\EyLogin.EyLoginSoft\CurVer\ = "EyLogin.EyLoginSoft" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C691BF80-87AF-43A7-AD56-28D5DA857FBD}\ = "EyLoginSoft Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B9096DAC-F8A6-4874-BDAC-C5A79217CE98}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\EyLogin.EyLoginSoft\ = "EyLoginSoft Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C691BF80-87AF-43A7-AD56-28D5DA857FBD}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B9096DAC-F8A6-4874-BDAC-C5A79217CE98}\1.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6C8E441E-B77B-44AF-BBDA-548EA8FF0638}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6C8E441E-B77B-44AF-BBDA-548EA8FF0638}\TypeLib\ = "{B9096DAC-F8A6-4874-BDAC-C5A79217CE98}" regsvr32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
347050855cb2bf86e7df79c2c443006f42bf9008eb82e82a59e814d84b58783d.exepid process 1788 347050855cb2bf86e7df79c2c443006f42bf9008eb82e82a59e814d84b58783d.exe 1788 347050855cb2bf86e7df79c2c443006f42bf9008eb82e82a59e814d84b58783d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
347050855cb2bf86e7df79c2c443006f42bf9008eb82e82a59e814d84b58783d.exedescription pid process target process PID 1788 wrote to memory of 4716 1788 347050855cb2bf86e7df79c2c443006f42bf9008eb82e82a59e814d84b58783d.exe regsvr32.exe PID 1788 wrote to memory of 4716 1788 347050855cb2bf86e7df79c2c443006f42bf9008eb82e82a59e814d84b58783d.exe regsvr32.exe PID 1788 wrote to memory of 4716 1788 347050855cb2bf86e7df79c2c443006f42bf9008eb82e82a59e814d84b58783d.exe regsvr32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\347050855cb2bf86e7df79c2c443006f42bf9008eb82e82a59e814d84b58783d.exe"C:\Users\Admin\AppData\Local\Temp\347050855cb2bf86e7df79c2c443006f42bf9008eb82e82a59e814d84b58783d.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Users\Admin\AppData\Local\Temp\eylogin.dll"2⤵
- Loads dropped DLL
- Modifies registry class
PID:4716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD53bdb92b38bdc6a5702ec1454534d0951
SHA19276b0c8de889744fcdf34e7c81e158830b8bcbb
SHA25625ba0f3a0f6ddb0e9b0078640a8a2a2bf7e8948e0579d2080379debc8a272681
SHA512cff7a9033f7a141f52f0ad3152e97a5313f1185669d9e6da4d60a68602c6a1af3ec5250e1c39ea328758419e5d0a826bb5085f3e96fa4019f3c5c2e586f1c35f