Overview
overview
8Static
static
7jghdtv_setup.exe
windows7-x64
7jghdtv_setup.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3Kernel/PPS...et.dll
windows7-x64
1Kernel/PPS...et.dll
windows10-2004-x64
1Kernel/PPS...t2.dll
windows7-x64
1Kernel/PPS...t2.dll
windows10-2004-x64
1Kernel/PPS...rk.dll
windows7-x64
3Kernel/PPS...rk.dll
windows10-2004-x64
3Kernel/PPS...st.dll
windows7-x64
1Kernel/PPS...st.dll
windows10-2004-x64
1Kernel/PPS...er.dll
windows7-x64
8Kernel/PPS...er.dll
windows10-2004-x64
8Kernel/PPS...ds.dll
windows7-x64
1Kernel/PPS...ds.dll
windows10-2004-x64
1Kernel/PPS...ay.dll
windows7-x64
1Kernel/PPS...ay.dll
windows10-2004-x64
1Kernel/PPS...ge.dll
windows7-x64
1Kernel/PPS...ge.dll
windows10-2004-x64
1Kernel/PPS...sg.dll
windows7-x64
1Kernel/PPS...sg.dll
windows10-2004-x64
1Kernel/PPS...lg.dll
windows7-x64
1Kernel/PPS...lg.dll
windows10-2004-x64
1Kernel/PPS...et.dll
windows7-x64
1Kernel/PPS...et.dll
windows10-2004-x64
1Kernel/PPS...es.dll
windows7-x64
1Kernel/PPS...es.dll
windows10-2004-x64
1Kernel/PiP...ck.dll
windows7-x64
6Kernel/PiP...ck.dll
windows10-2004-x64
6Kernel/PiP...il.dll
windows7-x64
1Kernel/PiP...il.dll
windows10-2004-x64
1Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
19-06-2024 21:20
Behavioral task
behavioral1
Sample
jghdtv_setup.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
jghdtv_setup.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
Kernel/PPStream/Livenet.dll
Resource
win7-20240611-en
Behavioral task
behavioral6
Sample
Kernel/PPStream/Livenet.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
Kernel/PPStream/Livenet2.dll
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
Kernel/PPStream/Livenet2.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
Kernel/PPStream/PSNetwork.dll
Resource
win7-20240419-en
Behavioral task
behavioral10
Sample
Kernel/PPStream/PSNetwork.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
Kernel/PPStream/PowerList.dll
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
Kernel/PPStream/PowerList.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
Kernel/PPStream/PowerPlayer.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
Kernel/PPStream/PowerPlayer.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral15
Sample
Kernel/PPStream/fds.dll
Resource
win7-20240611-en
Behavioral task
behavioral16
Sample
Kernel/PPStream/fds.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral17
Sample
Kernel/PPStream/pp2play.dll
Resource
win7-20240508-en
Behavioral task
behavioral18
Sample
Kernel/PPStream/pp2play.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
Kernel/PPStream/ppsimage.dll
Resource
win7-20240220-en
Behavioral task
behavioral20
Sample
Kernel/PPStream/ppsimage.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
Kernel/PPStream/ppssg.dll
Resource
win7-20231129-en
Behavioral task
behavioral22
Sample
Kernel/PPStream/ppssg.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral23
Sample
Kernel/PPStream/psclg.dll
Resource
win7-20240611-en
Behavioral task
behavioral24
Sample
Kernel/PPStream/psclg.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral25
Sample
Kernel/PPStream/vodnet.dll
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
Kernel/PPStream/vodnet.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
Kernel/PPStream/vodres.dll
Resource
win7-20240611-en
Behavioral task
behavioral28
Sample
Kernel/PPStream/vodres.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
Kernel/PiPi/JfCheck.dll
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
Kernel/PiPi/JfCheck.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral31
Sample
Kernel/PiPi/KmBugslayerUtil.dll
Resource
win7-20240419-en
Behavioral task
behavioral32
Sample
Kernel/PiPi/KmBugslayerUtil.dll
Resource
win10v2004-20240508-en
General
-
Target
Kernel/PiPi/JfCheck.dll
-
Size
218KB
-
MD5
b1de8a963512abc61cbf3b33cfcc6a0d
-
SHA1
622eee50f1bd8be28eb7bbf958cb19ec3c5e2143
-
SHA256
c70a1e2b03f70ca4ff4088eec65a25e5b37accd5e2b0dc50bbe7b57e397c94d2
-
SHA512
d9c53cdbf076a828586d86ac1f303a302a72e90c166cbbecdcd8756c7f21353090b2818dee6ca23f72e25f13f7c920e0b0d2b63371c9bada599b32f333564734
-
SSDEEP
3072:D267bQFninpqIRfdJSmkXvcpsAg4JLHaBp4yJ3TBfCTJX5t5RnI19gXqZcbbN:SssFninpNdb76/AgCRgTBq51R2LobN
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1A3440C6-F123-4CAB-84EE-C814E1AE0D8F} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1A3440C6-F123-4CAB-84EE-C814E1AE0D8F}\ = "PIPI Link Helper" regsvr32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Software\Microsoft\Internet Explorer\URLSearchHooks regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\SOFTWARE\Microsoft\Internet Explorer\URLSearchHooks\{1E315374-71A5-471A-B683-4C4ADB5C588B} regsvr32.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\JfCheck.Jfchk\CLSID\ = "{632C6705-17AB-4407-9281-F60D0A7726BE}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{632C6705-17AB-4407-9281-F60D0A7726BE}\ = "Jfchk Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1A3440C6-F123-4CAB-84EE-C814E1AE0D8F}\TypeLib\ = "{F6887547-369E-42FB-9921-85DBD895FF76}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\JfCheck.JfURLSearchHook\CurVer\ = "JfCheck.JfURLSearchHook.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E315374-71A5-471A-B683-4C4ADB5C588B}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2CC10D1C-1032-4570-9BAA-607466123845}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\JfCheck.Jfchk regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\JfCheck.JfURLSearchHook.1\CLSID\ = "{1E315374-71A5-471A-B683-4C4ADB5C588B}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E315374-71A5-471A-B683-4C4ADB5C588B}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Kernel\\PiPi\\JfCheck.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2CC10D1C-1032-4570-9BAA-607466123845}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2FA20E2A-496E-4CAC-8D07-B5C227EBD3FA}\TypeLib\ = "{F6887547-369E-42FB-9921-85DBD895FF76}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1A3440C6-F123-4CAB-84EE-C814E1AE0D8F}\ = "PIPI Link Helper" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F6887547-369E-42FB-9921-85DBD895FF76}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Kernel\\PiPi\\JfCheck.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{51C2E23D-3022-4A1F-AD4F-AFFE2812F8FC}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2FA20E2A-496E-4CAC-8D07-B5C227EBD3FA} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1A3440C6-F123-4CAB-84EE-C814E1AE0D8F}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\JfCheck.JfURLSearchHook.1\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2CC10D1C-1032-4570-9BAA-607466123845}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{51C2E23D-3022-4A1F-AD4F-AFFE2812F8FC} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1A3440C6-F123-4CAB-84EE-C814E1AE0D8F}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\JfCheck.MVSearch\ = "PIPI Link Helper" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1A3440C6-F123-4CAB-84EE-C814E1AE0D8F}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\JfCheck.JfURLSearchHook\ = "PIPI Link Helper" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\JfCheck.JfURLSearchHook\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E315374-71A5-471A-B683-4C4ADB5C588B}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{51C2E23D-3022-4A1F-AD4F-AFFE2812F8FC}\ = "IMVSearch" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{632C6705-17AB-4407-9281-F60D0A7726BE}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E315374-71A5-471A-B683-4C4ADB5C588B}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{632C6705-17AB-4407-9281-F60D0A7726BE}\TypeLib\ = "{F6887547-369E-42FB-9921-85DBD895FF76}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2FA20E2A-496E-4CAC-8D07-B5C227EBD3FA}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\JfCheck.Jfchk.1\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\JfCheck.Jfchk\CurVer\ = "JfCheck.Jfchk.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{632C6705-17AB-4407-9281-F60D0A7726BE}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\JfCheck.MVSearch.1\CLSID\ = "{1A3440C6-F123-4CAB-84EE-C814E1AE0D8F}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\JfCheck.MVSearch\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F6887547-369E-42FB-9921-85DBD895FF76}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2CC10D1C-1032-4570-9BAA-607466123845}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\JfCheck.Jfchk.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{51C2E23D-3022-4A1F-AD4F-AFFE2812F8FC}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{51C2E23D-3022-4A1F-AD4F-AFFE2812F8FC}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E315374-71A5-471A-B683-4C4ADB5C588B}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F6887547-369E-42FB-9921-85DBD895FF76} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{632C6705-17AB-4407-9281-F60D0A7726BE}\MiscStatus regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1A3440C6-F123-4CAB-84EE-C814E1AE0D8F}\VersionIndependentProgID\ = "JfCheck.MVSearch" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\JfCheck.JfURLSearchHook.1\ = "PIPI Link Helper" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{632C6705-17AB-4407-9281-F60D0A7726BE} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\JfCheck.JfURLSearchHook\CLSID\ = "{1E315374-71A5-471A-B683-4C4ADB5C588B}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F6887547-369E-42FB-9921-85DBD895FF76}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{51C2E23D-3022-4A1F-AD4F-AFFE2812F8FC}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2FA20E2A-496E-4CAC-8D07-B5C227EBD3FA}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\JfCheck.MVSearch regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F6887547-369E-42FB-9921-85DBD895FF76}\1.0\ = "JfCheck 1.0 Type Library" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{632C6705-17AB-4407-9281-F60D0A7726BE}\VersionIndependentProgID\ = "JfCheck.Jfchk" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2CC10D1C-1032-4570-9BAA-607466123845}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2FA20E2A-496E-4CAC-8D07-B5C227EBD3FA}\ = "IJfURLSearchHook" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2FA20E2A-496E-4CAC-8D07-B5C227EBD3FA}\TypeLib\ = "{F6887547-369E-42FB-9921-85DBD895FF76}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\JfCheck.Jfchk\CurVer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{632C6705-17AB-4407-9281-F60D0A7726BE}\MiscStatus\1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1A3440C6-F123-4CAB-84EE-C814E1AE0D8F}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2CC10D1C-1032-4570-9BAA-607466123845}\TypeLib\ = "{F6887547-369E-42FB-9921-85DBD895FF76}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2FA20E2A-496E-4CAC-8D07-B5C227EBD3FA}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\JfCheck.Jfchk\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{632C6705-17AB-4407-9281-F60D0A7726BE}\MiscStatus\1\ = "131473" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\JfCheck.JfURLSearchHook regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1528 wrote to memory of 3212 1528 regsvr32.exe 84 PID 1528 wrote to memory of 3212 1528 regsvr32.exe 84 PID 1528 wrote to memory of 3212 1528 regsvr32.exe 84
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\Kernel\PiPi\JfCheck.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\Kernel\PiPi\JfCheck.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies Internet Explorer settings
- Modifies registry class
PID:3212
-