Overview
overview
3Static
static
3cvery.comd...ad.dll
windows7-x64
1cvery.comd...ad.dll
windows10-2004-x64
1cvery.comd...ll.bat
windows7-x64
1cvery.comd...ll.bat
windows10-2004-x64
1cvery.comd...ad.asp
windows7-x64
3cvery.comd...ad.asp
windows10-2004-x64
3cvery.comd...up.vbs
windows7-x64
1cvery.comd...up.vbs
windows10-2004-x64
1cvery.comd...t1.exe
windows7-x64
1cvery.comd...t1.exe
windows10-2004-x64
1cvery.comd...ll.bat
windows7-x64
1cvery.comd...ll.bat
windows10-2004-x64
1cvery.comd...Obj.js
windows7-x64
3cvery.comd...Obj.js
windows10-2004-x64
3cvery.comd...ile.js
windows7-x64
3cvery.comd...ile.js
windows10-2004-x64
3cvery.comd...��.url
windows7-x64
1cvery.comd...��.url
windows10-2004-x64
1Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 14:22
Static task
static1
Behavioral task
behavioral1
Sample
cvery.comdel630543535672455/DDKFileUpload/DDKFileUpload.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
cvery.comdel630543535672455/DDKFileUpload/DDKFileUpload.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
cvery.comdel630543535672455/DDKFileUpload/delall.bat
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
cvery.comdel630543535672455/DDKFileUpload/delall.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
cvery.comdel630543535672455/DDKFileUpload/reg_upload.asp
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
cvery.comdel630543535672455/DDKFileUpload/reg_upload.asp
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
cvery.comdel630543535672455/DDKFileUpload/up.vbs
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
cvery.comdel630543535672455/DDKFileUpload/up.vbs
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
cvery.comdel630543535672455/Project1.exe
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
cvery.comdel630543535672455/Project1.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
cvery.comdel630543535672455/delall.bat
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
cvery.comdel630543535672455/delall.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
cvery.comdel630543535672455/untHttpObj.js
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
cvery.comdel630543535672455/untHttpObj.js
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
cvery.comdel630543535672455/untUploadFile.js
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
cvery.comdel630543535672455/untUploadFile.js
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
cvery.comdel630543535672455/阅读器下载.url
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
cvery.comdel630543535672455/阅读器下载.url
Resource
win10v2004-20240709-en
General
-
Target
cvery.comdel630543535672455/DDKFileUpload/DDKFileUpload.dll
-
Size
402KB
-
MD5
88249d68f6e2e0fd5327917001f0a952
-
SHA1
3da2baa27a5afaa72585bc60068cc53860ff1b0a
-
SHA256
2583ac18024a2adcb37874165100aefcb001b71c9ed4a3016dcc82a60459dcc3
-
SHA512
5529261844daee3bc75e3c42c0cbb83ce5509b5cce89fa44dd5d65e0e9ed1931842758434290f71b8af9bf60a65ae4c487f37a25059c9a5ea68d11b70ee602ae
-
SSDEEP
6144:KQ1V4Y9poPwipp2a1dwX/jIR2N9Gh4yBuGmrlmYATwmYF1aqvlVl:mY9poPwipQa1dwXb9y4yBImlEmywylz
Malware Config
Signatures
-
Modifies registry class 39 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{7347E623-9581-4A42-A1D8-BED57A606DEF} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{30F2871F-F6D5-4F76-B5ED-200F7B29173F}\ = "FileUpload Object" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{30F2871F-F6D5-4F76-B5ED-200F7B29173F}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cvery.comdel630543535672455\\DDKFileUpload\\DDKFileUpload.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{30F2871F-F6D5-4F76-B5ED-200F7B29173F}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{7347E623-9581-4A42-A1D8-BED57A606DEF}\1.0\ = "DDKFileUpload Library" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{7347E623-9581-4A42-A1D8-BED57A606DEF}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{7347E623-9581-4A42-A1D8-BED57A606DEF}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{30F2871F-F6D5-4F76-B5ED-200F7B29173F}\Version\ = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{30F2871F-F6D5-4F76-B5ED-200F7B29173F}\TypeLib\ = "{7347E623-9581-4A42-A1D8-BED57A606DEF}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{59EE1623-02DE-4143-AF27-26FDE60093B5}\ = "IFileUpload" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{59EE1623-02DE-4143-AF27-26FDE60093B5}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{59EE1623-02DE-4143-AF27-26FDE60093B5}\TypeLib\ = "{7347E623-9581-4A42-A1D8-BED57A606DEF}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{59EE1623-02DE-4143-AF27-26FDE60093B5}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{7347E623-9581-4A42-A1D8-BED57A606DEF}\1.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{7347E623-9581-4A42-A1D8-BED57A606DEF}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{7347E623-9581-4A42-A1D8-BED57A606DEF}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cvery.comdel630543535672455\\DDKFileUpload\\" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{30F2871F-F6D5-4F76-B5ED-200F7B29173F}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{30F2871F-F6D5-4F76-B5ED-200F7B29173F}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DDKFileUpload.FileUpload regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{30F2871F-F6D5-4F76-B5ED-200F7B29173F}\Version regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{30F2871F-F6D5-4F76-B5ED-200F7B29173F}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{7347E623-9581-4A42-A1D8-BED57A606DEF}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{59EE1623-02DE-4143-AF27-26FDE60093B5}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{59EE1623-02DE-4143-AF27-26FDE60093B5}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{59EE1623-02DE-4143-AF27-26FDE60093B5} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{59EE1623-02DE-4143-AF27-26FDE60093B5}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DDKFileUpload.FileUpload\ = "FileUpload Object" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{59EE1623-02DE-4143-AF27-26FDE60093B5}\ = "IFileUpload" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{59EE1623-02DE-4143-AF27-26FDE60093B5}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{59EE1623-02DE-4143-AF27-26FDE60093B5}\TypeLib\ = "{7347E623-9581-4A42-A1D8-BED57A606DEF}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{30F2871F-F6D5-4F76-B5ED-200F7B29173F} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DDKFileUpload.FileUpload\Clsid\ = "{30F2871F-F6D5-4F76-B5ED-200F7B29173F}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{30F2871F-F6D5-4F76-B5ED-200F7B29173F}\ProgID\ = "DDKFileUpload.FileUpload" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{7347E623-9581-4A42-A1D8-BED57A606DEF}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{59EE1623-02DE-4143-AF27-26FDE60093B5} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DDKFileUpload.FileUpload\Clsid regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{7347E623-9581-4A42-A1D8-BED57A606DEF}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cvery.comdel630543535672455\\DDKFileUpload\\DDKFileUpload.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{59EE1623-02DE-4143-AF27-26FDE60093B5}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{59EE1623-02DE-4143-AF27-26FDE60093B5}\TypeLib regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2120 wrote to memory of 1916 2120 regsvr32.exe 31 PID 2120 wrote to memory of 1916 2120 regsvr32.exe 31 PID 2120 wrote to memory of 1916 2120 regsvr32.exe 31 PID 2120 wrote to memory of 1916 2120 regsvr32.exe 31 PID 2120 wrote to memory of 1916 2120 regsvr32.exe 31 PID 2120 wrote to memory of 1916 2120 regsvr32.exe 31 PID 2120 wrote to memory of 1916 2120 regsvr32.exe 31
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\cvery.comdel630543535672455\DDKFileUpload\DDKFileUpload.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\cvery.comdel630543535672455\DDKFileUpload\DDKFileUpload.dll2⤵
- Modifies registry class
PID:1916
-