Overview
overview
7Static
static
1Speccy.exe
windows7-x64
6Speccy.exe
windows10-2004-x64
6Speccy64.exe
windows7-x64
7Speccy64.exe
windows10-2004-x64
7lang/lang-1026.dll
windows7-x64
1lang/lang-1026.dll
windows10-2004-x64
1lang/lang-1031.dll
windows7-x64
1lang/lang-1031.dll
windows10-2004-x64
1lang/lang-1033.dll
windows7-x64
1lang/lang-1033.dll
windows10-2004-x64
1lang/lang-1034.dll
windows7-x64
1lang/lang-1034.dll
windows10-2004-x64
1lang/lang-1035.dll
windows7-x64
1lang/lang-1035.dll
windows10-2004-x64
1lang/lang-1036.dll
windows7-x64
1lang/lang-1036.dll
windows10-2004-x64
1lang/lang-1037.dll
windows7-x64
1lang/lang-1037.dll
windows10-2004-x64
1lang/lang-1038.dll
windows7-x64
1lang/lang-1038.dll
windows10-2004-x64
1lang/lang-1040.dll
windows7-x64
1lang/lang-1040.dll
windows10-2004-x64
1lang/lang-1041.dll
windows7-x64
1lang/lang-1041.dll
windows10-2004-x64
1lang/lang-1043.dll
windows7-x64
1lang/lang-1043.dll
windows10-2004-x64
1lang/lang-1045.dll
windows7-x64
1lang/lang-1045.dll
windows10-2004-x64
1lang/lang-1046.dll
windows7-x64
1lang/lang-1046.dll
windows10-2004-x64
1lang/lang-1049.dll
windows7-x64
1lang/lang-1049.dll
windows10-2004-x64
1Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 15:15
Static task
static1
Behavioral task
behavioral1
Sample
Speccy.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Speccy.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
Speccy64.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Speccy64.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
lang/lang-1026.dll
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
lang/lang-1026.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
lang/lang-1031.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
lang/lang-1031.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
lang/lang-1033.dll
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
lang/lang-1033.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
lang/lang-1034.dll
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
lang/lang-1034.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
lang/lang-1035.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
lang/lang-1035.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral15
Sample
lang/lang-1036.dll
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
lang/lang-1036.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
lang/lang-1037.dll
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
lang/lang-1037.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
lang/lang-1038.dll
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
lang/lang-1038.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
lang/lang-1040.dll
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
lang/lang-1040.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
lang/lang-1041.dll
Resource
win7-20240705-en
Behavioral task
behavioral24
Sample
lang/lang-1041.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
lang/lang-1043.dll
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
lang/lang-1043.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
lang/lang-1045.dll
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
lang/lang-1045.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
lang/lang-1046.dll
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
lang/lang-1046.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral31
Sample
lang/lang-1049.dll
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
lang/lang-1049.dll
Resource
win10v2004-20240709-en
General
-
Target
Speccy64.exe
-
Size
6.8MB
-
MD5
ed1feb46b43c4b52b815a7572762ed6d
-
SHA1
0663ded285aeca6e7d95310df20a004034bb3e88
-
SHA256
e84fae9f0de05d8c3f67a21f2a10cbb842a75b1fc0eaf075428a934c78dc18cf
-
SHA512
6996b2f8bf0b15ee0f3c4f02f3b06a2f6f995aaa3dd52242e5bf94d783213a91d3d18046cf588b5f00e32a437d82ebb79700d374fc7f74d1fe754198fb04930e
-
SSDEEP
49152:7McPg8d3J5p6nMtHPpun99rNHjRo5xsU1wS5LCbStxqqzPEBKj/SUqUl/kgHmH80:8Ln05xsYAKjSVfCv8+2j2HAJ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\Control Panel\International\Geo\Nation Speccy64.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Speccy64.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: Speccy64.exe File opened (read-only) \??\O: Speccy64.exe File opened (read-only) \??\W: Speccy64.exe File opened (read-only) \??\A: Speccy64.exe File opened (read-only) \??\G: Speccy64.exe File opened (read-only) \??\P: Speccy64.exe File opened (read-only) \??\V: Speccy64.exe File opened (read-only) \??\X: Speccy64.exe File opened (read-only) \??\T: Speccy64.exe File opened (read-only) \??\B: Speccy64.exe File opened (read-only) \??\H: Speccy64.exe File opened (read-only) \??\I: Speccy64.exe File opened (read-only) \??\J: Speccy64.exe File opened (read-only) \??\N: Speccy64.exe File opened (read-only) \??\Q: Speccy64.exe File opened (read-only) \??\Y: Speccy64.exe File opened (read-only) \??\Z: Speccy64.exe File opened (read-only) \??\E: Speccy64.exe File opened (read-only) \??\L: Speccy64.exe File opened (read-only) \??\M: Speccy64.exe File opened (read-only) \??\R: Speccy64.exe File opened (read-only) \??\S: Speccy64.exe File opened (read-only) \??\U: Speccy64.exe -
Remote Services: SMB/Windows Admin Shares 1 TTPs 1 IoCs
Adversaries may use Valid Accounts to interact with a remote network share using Server Message Block (SMB).
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\LanmanServer\Parameters\NullSessionPipes Speccy64.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 Speccy64.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\msmouse.inf_amd64_1793a485b491b199\msmouse.PNF Speccy64.exe File created \??\c:\windows\system32\driverstore\filerepository\msmouse.inf_amd64_1793a485b491b199\msmouse.PNF Speccy64.exe File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF Speccy64.exe File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF Speccy64.exe File created C:\Windows\System32\DriverStore\FileRepository\keyboard.inf_amd64_5938c699b80ebb8f\keyboard.PNF Speccy64.exe File created \??\c:\windows\system32\driverstore\filerepository\keyboard.inf_amd64_5938c699b80ebb8f\keyboard.PNF Speccy64.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 Speccy64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\DeviceDesc Speccy64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName Speccy64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 Speccy64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\DeviceDesc Speccy64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName Speccy64.exe -
Suspicious behavior: EnumeratesProcesses 54 IoCs
pid Process 1664 Speccy64.exe 1664 Speccy64.exe 1664 Speccy64.exe 1664 Speccy64.exe 1664 Speccy64.exe 1664 Speccy64.exe 1664 Speccy64.exe 1664 Speccy64.exe 1664 Speccy64.exe 1664 Speccy64.exe 1664 Speccy64.exe 1664 Speccy64.exe 1664 Speccy64.exe 1664 Speccy64.exe 1664 Speccy64.exe 1664 Speccy64.exe 1664 Speccy64.exe 1664 Speccy64.exe 1664 Speccy64.exe 1664 Speccy64.exe 1664 Speccy64.exe 1664 Speccy64.exe 1664 Speccy64.exe 1664 Speccy64.exe 1664 Speccy64.exe 1664 Speccy64.exe 1664 Speccy64.exe 1664 Speccy64.exe 1664 Speccy64.exe 1664 Speccy64.exe 1664 Speccy64.exe 1664 Speccy64.exe 1664 Speccy64.exe 1664 Speccy64.exe 1664 Speccy64.exe 1664 Speccy64.exe 1664 Speccy64.exe 1664 Speccy64.exe 1664 Speccy64.exe 1664 Speccy64.exe 1664 Speccy64.exe 1664 Speccy64.exe 1664 Speccy64.exe 1664 Speccy64.exe 1664 Speccy64.exe 1664 Speccy64.exe 1664 Speccy64.exe 1664 Speccy64.exe 1664 Speccy64.exe 1664 Speccy64.exe 1664 Speccy64.exe 1664 Speccy64.exe 1664 Speccy64.exe 1664 Speccy64.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 648 Process not Found -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeShutdownPrivilege 1664 Speccy64.exe Token: SeCreatePagefilePrivilege 1664 Speccy64.exe Token: SeDebugPrivilege 1664 Speccy64.exe Token: SeShutdownPrivilege 1664 Speccy64.exe Token: SeCreatePagefilePrivilege 1664 Speccy64.exe Token: SeShutdownPrivilege 1664 Speccy64.exe Token: SeCreatePagefilePrivilege 1664 Speccy64.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1664 Speccy64.exe 1664 Speccy64.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1664 Speccy64.exe 1664 Speccy64.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1664 Speccy64.exe 1664 Speccy64.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1664 wrote to memory of 3860 1664 Speccy64.exe 90 PID 1664 wrote to memory of 3860 1664 Speccy64.exe 90 PID 1664 wrote to memory of 3616 1664 Speccy64.exe 93 PID 1664 wrote to memory of 3616 1664 Speccy64.exe 93 PID 1664 wrote to memory of 1484 1664 Speccy64.exe 95 PID 1664 wrote to memory of 1484 1664 Speccy64.exe 95 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Speccy64.exe"C:\Users\Admin\AppData\Local\Temp\Speccy64.exe"1⤵
- Checks computer location settings
- Checks whether UAC is enabled
- Enumerates connected drives
- Remote Services: SMB/Windows Admin Shares
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Program Files\Java\jre-1.8\bin\java.exe"C:\Program Files\Java\jre-1.8\bin\java" -version2⤵PID:3860
-
-
C:\Program Files\Java\jdk-1.8\bin\java.exe"C:\Program Files\Java\jdk-1.8\bin\java" -version2⤵PID:3616
-
-
C:\Windows\system32\secedit.exe/export /cfg "C:\Users\Admin\AppData\Local\Temp\spc_se.txt" /quiet /areas SECURITYPOLICY2⤵PID:1484
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:4344
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5009819c0abc869038a9d184bd7a9b6c7
SHA13ce497bc1ce7cb35209fd2a8556dabae7ee3adfe
SHA2562fd69eb9a60ae80b0168ff8f4656e5981701f1558bf5707997b1ee9ba35c3185
SHA5123fe0065e16ade01bda35f0c850b6a67cfbd0e3377e7470c67680f2502b76444261f6abc4dbd6ea2822d1a76f3d386c6f7af7aa5bd8f32659d15912428ec7b23d