Overview
overview
10Static
static
748c616cbb1...9e.exe
windows7-x64
748c616cbb1...9e.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$SYSDIR/gpyapi.dll
windows7-x64
3$SYSDIR/gpyapi.dll
windows10-2004-x64
3$SYSDIR/gtapi.dll
windows7-x64
3$SYSDIR/gtapi.dll
windows10-2004-x64
3$TEMP/Goog...er.exe
windows7-x64
8$TEMP/Goog...er.exe
windows10-2004-x64
$TEMP/Goog...ed.msi
windows7-x64
6$TEMP/Goog...ed.msi
windows10-2004-x64
6$TEMP/setu...20.exe
windows7-x64
7$TEMP/setu...20.exe
windows10-2004-x64
7ies_uni.exe
windows7-x64
7ies_uni.exe
windows10-2004-x64
7iesuper.dll
windows7-x64
6iesuper.dll
windows10-2004-x64
6UUPlayer.dll
windows7-x64
3UUPlayer.dll
windows10-2004-x64
3UUSeePlayer.exe
windows7-x64
10UUSeePlayer.exe
windows10-2004-x64
10bass-plugins.exe
windows7-x64
7bass-plugins.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3Analysis
-
max time kernel
144s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22-08-2024 06:51
Behavioral task
behavioral1
Sample
48c616cbb15b33f9f8001ae8074e8f68657f604bb20b923ddb6722f752427a9e.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
48c616cbb15b33f9f8001ae8074e8f68657f604bb20b923ddb6722f752427a9e.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$SYSDIR/gpyapi.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
$SYSDIR/gpyapi.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$SYSDIR/gtapi.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
$SYSDIR/gtapi.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$TEMP/GooglePinyinDownloader.exe
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
$TEMP/GooglePinyinDownloader.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$TEMP/GoogleToolbarInstaller_zh-CN_signed.msi
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
$TEMP/GoogleToolbarInstaller_zh-CN_signed.msi
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$TEMP/setup_iesuper_1020.exe
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
$TEMP/setup_iesuper_1020.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
ies_uni.exe
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
ies_uni.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
iesuper.dll
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
iesuper.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
UUPlayer.dll
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
UUPlayer.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
UUSeePlayer.exe
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
UUSeePlayer.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
bass-plugins.exe
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
bass-plugins.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240705-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win7-20240708-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win10v2004-20240802-en
General
-
Target
UUSeePlayer.exe
-
Size
421KB
-
MD5
9ab0941a1c54567373b6afed3f2ed491
-
SHA1
e0b8328027c65d4904e63124f80dc69e77ec0e6a
-
SHA256
b99716d09b8aa83e4cad5d9d889a144ddb04f8fe1f7f5bb58c656d873c3d04fb
-
SHA512
e79491c9c88775a735c9190d7a3d0536b62f62255f8da947358442309916a873d6923fa74cec237a1619ef12ecb2488b61394fb2058f3771ce621d7824190725
-
SSDEEP
6144:wk37CXfkVQp0lV731pO8nhJFSVpInCOXJYE56NnGrpk3iRYjZt5Bo:D7CXff0lN31NtWsYE565GCSRYjZt5Bo
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List UUSeePlayer.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\UUSeePlayer.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UUSeePlayer.exe:*:Enabled:UUPlayer" UUSeePlayer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UUSeePlayer.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main UUSeePlayer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Disable Script Debugger = "yes" UUSeePlayer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\DisableScriptDebuggerIE = "yes" UUSeePlayer.exe -
Modifies registry class 31 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEENOTIFY\ = "URL:UUSEENOTIFY Protocol" UUSeePlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEENOTIFY\shell\open\command UUSeePlayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEE.ucf\ = "UUSEE Media File" UUSeePlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEE.ucf\Shell UUSeePlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEE.ucf\Shell\Open UUSeePlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEE UUSeePlayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEE\URL Protocol UUSeePlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEENOTIFY\shell\open UUSeePlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEE.ucf UUSeePlayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEE.ucf\DefaultIcon\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\UUSeePlayer.exe\",-150" UUSeePlayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEENOTIFY\URL Protocol UUSeePlayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ucf\ = "UUSEE.ucf" UUSeePlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEE.ucf\DefaultIcon UUSeePlayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEEREC\ = "URL:UUSEEREC Protocol" UUSeePlayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEE.ucf\Shell\Open\Command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\UUSeePlayer.exe\" -file \"%1\"" UUSeePlayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEE\ = "URL:UUSEE Protocol" UUSeePlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEE\shell\open UUSeePlayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEE\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\UUSeePlayer.exe\" -v UUPlayer -url \"%1\"" UUSeePlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEEREC\shell\open UUSeePlayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEEREC\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\UUSeePlayer.exe\" -v UUPlayer -url \"%1\"" UUSeePlayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEEREC\URL Protocol UUSeePlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEEREC\shell UUSeePlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEENOTIFY UUSeePlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEENOTIFY\shell UUSeePlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ucf UUSeePlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEE\shell UUSeePlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEEREC UUSeePlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEEREC\shell\open\command UUSeePlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEE.ucf\Shell\Open\Command UUSeePlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEE\shell\open\command UUSeePlayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEENOTIFY\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\UUSeePlayer.exe\" -v UUPlayer -url \"%1\"" UUSeePlayer.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 2728 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2728 AUDIODG.EXE Token: 33 2728 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2728 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 2152 UUSeePlayer.exe 2152 UUSeePlayer.exe 2152 UUSeePlayer.exe 2152 UUSeePlayer.exe 2152 UUSeePlayer.exe 2152 UUSeePlayer.exe 2152 UUSeePlayer.exe 2152 UUSeePlayer.exe 2152 UUSeePlayer.exe 2152 UUSeePlayer.exe 2152 UUSeePlayer.exe 2152 UUSeePlayer.exe 2152 UUSeePlayer.exe 2152 UUSeePlayer.exe 2152 UUSeePlayer.exe 2152 UUSeePlayer.exe 2152 UUSeePlayer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\UUSeePlayer.exe"C:\Users\Admin\AppData\Local\Temp\UUSeePlayer.exe"1⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2152
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5d01⤵
- Suspicious use of AdjustPrivilegeToken
PID:2728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
728B
MD532df4d542a62373525276b13846d3982
SHA1be05224471eafbbe6f3bb74c9d6b4edfac278b6f
SHA256d36ac204d17006e662720a38259b88eb92642da41a02eea7abf5049fa0ff5d9e
SHA512ad3be52be429ec31afa5fdfb9806458a3f367993db6aabb5f16fc2198a4c57b2692335f9ae65a88083dc8e1d84c69236100705017a0ef0dc02e203476e52f499
-
Filesize
553B
MD5623cf5086569b8c78e96a10ea5654a3b
SHA1b5330cb47341142922fefd73467d948c85665d44
SHA2568fad4b8e13e23cd0a1600cb559b169350c1de86d5a67419ee8bef396016da5be
SHA512ad5443eb0ed99853ee6c852b5d8f278838e63cfc1b94e2847679acaebe4a7ed23b21985280c9a456faf404f6f4183dc6d356ddae2f9ad1af57278120c5fdff49
-
Filesize
1KB
MD52337e9d752b0bddd0e8dd4527de21268
SHA11025c31899f46d5f2ff7cf6338b677cce1beb377
SHA256dba46a452ea0ecb3566ba94c1fe0e497324d543895a14edbcbb81048a417fd6b
SHA5125a9410ecd9f73e77feb8d07ff665f3fd927b70dd587dcf8c40d72e6047f021efed39d117b4adac679a90f27f0b2c95085c2ca37cbb7f3568f632fe8f0dcfe765
-
Filesize
306B
MD51b7585405ca22a1cc2b12108c2976b9f
SHA12601e2ada4ed99d1d1a0884efff9362831d4f295
SHA256ae8df32900f2231dd722a0850f1aaa14101829e31f62c2f1706688ba8d1f49e4
SHA51215ef5a91cc03f70897b82926a092e3f2f776b647987295cfcc728cd53fa4f0f5ad3c0fac3b8cfeda87045386d3c4fe1bb18d7b8a192527522e02dabdd165f682
-
Filesize
419B
MD5e1344a235249aee1e45f7400dbe7c303
SHA115f248fd4d9e8ee035999cc0ba83451d226ee0f4
SHA256acb213a7e6b29b4bd2f3dce7d086c7187d1de96237e4d1125af099ae9f5d5fdf
SHA512d237c38f451c2be81abf022b5400464d3daad87fdf872f6b5c69ffad04f384784f3033735fab9e20b6aed46aacd5771864f5a315df8499b7dd91ba7508df117f
-
Filesize
351B
MD5c2740b8dca905245b4ebccbc7ecddcd1
SHA1dcf4beadcc5811dedcc1626e3e4eb038bebcc066
SHA25642889b0a8150c07f55ad3e05353b748c574cb84fef58aac4728d9f35a402f73a
SHA512f0f797987a848899487c18757df25ecbfdeaeb0b07d19de99466f6737f4a391ceef07b4a6582bf9f5225a04083ac71a38491b4d4bc828d0717402b62a0cde369
-
Filesize
89KB
MD5069b61256d87131f507cdf77d82de34e
SHA1ca5fa12343d6c638572c64f534c607835fd52b81
SHA2562c2d324dc04c8ff99b4176ec7cb20739f2d384c05c75da4d8aea8ca0f8be0dd7
SHA5124c44d537799566dc62b346ff86899e78aaee9292646cd4c3da4023ab55e147d9722ad2bd895f89708e071d488c7594fa810af3fd4090511317f800db8cb41f41