Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 10:04
Static task
static1
Behavioral task
behavioral1
Sample
94e479ef08b0e546f4598efce8dfb237c3208ffa70a553b5519fd336a8f30f37.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
94e479ef08b0e546f4598efce8dfb237c3208ffa70a553b5519fd336a8f30f37.dll
Resource
win10v2004-20240802-en
General
-
Target
94e479ef08b0e546f4598efce8dfb237c3208ffa70a553b5519fd336a8f30f37.dll
-
Size
6.6MB
-
MD5
91ead0a1293d0a89b7b68a577f60271a
-
SHA1
0067540731ef0ad57f1054b9818eac126a997a29
-
SHA256
94e479ef08b0e546f4598efce8dfb237c3208ffa70a553b5519fd336a8f30f37
-
SHA512
744028cc472e052c3572a195f37b62d92f4e5d4810bcce893f288e2f1950f9354af6cf4f5157489ac8eaf349273f6f6b7f31981ad085db79953cb520dde3d44b
-
SSDEEP
98304:kZaa3ZILbpZcvrVoZr8UNb6TUk+zZ/7tdJf5d0kacIzM:/apuZcSNbmUR1fpaZ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2964 winaip.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\winaip.exe regsvr32.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winaip.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3D818FF9-7402-43AF-A880-5BC5B1EBEC9F}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EC31B0F3-9A21-4859-ABA9-11A35EFE6379}\Control regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\aip.document.2\shell\print\command winaip.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E9BCBFA2-BC58-424B-A8FE-D294A7E04657}\AuxUserType winaip.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\aip.document.2\EditFlags = 00000100 winaip.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E9BCBFA2-BC58-424B-A8FE-D294A7E04657}\ProgID winaip.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E9BCBFA2-BC58-424B-A8FE-D294A7E04657}\DefaultIcon winaip.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{FF75AC5B-D15E-41FA-9944-4352E6D34798}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FF75AC5B-D15E-41FA-9944-4352E6D34798}\ = "_DHWNJPostil" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3D818FF9-7402-43AF-A880-5BC5B1EBEC9F}\ = "IFontMapper" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E9BCBFA2-BC58-424B-A8FE-D294A7E04657}\Insertable winaip.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E9BCBFA2-BC58-424B-A8FE-D294A7E04657}\Printable winaip.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3148F938-794D-47E1-B868-19E835EDC8F9}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6BDA53C0-9019-4956-B6C9-7ED71D711973}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EC31B0F3-9A21-4859-ABA9-11A35EFE6379}\MiscStatus regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EC31B0F3-9A21-4859-ABA9-11A35EFE6379}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\aip.document.2\shell winaip.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E9BCBFA2-BC58-424B-A8FE-D294A7E04657}\Verb winaip.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3D818FF9-7402-43AF-A880-5BC5B1EBEC9F}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EC31B0F3-9A21-4859-ABA9-11A35EFE6379}\Implemented Categories\{7DD95801-9882-11CF-9FA9-00AA006C42C4} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\aip.document.2\protocol\StdFileEditing\verb winaip.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E9BCBFA2-BC58-424B-A8FE-D294A7E04657}\MiscStatus winaip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SOFTWARE\aip\printer\EMB_FLAG_EmbFontNum = "3000" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D2681306-01E3-45A2-B8FF-6649AA969C46}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3148F938-794D-47E1-B868-19E835EDC8F9}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3D818FF9-7402-43AF-A880-5BC5B1EBEC9F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3D818FF9-7402-43AF-A880-5BC5B1EBEC9F}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID winaip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E9BCBFA2-BC58-424B-A8FE-D294A7E04657}\Insertable\ winaip.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.aip winaip.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\aip.document.2\DefaultIcon winaip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E9BCBFA2-BC58-424B-A8FE-D294A7E04657}\AuxUserType\2\ = "Winaip" winaip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3D818FF9-7402-43AF-A880-5BC5B1EBEC9F}\TypeLib\ = "{D2681306-01E3-45A2-B8FF-6649AA969C46}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6BDA53C0-9019-4956-B6C9-7ED71D711973} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EC31B0F3-9A21-4859-ABA9-11A35EFE6379}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SOFTWARE\aip regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PowerPoint.Show.8\shell\TrustedPdf´ò¿ª\command\ = "\"C:\\Windows\\winaip.exe\" \"%1\"" winaip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\aip.document.2\shell\open\command\ = "C:\\Windows\\winaip.exe \"%1\"" winaip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3148F938-794D-47E1-B868-19E835EDC8F9}\ = "_DHWNJPostilEvents" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EC31B0F3-9A21-4859-ABA9-11A35EFE6379}\TypeLib\ = "{D2681306-01E3-45A2-B8FF-6649AA969C46}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EC31B0F3-9A21-4859-ABA9-11A35EFE6379}\Version regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\aip.document.2\ = "Winaip Document" winaip.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\aip.document.2\shell\printto\command winaip.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\aip.document.2\protocol\StdFileEditing winaip.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3148F938-794D-47E1-B868-19E835EDC8F9}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EC31B0F3-9A21-4859-ABA9-11A35EFE6379}\Version\ = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Word.Document.8\shell\TrustedPdf´ò¿ª\command\ = "\"C:\\Windows\\winaip.exe\" \"%1\"" winaip.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\aip.document.2\shell\open\command winaip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\aip.document.2\shell\print\command\ = "C:\\Windows\\winaip.exe /p \"%1\"" winaip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\aip.document.2\CLSID\ = "{E9BCBFA2-BC58-424B-A8FE-D294A7E04657}" winaip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{FF75AC5B-D15E-41FA-9944-4352E6D34798}\ = "_DHWNJPostil" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SOFTWARE\aip\printer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinAip\DefaultIcon\ = "C:\\Windows\\winaip.exe,0" winaip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E9BCBFA2-BC58-424B-A8FE-D294A7E04657}\Printable\ winaip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D2681306-01E3-45A2-B8FF-6649AA969C46}\1.0\ = "HWForNJJG ActiveX Control module" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D2681306-01E3-45A2-B8FF-6649AA969C46}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\aip regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\aip.document.2 winaip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\aip.document.2\DefaultIcon\ = "C:\\Windows\\winaip.exe,0" winaip.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E9BCBFA2-BC58-424B-A8FE-D294A7E04657}\AuxUserType\2 winaip.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D2681306-01E3-45A2-B8FF-6649AA969C46} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D2681306-01E3-45A2-B8FF-6649AA969C46}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{FF75AC5B-D15E-41FA-9944-4352E6D34798}\TypeLib\ = "{D2681306-01E3-45A2-B8FF-6649AA969C46}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EC31B0F3-9A21-4859-ABA9-11A35EFE6379}\MiscStatus\ = "0" regsvr32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2964 winaip.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2408 wrote to memory of 2420 2408 regsvr32.exe 28 PID 2408 wrote to memory of 2420 2408 regsvr32.exe 28 PID 2408 wrote to memory of 2420 2408 regsvr32.exe 28 PID 2408 wrote to memory of 2420 2408 regsvr32.exe 28 PID 2408 wrote to memory of 2420 2408 regsvr32.exe 28 PID 2408 wrote to memory of 2420 2408 regsvr32.exe 28 PID 2408 wrote to memory of 2420 2408 regsvr32.exe 28 PID 2420 wrote to memory of 2964 2420 regsvr32.exe 29 PID 2420 wrote to memory of 2964 2420 regsvr32.exe 29 PID 2420 wrote to memory of 2964 2420 regsvr32.exe 29 PID 2420 wrote to memory of 2964 2420 regsvr32.exe 29
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\94e479ef08b0e546f4598efce8dfb237c3208ffa70a553b5519fd336a8f30f37.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\94e479ef08b0e546f4598efce8dfb237c3208ffa70a553b5519fd336a8f30f37.dll2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\winaip.exe"C:\Windows\winaip.exe" -regaip3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2964
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD5a344630ea27cc4ac558f3f50990f5eda
SHA139da423851d26ca9f177dc0dcff4e037e779476a
SHA256b99b6dba4d1f6de19ab6792e9a3b7527e0a0c59137fade67a12406f92812f09e
SHA512b423c14c8b2ec5c4a45a516abdc292a84d1501c2141db239d95c758312b835d6e31a658c73317550bc2827d3189ea5eace5916a9481af8a5aae7def92fb4352a