Overview
overview
10Static
static
10AnyDesk v3...V).exe
windows10-2004-x64
1DLL Explor...32.exe
windows10-2004-x64
7DLL Explor...64.exe
windows10-2004-x64
7DLL UnInje...or.exe
windows10-2004-x64
1Everything...ng.exe
windows10-2004-x64
7Everything...up.exe
windows10-2004-x64
4LastActivi...ew.exe
windows10-2004-x64
9LastActivi...ew.bat
windows10-2004-x64
9Lastproverka.bat
windows10-2004-x64
3NirCMD 2.8...md.exe
windows10-2004-x64
9NirCMD 2.8...xe.bat
windows10-2004-x64
9NirCMD 2.8...xe.bat
windows10-2004-x64
9OpenedFile...32.exe
windows10-2004-x64
9OpenedFile...64.exe
windows10-2004-x64
8Process Hacker 2.lnk
windows10-2004-x64
3Recuva 1.5...le.exe
windows10-2004-x64
7Shellbag_a...er.exe
windows10-2004-x64
10USBDeview ...ew.exe
windows10-2004-x64
9UserAssist...ew.exe
windows10-2004-x64
9processhac...up.exe
windows10-2004-x64
7Resubmissions
19-10-2023 11:09
231019-m9hf6agh68 10Analysis
-
max time kernel
592s -
max time network
441s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-ja -
resource tags
arch:x64arch:x86image:win10v2004-20230915-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
19-10-2023 11:09
Behavioral task
behavioral1
Sample
AnyDesk v3.6.3 (аналог TV).exe
Resource
win10v2004-20230915-ja
Behavioral task
behavioral2
Sample
DLL Explorer 1.2/DLLExplorer32.exe
Resource
win10v2004-20230915-ja
Behavioral task
behavioral3
Sample
DLL Explorer 1.2/DLLExplorer64.exe
Resource
win10v2004-20230915-ja
Behavioral task
behavioral4
Sample
DLL UnInjector 1.3/NVTDLLUnInjector.exe
Resource
win10v2004-20230915-ja
Behavioral task
behavioral5
Sample
Everything 1.4.1.877/Everything.exe
Resource
win10v2004-20230915-ja
Behavioral task
behavioral6
Sample
Everything-1.4.1.1022.x86-Setup.exe
Resource
win10v2004-20230915-ja
Behavioral task
behavioral7
Sample
LastActivityView 1.2.7/LastActivityView.exe
Resource
win10v2004-20230915-ja
Behavioral task
behavioral8
Sample
LastActivityView 1.2.7/Сохранить отчет LastActivityView.bat
Resource
win10v2004-20230915-ja
Behavioral task
behavioral9
Sample
Lastproverka.bat
Resource
win10v2004-20230915-ja
Behavioral task
behavioral10
Sample
NirCMD 2.8.1/nircmd.exe
Resource
win10v2004-20230915-ja
Behavioral task
behavioral11
Sample
NirCMD 2.8.1/Скриншот hl2.exe.bat
Resource
win10v2004-20230915-ja
Behavioral task
behavioral12
Sample
NirCMD 2.8.1/Скриншот ucp.exe.bat
Resource
win10v2004-20230915-ja
Behavioral task
behavioral13
Sample
OpenedFilesView 1.80/OpenedFilesView_32.exe
Resource
win10v2004-20230915-ja
Behavioral task
behavioral14
Sample
OpenedFilesView 1.80/OpenedFilesView_64.exe
Resource
win10v2004-20230915-ja
Behavioral task
behavioral15
Sample
Process Hacker 2.lnk
Resource
win10v2004-20230915-ja
Behavioral task
behavioral16
Sample
Recuva 1.53.1087 Pro & Portable/Recuva_Portable.exe
Resource
win10v2004-20230915-ja
Behavioral task
behavioral17
Sample
Shellbag_analyzer_cleaner.exe
Resource
win10v2004-20230915-ja
Behavioral task
behavioral18
Sample
USBDeview 2.73/USBDeview.exe
Resource
win10v2004-20230915-ja
Behavioral task
behavioral19
Sample
UserAssistView 1.0.2/UserAssistView.exe
Resource
win10v2004-20230915-ja
Behavioral task
behavioral20
Sample
processhacker-2.39-setup.exe
Resource
win10v2004-20230915-ja
General
-
Target
OpenedFilesView 1.80/OpenedFilesView_32.exe
-
Size
67KB
-
MD5
4338ff8ae33b8c6150feebcaa4864129
-
SHA1
4294ca4e350a5b67630c369823dc7ee2dd66253c
-
SHA256
5b4b9700ad8bbde39b7d597add33587edaaa0a36fabb7c47b642e9d8ff0ca441
-
SHA512
a2a460575a7f5d4d55984054c9de7cca6e1a0beec1b0ef39c9bd71e48685fb8b27d0819ec3a56704ee67d254a51185ea567ce94a6fc5124503401e456d22bb88
-
SSDEEP
1536:13PmFb9LibbWSonH9/Hbr3BEy08/1cu32YMtgo7biRx:dmFUfWPd/XRbB1v329gkSx
Malware Config
Signatures
-
Nirsoft 2 IoCs
resource yara_rule behavioral13/memory/4276-3-0x0000000000400000-0x0000000000422000-memory.dmp Nirsoft behavioral13/memory/4276-4-0x0000000000400000-0x0000000000422000-memory.dmp Nirsoft -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\NirSoftOpenedFilesDriver.sys OpenedFilesView_32.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\NirSoftOpenedFilesDriver\ImagePath = "\\??\\C:\\Windows\\system32\\drivers\\NirSoftOpenedFilesDriver.sys" OpenedFilesView_32.exe -
resource yara_rule behavioral13/memory/4276-0-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral13/memory/4276-3-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral13/memory/4276-4-0x0000000000400000-0x0000000000422000-memory.dmp upx -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4276 OpenedFilesView_32.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 4276 OpenedFilesView_32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLoadDriverPrivilege 4276 OpenedFilesView_32.exe Token: SeDebugPrivilege 4276 OpenedFilesView_32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\OpenedFilesView 1.80\OpenedFilesView_32.exe"C:\Users\Admin\AppData\Local\Temp\OpenedFilesView 1.80\OpenedFilesView_32.exe"1⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:4276