Overview
overview
8Static
static
37cb7086237...28.exe
windows7-x64
87cb7086237...28.exe
windows10-2004-x64
8$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PROGRAMFI...it.dll
windows7-x64
1$PROGRAMFI...it.dll
windows10-2004-x64
1$PROGRAMFI...ge.dll
windows7-x64
1$PROGRAMFI...ge.dll
windows10-2004-x64
1$PROGRAMFI...er.dll
windows7-x64
1$PROGRAMFI...er.dll
windows10-2004-x64
1fuk.exe
windows7-x64
7fuk.exe
windows10-2004-x64
7vts.exe
windows7-x64
8vts.exe
windows10-2004-x64
8Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
28/01/2024, 09:05
Static task
static1
Behavioral task
behavioral1
Sample
7cb7086237327a68a89f9ffebbe5a228.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7cb7086237327a68a89f9ffebbe5a228.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
$PROGRAMFILES/foler/olader/acledit.dll
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
$PROGRAMFILES/foler/olader/acledit.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
$PROGRAMFILES/foler/olader/acppage.dll
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
$PROGRAMFILES/foler/olader/acppage.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
$PROGRAMFILES/foler/olader/adprovider.dll
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
$PROGRAMFILES/foler/olader/adprovider.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral17
Sample
fuk.exe
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
fuk.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
vts.exe
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
vts.exe
Resource
win10v2004-20231215-en
General
-
Target
7cb7086237327a68a89f9ffebbe5a228.exe
-
Size
1.0MB
-
MD5
7cb7086237327a68a89f9ffebbe5a228
-
SHA1
7384435fe71c6c8275fb5204218da4900ef27f48
-
SHA256
621130bec2ab9105386df86d03072ec6762e510b5706614678555137cf8603c6
-
SHA512
469f2078bb1851a502e89639528484e9e175576f0bfac30cfcca259b7d5d740ac8c1787242f65c2f54f7fa3419003750171c8797ed99bd6b11cde7839e503c41
-
SSDEEP
24576:la81Z/0sin7rvPmds+nx9XkOFDlerCkGhQZ8t/4wPVii9WA:V1ZHin7rx+xFkoBerCkGhjbVinA
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 39 8 WScript.exe 41 8 WScript.exe 43 8 WScript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation Larghe.exe.com -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartClock.lnk fuk.exe -
Executes dropped EXE 5 IoCs
pid Process 3972 vts.exe 1784 fuk.exe 4368 Larghe.exe.com 3796 Larghe.exe.com 4424 SmartClock.exe -
Loads dropped DLL 1 IoCs
pid Process 4972 7cb7086237327a68a89f9ffebbe5a228.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" vts.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 39 iplogger.org 38 iplogger.org -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 22 ip-api.com -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\foler\olader\acppage.dll 7cb7086237327a68a89f9ffebbe5a228.exe File created C:\Program Files (x86)\foler\olader\adprovider.dll 7cb7086237327a68a89f9ffebbe5a228.exe File created C:\Program Files (x86)\foler\olader\acledit.dll 7cb7086237327a68a89f9ffebbe5a228.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1660 1784 WerFault.exe 89 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Larghe.exe.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Larghe.exe.com -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000_Classes\Local Settings Larghe.exe.com -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3872 PING.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4424 SmartClock.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 4368 Larghe.exe.com 4368 Larghe.exe.com 4368 Larghe.exe.com 3796 Larghe.exe.com 3796 Larghe.exe.com 3796 Larghe.exe.com -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 4368 Larghe.exe.com 4368 Larghe.exe.com 4368 Larghe.exe.com 3796 Larghe.exe.com 3796 Larghe.exe.com 3796 Larghe.exe.com -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 4972 wrote to memory of 3972 4972 7cb7086237327a68a89f9ffebbe5a228.exe 88 PID 4972 wrote to memory of 3972 4972 7cb7086237327a68a89f9ffebbe5a228.exe 88 PID 4972 wrote to memory of 3972 4972 7cb7086237327a68a89f9ffebbe5a228.exe 88 PID 4972 wrote to memory of 1784 4972 7cb7086237327a68a89f9ffebbe5a228.exe 89 PID 4972 wrote to memory of 1784 4972 7cb7086237327a68a89f9ffebbe5a228.exe 89 PID 4972 wrote to memory of 1784 4972 7cb7086237327a68a89f9ffebbe5a228.exe 89 PID 3972 wrote to memory of 4692 3972 vts.exe 91 PID 3972 wrote to memory of 4692 3972 vts.exe 91 PID 3972 wrote to memory of 4692 3972 vts.exe 91 PID 3972 wrote to memory of 4876 3972 vts.exe 93 PID 3972 wrote to memory of 4876 3972 vts.exe 93 PID 3972 wrote to memory of 4876 3972 vts.exe 93 PID 4876 wrote to memory of 3132 4876 cmd.exe 94 PID 4876 wrote to memory of 3132 4876 cmd.exe 94 PID 4876 wrote to memory of 3132 4876 cmd.exe 94 PID 3132 wrote to memory of 4804 3132 cmd.exe 95 PID 3132 wrote to memory of 4804 3132 cmd.exe 95 PID 3132 wrote to memory of 4804 3132 cmd.exe 95 PID 3132 wrote to memory of 4368 3132 cmd.exe 96 PID 3132 wrote to memory of 4368 3132 cmd.exe 96 PID 3132 wrote to memory of 4368 3132 cmd.exe 96 PID 3132 wrote to memory of 3872 3132 cmd.exe 97 PID 3132 wrote to memory of 3872 3132 cmd.exe 97 PID 3132 wrote to memory of 3872 3132 cmd.exe 97 PID 4368 wrote to memory of 3796 4368 Larghe.exe.com 98 PID 4368 wrote to memory of 3796 4368 Larghe.exe.com 98 PID 4368 wrote to memory of 3796 4368 Larghe.exe.com 98 PID 1784 wrote to memory of 4424 1784 fuk.exe 100 PID 1784 wrote to memory of 4424 1784 fuk.exe 100 PID 1784 wrote to memory of 4424 1784 fuk.exe 100 PID 3796 wrote to memory of 8 3796 Larghe.exe.com 111 PID 3796 wrote to memory of 8 3796 Larghe.exe.com 111 PID 3796 wrote to memory of 8 3796 Larghe.exe.com 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\7cb7086237327a68a89f9ffebbe5a228.exe"C:\Users\Admin\AppData\Local\Temp\7cb7086237327a68a89f9ffebbe5a228.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\yankee\vts.exe"C:\Users\Admin\AppData\Local\Temp\yankee\vts.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Windows\SysWOW64\dllhost.exedllhost.exe3⤵PID:4692
-
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Parve.vss3⤵
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\SysWOW64\cmd.execmd4⤵
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^LMdJCxRSRoddjdlTxyoqClWafTdkkbEWYdXeiJSojeIIDRNHLutVIRNBQXzJtFGzDxaWziMKjZNmBhOnyJAyaIhuCcjpdprGvgtpm$" Puramente.vss5⤵PID:4804
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Larghe.exe.comLarghe.exe.com V5⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Larghe.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Larghe.exe.com V6⤵
- Checks computer location settings
- Executes dropped EXE
- Checks processor information in registry
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\peymhwotgtk.vbs"7⤵
- Blocklisted process makes network request
PID:8
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping ZHCNTALV -n 305⤵
- Runs ping.exe
PID:3872
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\yankee\fuk.exe"C:\Users\Admin\AppData\Local\Temp\yankee\fuk.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
PID:4424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1784 -s 9683⤵
- Program crash
PID:1660
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1784 -ip 17841⤵PID:4928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
313B
MD5bee55e52500f967c3d9402e05dd57f65
SHA1d8dc65ec97c6288e1fd10b8c4f8502e5a8a5bbf6
SHA256b90eae4b05d321efc4519963349c1775dcea8e3b0ae53b50285545380b6539c0
SHA512b8624a934fb74760f5b231ca97e89074b227ad9fe3bb08b01a81cf35760f06b346f395cf6683df5881dc429ae77af0d0a07cfeb9c9ec127e4e917191bf8c91da
-
Filesize
248KB
MD59f2f64efd5eab0d18fcae6fcbcbbdbce
SHA1e578609f228dcd87259c41653d5c572a694a73e4
SHA256f7d6d76bf792f9eb37289c625d09ef3e0cef8c619c2ec56d0dfe06978b8ede49
SHA512855571d6ece80d3fe633e1468e93f960e30f0cbb783981fb17a7f75fd29c0a67a57a69bc5feae7f61696d434ace05c16c5e6c857fb888bc1beef543a602621ea
-
Filesize
280KB
MD5230a604c60b24832104c17239a5f4bee
SHA12c540a5339de7482a169e417fe95d6829853a763
SHA2565bddc59af1a042d645d63ef22694a3ad3335f868549d3f28997e105a6d6240c4
SHA5120453e3b4346a69d18e3c80911912da020ebb89c403717505b4c7f214dd41e0817cedb337526a5ac6512ad22ddd06c16b7884d8f03db3aaf4c7da42864913a4ad
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
491B
MD56193206b845ad943cc6711d8fc9a4a96
SHA1f04440a3e4596312a9090450aed7bf1c1dfec347
SHA2568a8e1bb6d656364da887d31555ca97a5173c71c8bd18a317f2ac8c4eac094079
SHA512371523630141d273b575d87ade03829c1a08a2d17d44a8a5b8a4313ccd71d26ba8badd524bbbe59d9d4dd474355f2e70aa40b204f79053ba8802418f0c600f81
-
Filesize
405KB
MD5d286a5a841a88c48d543d17e3fdaf0cb
SHA1b1f90c8e984361643ccdd516defd64687b698b95
SHA256801d1b6a9aab7b07e79c15e08933b230817cbbf173bec02e8a014b477db524f8
SHA512b573b6f25afa81cc3c33631742421f075c23bd92ded375ddc3395de845abcd047116950a2cc870a17f38a30cf0e7f49f32bd0ce32d9ca0a312d69cd2a9aac776
-
Filesize
294KB
MD568cd506e379715e8123da907aab352a5
SHA1146b47016c4dfb1a715385968d41b4ddda321cde
SHA256ea8812d667219a057ba11f10858a4be8bf53863760f588051ffe5b76515665df
SHA512da12c51ccf6700bcab269446dd012f0ff9529a924c75ee533abf747415c6a541ef344faf59552305b9442ced3463bc8a9d0b3cc8466d0134ba2e448a0dce58c6
-
Filesize
246KB
MD500a2e02507fc4ef1c654f8cabbd47ba8
SHA1f8491fec807229096208ef7aad4e65482d28e021
SHA256b5d595bd12233c5ccab775961caf207b354e53e95cf83b8ef137dea09a3b100f
SHA5120cccefef3eca6f07558823acf589604f16fa11e3f93cb54a037d6f00cbc1b3a552d52c6630d1e94d63e5bee19475b54e656df0e8ff279b3174e241a43fdd37ca
-
Filesize
14KB
MD5adb29e6b186daa765dc750128649b63d
SHA1160cbdc4cb0ac2c142d361df138c537aa7e708c9
SHA2562f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08
SHA512b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada
-
Filesize
136B
MD569d8da9bed4f0de7cdba4fcf6fe20040
SHA1c221e272d7cfbbf1cd76ea4854e142bb87114b9e
SHA256caf711e5537765906df7c42b61e8d4f9f28eeb065c8a7c7bdfbc5e6823f1fd92
SHA51216117ad3aee825ff72d600835a6c754e7fe1cf77a9bbc09b85c1aaa75dd710af31fccdeb93033ae273b97dc817c3f674f1ec39e57a6dc53b24faa8caf7708fd4
-
Filesize
295KB
MD575ea00138e7b6d0c9a518c975068ec43
SHA11a5505b10dda0b54f69e54afa6c86ccef3a26d54
SHA256dba8d246dde96cb992ef6b6ff482e9ef047b8f7f2233b0a4a037fc3d50df2edb
SHA512ec5a6fe268ec0c6bd0921bbdf638ce827ebc87128701a6ad6f33a038173318a3695a1ec9189a100969e14628b7313efc5c14abf0937a8a6fef74ab72cb6b3a85
-
Filesize
436KB
MD5d34f1e846b84b962ce183e687faf0a3a
SHA11c6393e88cd9028f5a1973a9667a4eaaf9c029f9
SHA256aecdad45dae504bbb04ab9e097e9e098fffb50e68f6e126a2ab33d2e6aee8147
SHA512055a38b89a5ace26dcda47837c05eda71d54e67aaf204954e50e9ec5931edd85ebd8af3e484583708f506a27731d7c633b640dfbd620b3a327d5f4c9b88e7a7b
-
Filesize
187KB
MD56491818f93c5d1c40445d02a965291d4
SHA17ff6d9e032d088ab7204e63d24c9abab2acc4afa
SHA256abc824d97eabd9ce5ef8e65ae8fedd1c21eb89848b707399da88f9a429984f71
SHA512fc3a70c73279e2e38bc88c1fad2df5ddbd25afcd61a9f29a65c31732511a6832c9e9d10bd034bb726e467b369306131825ccc54c868eadd0731026eac1bac86a
-
Filesize
203KB
MD59f57252087bfada7cd4d22790b98d0b2
SHA119d4cbf1326f9d7b41a2a1d1f144762e0173e9e3
SHA256e2ffd5f6810337336b93c907a177d1d33decad7bc94fca2eb787e0cd1ec23fdc
SHA512e76f803f433c053f25ac04f2711ea3f469fa4ffb59bfd920f3f72d8d6aaaa3c8c522aded536f7062082c53c3a42dee6329ff226c22486db5f90d195581e7b70f
-
Filesize
187KB
MD56171613a23cfc34273f9de965bcfbd52
SHA1c4a14c9366539fae184b097898d78b95c7de567a
SHA256d873ba4a307b2343654d9b602c3e30d3321a680943dd042740e3e126d5a9bf04
SHA512dcb99269254fcf47f33f5c852b141899e1d1ab25b6ee033f1ae6b76435cf74184b6dcd558109b673e959c6295e5b2893427e60fbaab91818d178c45e99320bae