Overview
overview
7Static
static
3file.exe
windows7-x64
7file.exe
windows10-2004-x64
7$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/Zip.dll
windows7-x64
3$PLUGINSDIR/Zip.dll
windows10-2004-x64
3$R1.ps1
windows7-x64
1$R1.ps1
windows10-2004-x64
1SumatraPDF.exe
windows7-x64
1SumatraPDF.exe
windows10-2004-x64
1uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29-01-2024 08:22
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Checker.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Checker.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/Zip.dll
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/Zip.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
$R1.ps1
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
$R1.ps1
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
SumatraPDF.exe
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
SumatraPDF.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral15
Sample
uninst.exe
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
uninst.exe
Resource
win10v2004-20231215-en
General
-
Target
file.exe
-
Size
3.3MB
-
MD5
e9511c52af792b25be4cc022154a8753
-
SHA1
9fb6b7306286ba00d05b045c37035da39026e5ed
-
SHA256
30aecb1d0bb7c6f8de3f21937ff121ccfee96e0454a1e9a156fefbf8accc8770
-
SHA512
8ff065e15a2e3ca5ab61b60d32cb1ecbbd34d9b45ff3947e2214d437f3f8d572b6b1c18abfe7a649f50892f17bfbbf4238a67562fdcf03ba72baac1cdd758d2a
-
SSDEEP
98304:8i++qX8iuivYw7Kx0tJI7dKeZIC5JkvEC:/cNuyYw7RtJI7ZZh5Jkl
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 1352 file.exe 1352 file.exe 1352 file.exe -
Registers COM server for autorun 1 TTPs 11 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1A9913F2-A81D-B117-47A9-288972925F22}\InProcServer32\ = "C:\\Program Files\\Windows Media Player\\Media Renderer\\Storage.dll" file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1A9913F2-A81D-B117-47A9-288972925F22}\InProcServer32\ThreadingModel = "Apartment" file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2E9913F2-A81D-B117-47A9-288972925F22}\InProcServer32\ = "C:\\Program Files\\Windows Media Player\\Media Renderer\\Storage.dll" file.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2E9913F2-A81D-B117-47A9-288972925F22}\InProcServer32 file.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1A9913F2-A81D-B117-47A9-288972925F22}\InProcServer32 file.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\CLSID\{2E9913F2-A81D-B117-47A9-288972925F22}\InProcServer32 file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1F9913F2-A81D-B117-47A9-288972925F22}\InProcServer32\ = "C:\\Program Files\\Windows Media Player\\Media Renderer\\Storage.dll" file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1F9913F2-A81D-B117-47A9-288972925F22}\InProcServer32\ThreadingModel = "Apartment" file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2E9913F2-A81D-B117-47A9-288972925F22}\InProcServer32\ThreadingModel = "Apartment" file.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1F9913F2-A81D-B117-47A9-288972925F22}\InProcServer32 file.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\CLSID\{1F9913F2-A81D-B117-47A9-288972925F22}\InProcServer32 file.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\ClocX\SumatraPDF.exe file.exe File created C:\Program Files (x86)\ClocX\uninst.exe file.exe File created C:\Program Files (x86)\360\360Safe\deepscan\speedmem2.hg file.exe File created C:\Program Files\Windows Media Player\Media Renderer\Storage.dll file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1A9913F2-A81D-B117-47A9-288972925F22}\InProcServer32\ThreadingModel = "Apartment" file.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\ShellEx\{e357fccd-a995-4576-b01f-234630154e96} file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1F9913F2-A81D-B117-47A9-288972925F22}\InProcServer32\ = "C:\\Program Files\\Windows Media Player\\Media Renderer\\Storage.dll" file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1F9913F2-A81D-B117-47A9-288972925F22}\InProcServer32\ThreadingModel = "Apartment" file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2E9913F2-A81D-B117-47A9-288972925F22}\InProcServer32\ThreadingModel = "Apartment" file.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\CLSID file.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\CLSID\{1F9913F2-A81D-B117-47A9-288972925F22} file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1A9913F2-A81D-B117-47A9-288972925F22}\InProcServer32\ = "C:\\Program Files\\Windows Media Player\\Media Renderer\\Storage.dll" file.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\CopyHookHandlers\FileSystemEx file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\CopyHookHandlers\FileSystemEx\ = "{2E9913F2-A81D-B117-47A9-288972925F22}" file.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1F9913F2-A81D-B117-47A9-288972925F22}\InProcServer32 file.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID file.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2E9913F2-A81D-B117-47A9-288972925F22} file.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\CLSID\{2E9913F2-A81D-B117-47A9-288972925F22}\InProcServer32 file.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1A9913F2-A81D-B117-47A9-288972925F22}\InProcServer32 file.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1F9913F2-A81D-B117-47A9-288972925F22} file.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\CLSID\{1F9913F2-A81D-B117-47A9-288972925F22}\InProcServer32 file.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2E9913F2-A81D-B117-47A9-288972925F22}\InProcServer32 file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2E9913F2-A81D-B117-47A9-288972925F22}\InProcServer32\ = "C:\\Program Files\\Windows Media Player\\Media Renderer\\Storage.dll" file.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\CLSID\{2E9913F2-A81D-B117-47A9-288972925F22} file.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1A9913F2-A81D-B117-47A9-288972925F22} file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\{e357fccd-a995-4576-b01f-234630154e96}\ = "{1A9913F2-A81D-B117-47A9-288972925F22}" file.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1352 file.exe 1352 file.exe 1352 file.exe 1352 file.exe 1352 file.exe 1352 file.exe 1352 file.exe 1352 file.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.2MB
MD5a66c9054c372978b5752566361c27535
SHA1527b8a0f9bffc41df878fb45e73f58e01e827e25
SHA25654e19ff0a436f9806ff4dec14882a3391026751242b0e53330325e7c256d5155
SHA5123114d24ccc0705cb722fd0a6ef135215e6475702d12073ab0567039a34d2cb279f7a6f6ffb58cc2a38dc87b3f97c71c245709ba6242813a0abd5ca0d0bb7e17e
-
Filesize
41KB
MD51ebcb7fe4d8f8f975dd404d1688d1e1a
SHA1cff12da173ae6e6660870e6343aac823e013ebc3
SHA256c78112c3da52d30b98c4cb34d3b9baf406f85a4dc975c40a6949672122c8ed37
SHA5127ec29be35c39b8fb623eb1f624df984031bc26fb7c99d7375b754ac1bda383e318d01eeae2672a79db6e5b177e29d97a2eb0d60385a80f4a26a5006c7e0173fe
-
Filesize
76KB
MD5bd448b748b6fb2fc268f297363ef69e5
SHA10c33557703b39928d19520651001607724f5cf8d
SHA256b3a67c05d7788b1310b342bea37d69a84d9c7997c729f489f9602148f9a6d708
SHA512555f049387a924c1a3feb38582abb3c5b238df5975c4f739690e2bad06ce5bfce02c2deb46816aacbf73e76292382e8974484e9886f079de69ddad1268a0ea0d