Overview
overview
5Static
static
3TypeMgr.exe
windows7-x64
5TypeMgr.exe
windows10-2004-x64
5orange/COMDLG32.dll
windows7-x64
1orange/COMDLG32.dll
windows10-2004-x64
1orange/Image.dll
windows7-x64
1orange/Image.dll
windows10-2004-x64
1orange/Image.dll
windows7-x64
1orange/Image.dll
windows10-2004-x64
1orange/MCI32.dll
windows7-x64
1orange/MCI32.dll
windows10-2004-x64
1orange/MSCOMCTL.dll
windows7-x64
1orange/MSCOMCTL.dll
windows10-2004-x64
1orange/MSINET.dll
windows7-x64
1orange/MSINET.dll
windows10-2004-x64
1orange/MSWINSCK.dll
windows7-x64
1orange/MSWINSCK.dll
windows10-2004-x64
1orange/Skin.dll
windows7-x64
3orange/Skin.dll
windows10-2004-x64
3orange/StoneXP.dll
windows7-x64
1orange/StoneXP.dll
windows10-2004-x64
1orange/StoneXP.dll
windows7-x64
1orange/StoneXP.dll
windows10-2004-x64
1orange/Type.exe
windows7-x64
5orange/Type.exe
windows10-2004-x64
5orange/VB5DB.dll
windows7-x64
3orange/VB5DB.dll
windows10-2004-x64
3orange/VB6CHS.dll
windows7-x64
1orange/VB6CHS.dll
windows10-2004-x64
1orange/dat...in.htm
windows7-x64
1orange/dat...in.htm
windows10-2004-x64
1orange/dat...ol.exe
windows7-x64
1orange/dat...ol.exe
windows10-2004-x64
1Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 03:36
Static task
static1
Behavioral task
behavioral1
Sample
TypeMgr.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
TypeMgr.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
orange/COMDLG32.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
orange/COMDLG32.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
orange/Image.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
orange/Image.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
orange/Image.dll
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
orange/Image.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
orange/MCI32.dll
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
orange/MCI32.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
orange/MSCOMCTL.dll
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
orange/MSCOMCTL.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
orange/MSINET.dll
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
orange/MSINET.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
orange/MSWINSCK.dll
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
orange/MSWINSCK.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral17
Sample
orange/Skin.dll
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
orange/Skin.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
orange/StoneXP.dll
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
orange/StoneXP.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral21
Sample
orange/StoneXP.dll
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
orange/StoneXP.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
orange/Type.exe
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
orange/Type.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
orange/VB5DB.dll
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
orange/VB5DB.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
orange/VB6CHS.dll
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
orange/VB6CHS.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral29
Sample
orange/data/dict/explain.htm
Resource
win7-20231215-en
Behavioral task
behavioral30
Sample
orange/data/dict/explain.htm
Resource
win10v2004-20231222-en
Behavioral task
behavioral31
Sample
orange/data/finance/ziliao/ExamTool.exe
Resource
win7-20231129-en
Behavioral task
behavioral32
Sample
orange/data/finance/ziliao/ExamTool.exe
Resource
win10v2004-20231215-en
General
-
Target
TypeMgr.exe
-
Size
488KB
-
MD5
c0501ce9bc2dcd1521e98bdac7f7a09c
-
SHA1
c0b4c8a66b1655e6a272f626438592109f6197db
-
SHA256
c9b2429f3c8b72ad6fd8671d9ee32b8025cbd8547a8c415a7404fec657f4af8e
-
SHA512
34822beeaf7b9d1432e02e7d77c536b0f3415dba045d69d0a937490411c304872b834597fdabeef4c71a58f5261cb4cae6aef0ab18354baf5f0c44f9380e89a5
-
SSDEEP
3072:Zwa73FLqHwQZJSBtgF0Hsdx0ZlXcbfgDAgi:Wazp0wkIs+lwzgi
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation TypeMgr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 37 IoCs
pid Process 544 Type.exe 544 Type.exe 544 Type.exe 544 Type.exe 544 Type.exe 544 Type.exe 544 Type.exe 544 Type.exe 544 Type.exe 544 Type.exe 544 Type.exe 544 Type.exe 544 Type.exe 544 Type.exe 544 Type.exe 544 Type.exe 544 Type.exe 544 Type.exe 544 Type.exe 544 Type.exe 544 Type.exe 544 Type.exe 544 Type.exe 544 Type.exe 544 Type.exe 544 Type.exe 544 Type.exe 544 Type.exe 544 Type.exe 544 Type.exe 544 Type.exe 544 Type.exe 544 Type.exe 544 Type.exe 544 Type.exe 544 Type.exe 544 Type.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2334D2B3-713E-11CF-8AE5-00AA00C00905}\TypeLib Type.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C1A8AF27-1257-101B-8FB0-0020AF039CA3}\TypeLib\Version = "1.1" Type.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AE8F14D1-02B2-4C00-A460-88D89D59F447}\TypeLib\ = "{ACD4732E-2B7C-40C1-A56B-078848D41977}" Type.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908} Type.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{48E59295-9880-11CF-9754-00AA00C00908}\InprocServer32 Type.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock.1 Type.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D} Type.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{113FF3A0-5FCF-48FC-BFC4-5999A87A7092}\TypeLib Type.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AE8F14D1-02B2-4C00-A460-88D89D59F447}\TypeLib Type.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\InetCtls.Inet\ = "Microsoft Internet Transfer Control 6.0 (SP6)" Type.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C1A8AF28-1257-101B-8FB0-0020AF039CA3}\1.1\HELPDIR\ Type.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock\CLSID\ = "{248DD896-BB45-11CF-9ABC-0080C7E7B78D}" Type.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories\{0DE86A53-2BAA-11CF-A229-00AA003D7352} Type.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\MiscStatus Type.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{48E59291-9880-11CF-9754-00AA00C00908}\ = "IInet" Type.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA3}\ToolboxBitmap32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\orange\\MCI32.OCX, 1" Type.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BCEC1193-8E9F-4AB7-B1DD-BF9D3896B274}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" Type.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2334D2B1-713E-11CF-8AE5-00AA00C00905}\TypeLib Type.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\ = "{248DD890-BB45-11CF-9ABC-0080C7E7B78D}" Type.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{113FF3A0-5FCF-48FC-BFC4-5999A87A7092} Type.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9D6E41C4-9A25-4C02-AE41-B87F6C1805FA}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" Type.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2334D2B1-713E-11CF-8AE5-00AA00C00905}\ = "IVBDataObject" Type.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\Implemented Categories\{40FC6ED4-2438-11CF-A3DB-080036F12502} Type.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32 Type.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32 Type.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{64F1519C-5E02-41DD-8948-AB8D9BDF8589}\InprocServer32 Type.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B4565341-B998-4E76-AC5D-65614FCC791E}\TypeLib Type.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{48E59294-9880-11CF-9754-00AA00C00908}\InprocServer32 Type.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\ = "{248DD890-BB45-11CF-9ABC-0080C7E7B78D}" Type.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BCEC1193-8E9F-4AB7-B1DD-BF9D3896B274}\TypeLib Type.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BCEC1193-8E9F-4AB7-B1DD-BF9D3896B274}\TypeLib\Version = "1.0" Type.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\MiscStatus\1 Type.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ = "Microsoft WinSock Control, version 6.0 (SP6)" Type.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9D6E41C4-9A25-4C02-AE41-B87F6C1805FA}\TypeLib\Version = "1.0" Type.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{64F1519C-5E02-41DD-8948-AB8D9BDF8589}\ = "ImageX.ppgSourceImage" Type.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\InetCtls.Inet\CurVer Type.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{48E59292-9880-11CF-9754-00AA00C00908}\ProxyStubClsid32 Type.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{ACD4732E-2B7C-40C1-A56B-078848D41977}\1.0\ = "ImageX" Type.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3775D2E0-7C5D-11CF-899E-00AA00688B10}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\orange\\MCI32.OCX" Type.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2334D2B3-713E-11CF-8AE5-00AA00C00905} Type.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{113FF3A0-5FCF-48FC-BFC4-5999A87A7092}\TypeLib\ = "{ACD4732E-2B7C-40C1-A56B-078848D41977}" Type.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MCI.MMControl\CLSID Type.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\0 Type.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\Version = "1.0" Type.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA3} Type.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AE8F14D1-02B2-4C00-A460-88D89D59F447}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" Type.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B4565341-B998-4E76-AC5D-65614FCC791E}\VERSION Type.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MCI.MMControl.1\ = "Microsoft Multimedia Control, version 6.0" Type.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B7ABC220-DF71-11CF-8E74-00A0C90F26F8}\ProxyStubClsid32 Type.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B7ABC220-DF71-11CF-8E74-00A0C90F26F8}\ProxyStubClsid32 Type.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\HELPDIR\ Type.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9D6E41C4-9A25-4C02-AE41-B87F6C1805FA}\ProxyStubClsid32 Type.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BCEC1193-8E9F-4AB7-B1DD-BF9D3896B274}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" Type.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{ACD4732E-2B7C-40C1-A56B-078848D41977}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\orange\\Image.ocx" Type.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA3}\MiscStatus\1\ = "131473" Type.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\orange\\MSWINSCK.OCX" Type.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D} Type.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D} Type.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{ACD4732E-2B7C-40C1-A56B-078848D41977} Type.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MCI.MMControl\CLSID\ = "{C1A8AF25-1257-101B-8FB0-0020AF039CA3}" Type.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{AE8F14D1-02B2-4C00-A460-88D89D59F447}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" Type.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\VersionIndependentProgID Type.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{48E59294-9880-11CF-9754-00AA00C00908} Type.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2334D2B3-713E-11CF-8AE5-00AA00C00905}\ = "IVBDataObjectFiles" Type.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 544 Type.exe 544 Type.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 544 Type.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 324 TypeMgr.exe 324 TypeMgr.exe 544 Type.exe 544 Type.exe 544 Type.exe 544 Type.exe 544 Type.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 324 wrote to memory of 544 324 TypeMgr.exe 30 PID 324 wrote to memory of 544 324 TypeMgr.exe 30 PID 324 wrote to memory of 544 324 TypeMgr.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\TypeMgr.exe"C:\Users\Admin\AppData\Local\Temp\TypeMgr.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Users\Admin\AppData\Local\Temp\orange\Type.exe"C:\Users\Admin\AppData\Local\Temp\orange\Type.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d5a70738070f11e5709a384889536b59
SHA180c0cefc826bea70fde75dbfe54176686e97d4fb
SHA256ff31e347855df8f63116a11b7e6933884e3804325057bfdddf824e91de7a58de
SHA512cbb92f6ac7178a530400d5af152a4f309b2eb84e39443db311f0d7f72c5d43d49df10ac3fdd5376b8734876b244c32bfd9c522c2ecbf51d3d26c94bc840e0c01
-
Filesize
1KB
MD57988b68456a0ee92abae0d3cb62bd89c
SHA1b3c90e65a7473eec5065ec1115045da9ee9a9c60
SHA2561797065dbec28a47364655fcf28f00066b72ad5e9f21c5f5201c99354460b71d
SHA512139ae9110617a2a4b7bfd9b09bbe7d97433e00c3834358f9990316b44f8b8f6cd33b187a9b174e3dceb7c7705c74403ace803b81a34691e2f3aea658b91f47fe
-
Filesize
383B
MD50d96b8fae970f6e00c977b17181029ea
SHA109bd18f48bd72c72bd51cfda0f158185fa26eef2
SHA25688d74c62f4c08c369855c8586636b5f08dd160cca9c56e6a1a3d1c56f6befec1
SHA512518348bf472ba401f21b8e3bd2b4b836dafbf95d6656af6baa71e09e1a44c2bd050cf3f6f1592d979bb37e39eae92b6d9948bfe700bca5e701b2bfa2ecb3895e