Overview
overview
8Static
static
3LoggingPlatform.dll
windows7-x64
7LoggingPlatform.dll
windows10-2004-x64
7Setup.exe
windows7-x64
7Setup.exe
windows10-2004-x64
7UpdateRing...gs.dll
windows7-x64
7UpdateRing...gs.dll
windows10-2004-x64
7de-DE.dll
windows7-x64
1de-DE.dll
windows10-2004-x64
1msvcp140.dll
windows7-x64
3msvcp140.dll
windows10-2004-x64
3vcruntime140.dll
windows7-x64
1vcruntime140.dll
windows10-2004-x64
3wtsapi32.dll
windows7-x64
7wtsapi32.dll
windows10-2004-x64
7out.iso
windows7-x64
1out.iso
windows10-2004-x64
1Screenshots.lnk
windows7-x64
4Screenshots.lnk
windows10-2004-x64
7__TEMP/Log...rm.dll
windows7-x64
7__TEMP/Log...rm.dll
windows10-2004-x64
7__TEMP/Mic...nt.exe
windows7-x64
7__TEMP/Mic...nt.exe
windows10-2004-x64
7__TEMP/msvcp140.dll
windows7-x64
1__TEMP/msvcp140.dll
windows10-2004-x64
1__TEMP/update.dll
windows7-x64
8__TEMP/update.dll
windows10-2004-x64
1__TEMP/vcr...40.dll
windows7-x64
1__TEMP/vcr...40.dll
windows10-2004-x64
1__TEMP/vcr..._1.dll
windows7-x64
1__TEMP/vcr..._1.dll
windows10-2004-x64
1__TEMP/wtsapi32.dll
windows7-x64
7__TEMP/wtsapi32.dll
windows10-2004-x64
7Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-03-2024 08:35
Static task
static1
Behavioral task
behavioral1
Sample
LoggingPlatform.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
LoggingPlatform.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Setup.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Setup.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
UpdateRingSettings.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
UpdateRingSettings.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
de-DE.dll
Resource
win7-20240215-en
Behavioral task
behavioral8
Sample
de-DE.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
msvcp140.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
msvcp140.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
vcruntime140.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
vcruntime140.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
wtsapi32.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
wtsapi32.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
out.iso
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
out.iso
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
Screenshots.lnk
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
Screenshots.lnk
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
__TEMP/LoggingPlatform.dll
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
__TEMP/LoggingPlatform.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
__TEMP/Microsoft.SharePoint.NativeMessagingClient.exe
Resource
win7-20240215-en
Behavioral task
behavioral22
Sample
__TEMP/Microsoft.SharePoint.NativeMessagingClient.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
__TEMP/msvcp140.dll
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
__TEMP/msvcp140.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
__TEMP/update.dll
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
__TEMP/update.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
__TEMP/vcruntime140.dll
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
__TEMP/vcruntime140.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
__TEMP/vcruntime140_1.dll
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
__TEMP/vcruntime140_1.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
__TEMP/wtsapi32.dll
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
__TEMP/wtsapi32.dll
Resource
win10v2004-20240226-en
General
-
Target
Screenshots.lnk
-
Size
2KB
-
MD5
98ad35d66db0a9f14cc373a13ecba8e1
-
SHA1
b365699da4a42660e980417617dd76726aabe5c6
-
SHA256
25cbfe5762a383d9f616feddcf4122f6b1676a201c2a97074d6e4b6c336629c5
-
SHA512
a63609e51c937e4c8832a061999da2a6171f4a01dbdc4ea8ba8378aed89e1435fb801c8cb17ceeb924c2694937e7dbc48131ecd2143b13cb4e78b1b1221d6fca
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
Processes:
explorer.exedescription ioc process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe -
Modifies registry class 18 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f44471a0359723fa74489c55595fe6b30ee0000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 200000001a00eebbfe2300001000d09ad3fd8f23af46adb46c85480369c700000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
cmd.execmd.exedescription pid process target process PID 1580 wrote to memory of 2652 1580 cmd.exe cmd.exe PID 1580 wrote to memory of 2652 1580 cmd.exe cmd.exe PID 1580 wrote to memory of 2652 1580 cmd.exe cmd.exe PID 2652 wrote to memory of 2708 2652 cmd.exe explorer.exe PID 2652 wrote to memory of 2708 2652 cmd.exe explorer.exe PID 2652 wrote to memory of 2708 2652 cmd.exe explorer.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Screenshots.lnk1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c c:\windows\explorer.exe %CD%__TEMP\Microsoft.SharePoint.NativeMessagingClient.exe2⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\explorer.exec:\windows\explorer.exe C:\Users\Admin\AppData\Local\Temp__TEMP\Microsoft.SharePoint.NativeMessagingClient.exe3⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class