Overview
overview
8Static
static
3LoggingPlatform.dll
windows7-x64
7LoggingPlatform.dll
windows10-2004-x64
7Setup.exe
windows7-x64
7Setup.exe
windows10-2004-x64
7UpdateRing...gs.dll
windows7-x64
7UpdateRing...gs.dll
windows10-2004-x64
7de-DE.dll
windows7-x64
1de-DE.dll
windows10-2004-x64
1msvcp140.dll
windows7-x64
3msvcp140.dll
windows10-2004-x64
3vcruntime140.dll
windows7-x64
1vcruntime140.dll
windows10-2004-x64
3wtsapi32.dll
windows7-x64
7wtsapi32.dll
windows10-2004-x64
7out.iso
windows7-x64
1out.iso
windows10-2004-x64
1Screenshots.lnk
windows7-x64
4Screenshots.lnk
windows10-2004-x64
7__TEMP/Log...rm.dll
windows7-x64
7__TEMP/Log...rm.dll
windows10-2004-x64
7__TEMP/Mic...nt.exe
windows7-x64
7__TEMP/Mic...nt.exe
windows10-2004-x64
7__TEMP/msvcp140.dll
windows7-x64
1__TEMP/msvcp140.dll
windows10-2004-x64
1__TEMP/update.dll
windows7-x64
8__TEMP/update.dll
windows10-2004-x64
1__TEMP/vcr...40.dll
windows7-x64
1__TEMP/vcr...40.dll
windows10-2004-x64
1__TEMP/vcr..._1.dll
windows7-x64
1__TEMP/vcr..._1.dll
windows10-2004-x64
1__TEMP/wtsapi32.dll
windows7-x64
7__TEMP/wtsapi32.dll
windows10-2004-x64
7Analysis
-
max time kernel
140s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
04-03-2024 08:35
Static task
static1
Behavioral task
behavioral1
Sample
LoggingPlatform.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
LoggingPlatform.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Setup.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Setup.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
UpdateRingSettings.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
UpdateRingSettings.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
de-DE.dll
Resource
win7-20240215-en
Behavioral task
behavioral8
Sample
de-DE.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
msvcp140.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
msvcp140.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
vcruntime140.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
vcruntime140.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
wtsapi32.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
wtsapi32.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
out.iso
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
out.iso
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
Screenshots.lnk
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
Screenshots.lnk
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
__TEMP/LoggingPlatform.dll
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
__TEMP/LoggingPlatform.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
__TEMP/Microsoft.SharePoint.NativeMessagingClient.exe
Resource
win7-20240215-en
Behavioral task
behavioral22
Sample
__TEMP/Microsoft.SharePoint.NativeMessagingClient.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
__TEMP/msvcp140.dll
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
__TEMP/msvcp140.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
__TEMP/update.dll
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
__TEMP/update.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
__TEMP/vcruntime140.dll
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
__TEMP/vcruntime140.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
__TEMP/vcruntime140_1.dll
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
__TEMP/vcruntime140_1.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
__TEMP/wtsapi32.dll
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
__TEMP/wtsapi32.dll
Resource
win10v2004-20240226-en
General
-
Target
Screenshots.lnk
-
Size
2KB
-
MD5
98ad35d66db0a9f14cc373a13ecba8e1
-
SHA1
b365699da4a42660e980417617dd76726aabe5c6
-
SHA256
25cbfe5762a383d9f616feddcf4122f6b1676a201c2a97074d6e4b6c336629c5
-
SHA512
a63609e51c937e4c8832a061999da2a6171f4a01dbdc4ea8ba8378aed89e1435fb801c8cb17ceeb924c2694937e7dbc48131ecd2143b13cb4e78b1b1221d6fca
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe -
Modifies registry class 20 IoCs
Processes:
explorer.exedescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e80922b16d365937a46956b92703aca08af0000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
explorer.exepid process 3684 explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
explorer.exepid process 3684 explorer.exe 3684 explorer.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
cmd.execmd.exedescription pid process target process PID 4392 wrote to memory of 4916 4392 cmd.exe cmd.exe PID 4392 wrote to memory of 4916 4392 cmd.exe cmd.exe PID 4916 wrote to memory of 4372 4916 cmd.exe explorer.exe PID 4916 wrote to memory of 4372 4916 cmd.exe explorer.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Screenshots.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c c:\windows\explorer.exe %CD%__TEMP\Microsoft.SharePoint.NativeMessagingClient.exe2⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\explorer.exec:\windows\explorer.exe C:\Users\Admin\AppData\Local\Temp__TEMP\Microsoft.SharePoint.NativeMessagingClient.exe3⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3964 --field-trial-handle=2356,i,13261194862334667799,7441241219475888176,262144 --variations-seed-version /prefetch:81⤵