Overview
overview
9Static
static
3earnapp-pl...73.exe
windows11-21h2-x64
4$PLUGINSDI...em.dll
windows11-21h2-x64
3$PLUGINSDI...fo.dll
windows11-21h2-x64
3$PLUGINSDI...rd.bmp
windows11-21h2-x64
3$PLUGINSDI...gs.dll
windows11-21h2-x64
3$PLUGINSDI...ec.dll
windows11-21h2-x64
3brd_config.json
windows11-21h2-x64
3earnapp.exe
windows11-21h2-x64
9lum_sdk32.dll
windows11-21h2-x64
8net_updater32.exe
windows11-21h2-x64
1uninstall.exe.nsis
windows11-21h2-x64
3Analysis
-
max time kernel
1465s -
max time network
1479s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
13/03/2024, 17:32
Static task
static1
Behavioral task
behavioral1
Sample
earnapp-plus-setup-1.437.973.exe
Resource
win11-20240214-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/System.dll
Resource
win11-20240221-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win11-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win11-20240221-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win11-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsExec.dll
Resource
win11-20240221-en
Behavioral task
behavioral7
Sample
brd_config.json
Resource
win11-20240221-en
Behavioral task
behavioral8
Sample
earnapp.exe
Resource
win11-20240214-en
Behavioral task
behavioral9
Sample
lum_sdk32.dll
Resource
win11-20240221-en
Behavioral task
behavioral10
Sample
net_updater32.exe
Resource
win11-20240221-en
Behavioral task
behavioral11
Sample
uninstall.exe.nsis
Resource
win11-20240221-en
General
-
Target
brd_config.json
-
Size
263B
-
MD5
43b667b782194f4adf763acece2369c2
-
SHA1
7d092c9ad330ceaa98cc7811c74db59c876b66f0
-
SHA256
7f7e6f7330bd46f4147e644bfecd2ea3bbf02d9d4774c42c55a89801ac645276
-
SHA512
18e6a9955c9d4cae91fd8dfb46e0c7342b228d980dabf1ba18cb757a81bcc1c85abb46aed6e05180485ba210309bd0463de7933ea006f2560156502458be89bb
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3852399462-405385529-394778097-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3852399462-405385529-394778097-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4740 OpenWith.exe