Overview
overview
10Static
static
3Software_1.30.1.rar
windows7-x64
3Software_1.30.1.rar
windows10-2004-x64
7Debug/Addition.dll
windows7-x64
1Debug/Addition.dll
windows10-2004-x64
1Debug/Autoupdater.ini
windows7-x64
1Debug/Autoupdater.ini
windows10-2004-x64
1Debug/Cracker.dll
windows7-x64
1Debug/Cracker.dll
windows10-2004-x64
1Debug/DebugPPF.tmp
windows7-x64
3Debug/DebugPPF.tmp
windows10-2004-x64
3Debug/DebugPPT.tmp
windows7-x64
3Debug/DebugPPT.tmp
windows10-2004-x64
3Debug/Helper.dll
windows7-x64
1Debug/Helper.dll
windows10-2004-x64
1Debug/Management.log
windows7-x64
1Debug/Management.log
windows10-2004-x64
1Debug/Resource.dll
windows7-x64
1Debug/Resource.dll
windows10-2004-x64
1Debug/main.ini
windows7-x64
1Debug/main.ini
windows10-2004-x64
1Language.pimx
windows7-x64
3Language.pimx
windows10-2004-x64
3Main.ini
windows7-x64
1Main.ini
windows10-2004-x64
1Packaged/Main.xml
windows7-x64
1Packaged/Main.xml
windows10-2004-x64
1Packaged/Resource.dll
windows7-x64
1Packaged/Resource.dll
windows10-2004-x64
1Packaged/Utils.xml
windows7-x64
1Packaged/Utils.xml
windows10-2004-x64
1Software_1.30.1.exe
windows7-x64
10Software_1.30.1.exe
windows10-2004-x64
10Analysis
-
max time kernel
1559s -
max time network
1560s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-04-2024 10:10
Static task
static1
Behavioral task
behavioral1
Sample
Software_1.30.1.rar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Software_1.30.1.rar
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Debug/Addition.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Debug/Addition.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
Debug/Autoupdater.ini
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Debug/Autoupdater.ini
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
Debug/Cracker.dll
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
Debug/Cracker.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
Debug/DebugPPF.tmp
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Debug/DebugPPF.tmp
Resource
win10v2004-20240412-en
Behavioral task
behavioral11
Sample
Debug/DebugPPT.tmp
Resource
win7-20240220-en
Behavioral task
behavioral12
Sample
Debug/DebugPPT.tmp
Resource
win10v2004-20240412-en
Behavioral task
behavioral13
Sample
Debug/Helper.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
Debug/Helper.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral15
Sample
Debug/Management.log
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
Debug/Management.log
Resource
win10v2004-20240412-en
Behavioral task
behavioral17
Sample
Debug/Resource.dll
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
Debug/Resource.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
Debug/main.ini
Resource
win7-20240220-en
Behavioral task
behavioral20
Sample
Debug/main.ini
Resource
win10v2004-20240412-en
Behavioral task
behavioral21
Sample
Language.pimx
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
Language.pimx
Resource
win10v2004-20240412-en
Behavioral task
behavioral23
Sample
Main.ini
Resource
win7-20231129-en
Behavioral task
behavioral24
Sample
Main.ini
Resource
win10v2004-20240412-en
Behavioral task
behavioral25
Sample
Packaged/Main.xml
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
Packaged/Main.xml
Resource
win10v2004-20240412-en
Behavioral task
behavioral27
Sample
Packaged/Resource.dll
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
Packaged/Resource.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral29
Sample
Packaged/Utils.xml
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
Packaged/Utils.xml
Resource
win10v2004-20240412-en
Behavioral task
behavioral31
Sample
Software_1.30.1.exe
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
Software_1.30.1.exe
Resource
win10v2004-20240412-en
General
-
Target
Language.pimx
-
Size
22KB
-
MD5
01fbf905f95578b7c2eb370d5bd867b6
-
SHA1
6688f78f5afba9bbabca1a398371c063f67447c2
-
SHA256
a17506a018994501e0cf6847ceee97f7cd9ffcffc48b256d180175256ff5c0f7
-
SHA512
321c7c325dd886f7a154e7aed21b5e8789cd3ec28a0dd87ade8702524857fb2ff271fca16833f2d393ce9ca45cb6b0b87470357ace1bf49d65e7e0efdf423aa5
-
SSDEEP
384:ntMbm75pVUbnVhU9PFfRYzF66ZfxjUyy9FeQ3Np:ntMIInrU9PBRR6ZfxOX
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.pimx rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.pimx\ = "pimx_auto_file" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\pimx_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\pimx_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\pimx_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\pimx_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\pimx_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\pimx_auto_file\shell\Read rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2728 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2728 AcroRd32.exe 2728 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2700 2124 cmd.exe 29 PID 2124 wrote to memory of 2700 2124 cmd.exe 29 PID 2124 wrote to memory of 2700 2124 cmd.exe 29 PID 2700 wrote to memory of 2728 2700 rundll32.exe 30 PID 2700 wrote to memory of 2728 2700 rundll32.exe 30 PID 2700 wrote to memory of 2728 2700 rundll32.exe 30 PID 2700 wrote to memory of 2728 2700 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Language.pimx1⤵
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Language.pimx2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Language.pimx"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2728
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD57c2f9b64ad5d0a7bf1eb4076c53e0c72
SHA140a07b9146bb70802bf7f19aa2c599df88181e1f
SHA2569db36fa00535e7290924e13f54311d36989ce8b8a710ee56a5c8375868897650
SHA512743d656388dab5e18c0740b1d2e3ba53613d6c06f63d44e9fd661573eac2cff0b9b89140ac41705cafc2668c895e0662ba6d64d3bc64a9ccb912bfa19962b4ab