Overview
overview
10Static
static
10SuperMovea...ws.exe
windows7-x64
10SuperMovea...ws.exe
windows10-2004-x64
10$PLUGINSDI...er.dll
windows7-x64
1$PLUGINSDI...er.dll
windows10-2004-x64
1$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3LICENSES.c...m.html
windows7-x64
1LICENSES.c...m.html
windows10-2004-x64
1SuperMovea vOS.exe
windows7-x64
10SuperMovea vOS.exe
windows10-2004-x64
10api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1msvcp140.dll
windows7-x64
1msvcp140.dll
windows10-2004-x64
1natives_blob.js
windows7-x64
3Analysis
-
max time kernel
140s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
23-06-2024 10:16
Behavioral task
behavioral1
Sample
SuperMovea windows.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
SuperMovea windows.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20240611-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/WinShell.dll
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/WinShell.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
LICENSES.chromium.html
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
LICENSES.chromium.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
SuperMovea vOS.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
SuperMovea vOS.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
api-ms-win-core-console-l1-1-0.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
api-ms-win-core-datetime-l1-1-0.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
api-ms-win-core-debug-l1-1-0.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral18
Sample
api-ms-win-core-errorhandling-l1-1-0.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
api-ms-win-core-file-l1-1-0.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral20
Sample
api-ms-win-core-file-l1-2-0.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
api-ms-win-core-file-l2-1-0.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral22
Sample
api-ms-win-core-handle-l1-1-0.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral23
Sample
api-ms-win-core-heap-l1-1-0.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral24
Sample
api-ms-win-core-interlocked-l1-1-0.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
api-ms-win-core-libraryloader-l1-1-0.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral26
Sample
api-ms-win-core-localization-l1-2-0.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral27
Sample
api-ms-win-core-memory-l1-1-0.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral28
Sample
api-ms-win-core-namedpipe-l1-1-0.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
api-ms-win-core-processenvironment-l1-1-0.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral30
Sample
msvcp140.dll
Resource
win7-20240611-en
Behavioral task
behavioral31
Sample
msvcp140.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral32
Sample
natives_blob.js
Resource
win7-20240611-en
General
-
Target
SuperMovea windows.exe
-
Size
38.1MB
-
MD5
a39486f77a88f08c7b0d444b4839fbfd
-
SHA1
5208108f2f1bed2bff5af6dc7becb693828fd6b6
-
SHA256
e8a5046279f1900b43403e960ad119fe90b798bb64af439a8382a1721074b48d
-
SHA512
bb546ad098b5bd636c75c5a3b556c10f65ad5e524cd2a38cd6fafc3f6ec3d025ad2858c1d736ce37c58723e9df82ed7f9b98b634c53a14c8a212592cbf18232a
-
SSDEEP
786432:OuOdkxH0zNGpGkUfNHXaKeZ04haD/djMUdwIHgtl4Byme1:OuOdWUzNGwnhKKs040D/RQIXByme1
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 428 SuperMovea vOS.exe 4284 SuperMovea vOS.exe 3236 SuperMovea vOS.exe 3364 SuperMovea vOS.exe -
Loads dropped DLL 26 IoCs
pid Process 4608 SuperMovea windows.exe 4608 SuperMovea windows.exe 4608 SuperMovea windows.exe 4608 SuperMovea windows.exe 4608 SuperMovea windows.exe 4608 SuperMovea windows.exe 4608 SuperMovea windows.exe 428 SuperMovea vOS.exe 428 SuperMovea vOS.exe 428 SuperMovea vOS.exe 428 SuperMovea vOS.exe 428 SuperMovea vOS.exe 4284 SuperMovea vOS.exe 4284 SuperMovea vOS.exe 4284 SuperMovea vOS.exe 4284 SuperMovea vOS.exe 4284 SuperMovea vOS.exe 3236 SuperMovea vOS.exe 3236 SuperMovea vOS.exe 3236 SuperMovea vOS.exe 3236 SuperMovea vOS.exe 3364 SuperMovea vOS.exe 3364 SuperMovea vOS.exe 3364 SuperMovea vOS.exe 3364 SuperMovea vOS.exe 3364 SuperMovea vOS.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2080292272-204036150-2159171770-1000\{1FBF414B-AF92-4B33-8EE1-1D59637AE232} SuperMovea vOS.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2080292272-204036150-2159171770-1000\{0E847581-2A7A-4E9E-9B4E-D12B7ABD7993} SuperMovea vOS.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4608 SuperMovea windows.exe 4608 SuperMovea windows.exe 4608 SuperMovea windows.exe 4608 SuperMovea windows.exe 4608 SuperMovea windows.exe 4608 SuperMovea windows.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSecurityPrivilege 4608 SuperMovea windows.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 428 wrote to memory of 4284 428 SuperMovea vOS.exe 91 PID 428 wrote to memory of 4284 428 SuperMovea vOS.exe 91 PID 428 wrote to memory of 3236 428 SuperMovea vOS.exe 92 PID 428 wrote to memory of 3236 428 SuperMovea vOS.exe 92 PID 428 wrote to memory of 3364 428 SuperMovea vOS.exe 93 PID 428 wrote to memory of 3364 428 SuperMovea vOS.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\SuperMovea windows.exe"C:\Users\Admin\AppData\Local\Temp\SuperMovea windows.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4608
-
C:\Users\Admin\AppData\Local\Programs\supermovea_32vos\SuperMovea vOS.exe"C:\Users\Admin\AppData\Local\Programs\supermovea_32vos\SuperMovea vOS.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Users\Admin\AppData\Local\Programs\supermovea_32vos\SuperMovea vOS.exe"C:\Users\Admin\AppData\Local\Programs\supermovea_32vos\SuperMovea vOS.exe" --type=gpu-process --enable-features=FixAltGraph --no-sandbox --gpu-preferences=KAAAAAAAAACAAwCAAQAAAAAAAAAAAGAAEAAAAAAAAAAAAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAKAAAAEAAAAAAAAAAAAAAACwAAABAAAAAAAAAAAQAAAAoAAAAQAAAAAAAAAAEAAAALAAAA --service-request-channel-token=E83793958D9E175828CA60DD69643608 --mojo-platform-channel-handle=1336 /prefetch:22⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:4284
-
-
C:\Users\Admin\AppData\Local\Programs\supermovea_32vos\SuperMovea vOS.exe"C:\Users\Admin\AppData\Local\Programs\supermovea_32vos\SuperMovea vOS.exe" --type=renderer --no-sandbox --enable-features=FixAltGraph --service-pipe-token=C3EE22CD2DA57097AC218E6E4E38169C --lang=en-US --app-path="C:\Users\Admin\AppData\Local\Programs\supermovea_32vos\resources\app.asar" --node-integration=true --webview-tag=true --no-sandbox --background-color=#000000 --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-compositor-image-animations --service-request-channel-token=C3EE22CD2DA57097AC218E6E4E38169C --renderer-client-id=4 --mojo-platform-channel-handle=2016 /prefetch:12⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3236
-
-
C:\Users\Admin\AppData\Local\Programs\supermovea_32vos\SuperMovea vOS.exe"C:\Users\Admin\AppData\Local\Programs\supermovea_32vos\SuperMovea vOS.exe" --type=gpu-process --enable-features=FixAltGraph --no-sandbox --gpu-preferences=KAAAAAAAAACAAwCAAQAAAAAAAAAAAGAAEAAAAAAAAAAAAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAKAAAAEAAAAAAAAAAAAAAACwAAABAAAAAAAAAAAQAAAAoAAAAQAAAAAAAAAAEAAAALAAAA --use-gl=swiftshader-webgl --service-request-channel-token=8AB8C9181F7B58ECB3E2BFFEB61E67AE --mojo-platform-channel-handle=2152 /prefetch:22⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:3364
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.0MB
MD5b0ae3aa9dd1ebd60bdf51cb94834cd04
SHA1ee2f5726ac140fb42d17aba033d678afaf8c39c1
SHA256e994847e01a6f1e4cbdc5a864616ac262f67ee4f14db194984661a8d927ab7f4
SHA512756ebf4fa49029d4343d1bdb86ea71b2d49e20ada6370fd7582515455635c73d37ad0dbdeef456a10ab353a12412ba827ca4d70080743c86c3b42fa0a3152aa3
-
Filesize
626KB
MD5d396985225d85caa7d743d67c7da6316
SHA1915d5829ed02171684c2a9e8b3b57f7a35bc1e2c
SHA256be2ef4f6d540d0ac5fddd556dcb6bfaf6cb6288679e4d64882d625ff35f173aa
SHA512d7b0df2865bf491c9caf34cbabefb7b7f04b35b85276a59fef0499d02b09651d8f6d0db9e87df4a9a1417f07784a8e5625e9805bc434b87d64e442ab98e24075
-
Filesize
85KB
MD59a53905892d9c9f3bf9d295c8b32e446
SHA12c5c56ff86fb1e827b2e0d479c529baea13eb561
SHA256d58e3ff10fd96a22a8e6d2fd76146a282cc45ccfaf2301257e76e7c2771cbd41
SHA5122dde975e15f95aa9310820cae009f2b04e26b7bafebb42d5822e3917017e4a37e17b0a71825f8f79f075abc1507d7d4d9202550fdd7a53ab54ac0fde4349fe2f
-
Filesize
4KB
MD59224336777238d8e7280611d30996f10
SHA18abe74c0ded180a42144efa1d32e2686f133f47a
SHA2560ae299034fef86349a5b379d8c3c9db84bba725487e665102791701b24ba855d
SHA512266eb89253786678ca0f66cfd84b81d54b81847e5064313dacdde4b62d8deb6a2d56c391cfd776aaa21de81dbdd024b7bbbd86883ac17389fae3467e5558c139
-
Filesize
18B
MD565f69bd2d8b6458d3ecf77d84d70dc1c
SHA1679bdfb03cbaa594ace5af4340a061ddc514309d
SHA256ca73097bd968b363b7145e86b64f3c595e533808b0763dc8863a27fc363cfa51
SHA51239f2728a1898bc9406516fa737c58c349e3bd7f779276a2f6679b3e3f0db43f956e03ad25e5d9bf4b07b19909febcc6c0560f71ab4f4fa6b5dd1f021ef742c60
-
Filesize
7.1MB
MD5ab9992f3bef24d6ffd8e76ce56f96de5
SHA1531cc9767c3d3b4a342516e97326b859b3b3ea5a
SHA2568818e8af6a3475e6bb6ebbd9d69bbac67fc156eca73840125987c1e9f9f2c92a
SHA5123570882596b5ffef77da8758287a997504664a07926bd639cf01b2ad35e8fbd0ab00de669cf87269a241e073a2038f9f369e8f76d04282c7fe894956b57eb888
-
Filesize
1.7MB
MD5a3d256877901c315892685d06f9c9e75
SHA13d114fb5edb952986009d8f485f7a0725a4a0d2f
SHA2562b3d220bd1ec00f21c1ef67320458e1f0e40203d36b777ec14b773ab4647e7eb
SHA512c1e45d2f2c27e792786809d097a5678c8290cfed330b9c014a7bb7d6486cde01274e5e57f219e4a32a86722051cdd1c18cf7b460b21271a40689fd2a5b40bc96
-
Filesize
9.7MB
MD562ce282dfe0ab8f2a35a529faeb61ac2
SHA1c35d6e4db540518263214697f589c54faac87533
SHA256c3b6588446b4a48e36dc135f9920ad246f5c84fe59c634b4225b009dd1dace13
SHA512a773bf66fcb9a12c1d8f3a760724c8438c7f240617b8099e4e2af979b84676892dbcaa866ca2fad59d2e56493ec3f96f0874e4e6e7fe7ca25e22ea2606e9a853
-
Filesize
3KB
MD5538cc1045845fdbca65a588834b81429
SHA1fa00b84700d909cc60360fb4e86656b478de7285
SHA256a7a88ba80019f84745d9daab0d35b0c2a8d8c1c2d4b019393eb0c2fed25bb1e7
SHA512b06549b9b2f6fa7d00f0a367ff6929ba2f2e1e9cdee3f66fde64f38721433794ad638fb93520e9645d3675c5f9bb19c2f5fce91f6c26a1dce43a7517870f7379
-
Filesize
170KB
MD57f20917d39abdc8ccac48f8cce93bf09
SHA193c804ac74ce32c17538f04d175f775550946826
SHA256a23d9b8422322157c7900b2cc35bf9a8129c08e4b9807dae26f412981b9c1b78
SHA512183c4d606af1bc57a5d958d4ff34d9633a23493d18317544e8dd4b05dff010fce249d4ceee646b8f14c9367f509890292df1cd85957a0d2a0ea9f82045559f34
-
Filesize
17.7MB
MD518fc37c302204fec082b5e261b75d07e
SHA15703f1df048d94230540b7204aa88d6f7b6102cd
SHA256f3a6da8ffb2aba7028195fb2118d8e17c9890bbd29a3e36ea968f5c789633f9d
SHA5124ddc2ba0b1887db1c92db302d3551ab9d6cb043a1ebe14fb1461ff020dfe541ff2d6853653128c325b91358a5f51be2242a342479750037d53dd70181ff03299
-
Filesize
3.7MB
MD571ea75b8cf4b2c5c213dba55c5deba4d
SHA1c59bff181df2f9e047abcde8f3661231d995a8c8
SHA256797be9923ad2df3efc0a73c0d6b43cc3fe7717bc4b1ec7c80d28fe8c46fd786b
SHA5123900bfbfe5621a79fd0b440e8f0ab4a0eef9360796f59ee0cbf2c6e350d7ad04ed2ef5a1fa79eff9f20be7035901deadb70cc58f4ecf7a3e23f12662ebc419d2
-
Filesize
256KB
MD5b7bad86a92506aa7af9e66ca86ff2fab
SHA1c0fcd1b819295558f537bde162b5c3013141f8f4
SHA256e5a427c138a24f41ed422bd8c8ec2aa0cb84d7da25bfc745466efecb807b92e3
SHA512d8a63edc7c18d48662cda9549fe4888ccfe221a6d22096e0c30696a4c77f029a70d4bd88006cb3f01edc3b58d10d0730bb23ea3a6a4feb57f10ab8e7a113d556
-
Filesize
109KB
MD54ae9c0016707a23548f9b55cb770ddc9
SHA1323bbf97ba222d185eaa3a72c05d1b9b9c2da35d
SHA2567242e4d5b41d3811c8ed068eb186ddac85a725555f841fbef8a82c13bd8c451c
SHA512ae844b46150dec8a35fbc2e2463cc591f00c0e8ffba19efac0e89ab3693b430f9989ec62a19c70c1188657a58def4ea94b509451e79876c415dd1157b583e355
-
Filesize
1.7MB
MD52b107954dc54bb94c564a6b32193b19b
SHA17b9b46b773e63e33ee5c4cff1c45786367dde04e
SHA256b763f6eec75ef83c01274104f53d2d428effb84ae40fefca813323d44aa3d5da
SHA5127d3bcff7bdbf536737ae75b36c9ebe14917d26574874e64eb402246c51335677037cd0fb75e39822abb81d5b55fb6542f54f81ce706851ff4ae69019745b0dbb
-
Filesize
55KB
MD56246a3e0832895dde8ca8c3bfd798ca6
SHA114f48351d558d34c2a5f35617e34b772b95dd220
SHA256222d401933e86d30fd5f8bccacf527020b2c395addf9c38e63c0df6f3e1c9ed5
SHA51296627441e3907dda02d629101d327306ecb4ab9d87ad8e2aab6a8a6d5a5a6c5573774f6591c3d7f2a23a050e502b783654512bca764818af0121fe617d4b388e
-
Filesize
9KB
MD517309e33b596ba3a5693b4d3e85cf8d7
SHA17d361836cf53df42021c7f2b148aec9458818c01
SHA256996a259e53ca18b89ec36d038c40148957c978c0fd600a268497d4c92f882a93
SHA5121abac3ce4f2d5e4a635162e16cf9125e059ba1539f70086c2d71cd00d41a6e2a54d468e6f37792e55a822d7082fb388b8dfecc79b59226bbb047b7d28d44d298
-
Filesize
101KB
MD533b4e69e7835e18b9437623367dd1787
SHA153afa03edaf931abdc2d828e5a2c89ad573d926c
SHA25672d38ef115e71fc73dc5978987c583fc8c6b50ff12e4a5d30649a4d164a8b6ae
SHA512ca890e785d1a0a7e0b4a748416fba417826ae66b46e600f407d4e795b444612a8b830f579f2cf5b6e051bea800604f34f8801cc3daf05c8d29ad05bcda454a77
-
Filesize
11KB
MD575ed96254fbf894e42058062b4b4f0d1
SHA1996503f1383b49021eb3427bc28d13b5bbd11977
SHA256a632d74332b3f08f834c732a103dafeb09a540823a2217ca7f49159755e8f1d7
SHA51258174896db81d481947b8745dafe3a02c150f3938bb4543256e8cce1145154e016d481df9fe68dac6d48407c62cbe20753320ebd5fe5e84806d07ce78e0eb0c4
-
Filesize
3KB
MD51cc7c37b7e0c8cd8bf04b6cc283e1e56
SHA10b9519763be6625bd5abce175dcc59c96d100d4c
SHA2569be85b986ea66a6997dde658abe82b3147ed2a1a3dcb784bb5176f41d22815a6
SHA5127acf7f8e68aa6066b59ca9f2ae2e67997e6b347bc08eb788d2a119b3295c844b5b9606757168e8d2fbd61c2cda367bf80e9e48c9a52c28d5a7a00464bfd2048f
-
Filesize
4KB
MD5f0438a894f3a7e01a4aae8d1b5dd0289
SHA1b058e3fcfb7b550041da16bf10d8837024c38bf6
SHA25630c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11
SHA512f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7
-
Filesize
391KB
MD5c6a070b3e68b292bb0efc9b26e85e9cc
SHA15a922b96eda6595a68fd0a9051236162ff2e2ada
SHA25666ac8bd1f273a73e17a3f31d6add739d3cb0330a6417faeda11a9cae00b62d8b
SHA5128eff8fc16f5bb574bd9483e3b217b67a8986e31497368c06fdaa3a1e93a40aee94a5b31729d01905157b0ae1e556a402f43cd29a4d30a0587e1ec334458a44e8