Analysis

  • max time kernel
    140s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-06-2024 10:16

General

  • Target

    SuperMovea windows.exe

  • Size

    38.1MB

  • MD5

    a39486f77a88f08c7b0d444b4839fbfd

  • SHA1

    5208108f2f1bed2bff5af6dc7becb693828fd6b6

  • SHA256

    e8a5046279f1900b43403e960ad119fe90b798bb64af439a8382a1721074b48d

  • SHA512

    bb546ad098b5bd636c75c5a3b556c10f65ad5e524cd2a38cd6fafc3f6ec3d025ad2858c1d736ce37c58723e9df82ed7f9b98b634c53a14c8a212592cbf18232a

  • SSDEEP

    786432:OuOdkxH0zNGpGkUfNHXaKeZ04haD/djMUdwIHgtl4Byme1:OuOdWUzNGwnhKKs040D/RQIXByme1

Malware Config

Signatures

  • Zloader, Terdot, DELoader, ZeusSphinx

    Zloader is a malware strain that was initially discovered back in August 2015.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 26 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SuperMovea windows.exe
    "C:\Users\Admin\AppData\Local\Temp\SuperMovea windows.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4608
  • C:\Users\Admin\AppData\Local\Programs\supermovea_32vos\SuperMovea vOS.exe
    "C:\Users\Admin\AppData\Local\Programs\supermovea_32vos\SuperMovea vOS.exe"
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:428
    • C:\Users\Admin\AppData\Local\Programs\supermovea_32vos\SuperMovea vOS.exe
      "C:\Users\Admin\AppData\Local\Programs\supermovea_32vos\SuperMovea vOS.exe" --type=gpu-process --enable-features=FixAltGraph --no-sandbox --gpu-preferences=KAAAAAAAAACAAwCAAQAAAAAAAAAAAGAAEAAAAAAAAAAAAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAKAAAAEAAAAAAAAAAAAAAACwAAABAAAAAAAAAAAQAAAAoAAAAQAAAAAAAAAAEAAAALAAAA --service-request-channel-token=E83793958D9E175828CA60DD69643608 --mojo-platform-channel-handle=1336 /prefetch:2
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies registry class
      PID:4284
    • C:\Users\Admin\AppData\Local\Programs\supermovea_32vos\SuperMovea vOS.exe
      "C:\Users\Admin\AppData\Local\Programs\supermovea_32vos\SuperMovea vOS.exe" --type=renderer --no-sandbox --enable-features=FixAltGraph --service-pipe-token=C3EE22CD2DA57097AC218E6E4E38169C --lang=en-US --app-path="C:\Users\Admin\AppData\Local\Programs\supermovea_32vos\resources\app.asar" --node-integration=true --webview-tag=true --no-sandbox --background-color=#000000 --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-compositor-image-animations --service-request-channel-token=C3EE22CD2DA57097AC218E6E4E38169C --renderer-client-id=4 --mojo-platform-channel-handle=2016 /prefetch:1
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:3236
    • C:\Users\Admin\AppData\Local\Programs\supermovea_32vos\SuperMovea vOS.exe
      "C:\Users\Admin\AppData\Local\Programs\supermovea_32vos\SuperMovea vOS.exe" --type=gpu-process --enable-features=FixAltGraph --no-sandbox --gpu-preferences=KAAAAAAAAACAAwCAAQAAAAAAAAAAAGAAEAAAAAAAAAAAAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAKAAAAEAAAAAAAAAAAAAAACwAAABAAAAAAAAAAAQAAAAoAAAAQAAAAAAAAAAEAAAALAAAA --use-gl=swiftshader-webgl --service-request-channel-token=8AB8C9181F7B58ECB3E2BFFEB61E67AE --mojo-platform-channel-handle=2152 /prefetch:2
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies registry class
      PID:3364

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Programs\supermovea_32vos\D3DCompiler_47.dll

    Filesize

    4.0MB

    MD5

    b0ae3aa9dd1ebd60bdf51cb94834cd04

    SHA1

    ee2f5726ac140fb42d17aba033d678afaf8c39c1

    SHA256

    e994847e01a6f1e4cbdc5a864616ac262f67ee4f14db194984661a8d927ab7f4

    SHA512

    756ebf4fa49029d4343d1bdb86ea71b2d49e20ada6370fd7582515455635c73d37ad0dbdeef456a10ab353a12412ba827ca4d70080743c86c3b42fa0a3152aa3

  • C:\Users\Admin\AppData\Local\Programs\supermovea_32vos\MSVCP140.dll

    Filesize

    626KB

    MD5

    d396985225d85caa7d743d67c7da6316

    SHA1

    915d5829ed02171684c2a9e8b3b57f7a35bc1e2c

    SHA256

    be2ef4f6d540d0ac5fddd556dcb6bfaf6cb6288679e4d64882d625ff35f173aa

    SHA512

    d7b0df2865bf491c9caf34cbabefb7b7f04b35b85276a59fef0499d02b09651d8f6d0db9e87df4a9a1417f07784a8e5625e9805bc434b87d64e442ab98e24075

  • C:\Users\Admin\AppData\Local\Programs\supermovea_32vos\VCRUNTIME140.dll

    Filesize

    85KB

    MD5

    9a53905892d9c9f3bf9d295c8b32e446

    SHA1

    2c5c56ff86fb1e827b2e0d479c529baea13eb561

    SHA256

    d58e3ff10fd96a22a8e6d2fd76146a282cc45ccfaf2301257e76e7c2771cbd41

    SHA512

    2dde975e15f95aa9310820cae009f2b04e26b7bafebb42d5822e3917017e4a37e17b0a71825f8f79f075abc1507d7d4d9202550fdd7a53ab54ac0fde4349fe2f

  • C:\Users\Admin\AppData\Local\Programs\supermovea_32vos\blink_image_resources_200_percent.pak

    Filesize

    4KB

    MD5

    9224336777238d8e7280611d30996f10

    SHA1

    8abe74c0ded180a42144efa1d32e2686f133f47a

    SHA256

    0ae299034fef86349a5b379d8c3c9db84bba725487e665102791701b24ba855d

    SHA512

    266eb89253786678ca0f66cfd84b81d54b81847e5064313dacdde4b62d8deb6a2d56c391cfd776aaa21de81dbdd024b7bbbd86883ac17389fae3467e5558c139

  • C:\Users\Admin\AppData\Local\Programs\supermovea_32vos\content_resources_200_percent.pak

    Filesize

    18B

    MD5

    65f69bd2d8b6458d3ecf77d84d70dc1c

    SHA1

    679bdfb03cbaa594ace5af4340a061ddc514309d

    SHA256

    ca73097bd968b363b7145e86b64f3c595e533808b0763dc8863a27fc363cfa51

    SHA512

    39f2728a1898bc9406516fa737c58c349e3bd7f779276a2f6679b3e3f0db43f956e03ad25e5d9bf4b07b19909febcc6c0560f71ab4f4fa6b5dd1f021ef742c60

  • C:\Users\Admin\AppData\Local\Programs\supermovea_32vos\content_shell.pak

    Filesize

    7.1MB

    MD5

    ab9992f3bef24d6ffd8e76ce56f96de5

    SHA1

    531cc9767c3d3b4a342516e97326b859b3b3ea5a

    SHA256

    8818e8af6a3475e6bb6ebbd9d69bbac67fc156eca73840125987c1e9f9f2c92a

    SHA512

    3570882596b5ffef77da8758287a997504664a07926bd639cf01b2ad35e8fbd0ab00de669cf87269a241e073a2038f9f369e8f76d04282c7fe894956b57eb888

  • C:\Users\Admin\AppData\Local\Programs\supermovea_32vos\ffmpeg.dll

    Filesize

    1.7MB

    MD5

    a3d256877901c315892685d06f9c9e75

    SHA1

    3d114fb5edb952986009d8f485f7a0725a4a0d2f

    SHA256

    2b3d220bd1ec00f21c1ef67320458e1f0e40203d36b777ec14b773ab4647e7eb

    SHA512

    c1e45d2f2c27e792786809d097a5678c8290cfed330b9c014a7bb7d6486cde01274e5e57f219e4a32a86722051cdd1c18cf7b460b21271a40689fd2a5b40bc96

  • C:\Users\Admin\AppData\Local\Programs\supermovea_32vos\icudtl.dat

    Filesize

    9.7MB

    MD5

    62ce282dfe0ab8f2a35a529faeb61ac2

    SHA1

    c35d6e4db540518263214697f589c54faac87533

    SHA256

    c3b6588446b4a48e36dc135f9920ad246f5c84fe59c634b4225b009dd1dace13

    SHA512

    a773bf66fcb9a12c1d8f3a760724c8438c7f240617b8099e4e2af979b84676892dbcaa866ca2fad59d2e56493ec3f96f0874e4e6e7fe7ca25e22ea2606e9a853

  • C:\Users\Admin\AppData\Local\Programs\supermovea_32vos\locales\en-US.pak

    Filesize

    3KB

    MD5

    538cc1045845fdbca65a588834b81429

    SHA1

    fa00b84700d909cc60360fb4e86656b478de7285

    SHA256

    a7a88ba80019f84745d9daab0d35b0c2a8d8c1c2d4b019393eb0c2fed25bb1e7

    SHA512

    b06549b9b2f6fa7d00f0a367ff6929ba2f2e1e9cdee3f66fde64f38721433794ad638fb93520e9645d3675c5f9bb19c2f5fce91f6c26a1dce43a7517870f7379

  • C:\Users\Admin\AppData\Local\Programs\supermovea_32vos\natives_blob.bin

    Filesize

    170KB

    MD5

    7f20917d39abdc8ccac48f8cce93bf09

    SHA1

    93c804ac74ce32c17538f04d175f775550946826

    SHA256

    a23d9b8422322157c7900b2cc35bf9a8129c08e4b9807dae26f412981b9c1b78

    SHA512

    183c4d606af1bc57a5d958d4ff34d9633a23493d18317544e8dd4b05dff010fce249d4ceee646b8f14c9367f509890292df1cd85957a0d2a0ea9f82045559f34

  • C:\Users\Admin\AppData\Local\Programs\supermovea_32vos\node.dll

    Filesize

    17.7MB

    MD5

    18fc37c302204fec082b5e261b75d07e

    SHA1

    5703f1df048d94230540b7204aa88d6f7b6102cd

    SHA256

    f3a6da8ffb2aba7028195fb2118d8e17c9890bbd29a3e36ea968f5c789633f9d

    SHA512

    4ddc2ba0b1887db1c92db302d3551ab9d6cb043a1ebe14fb1461ff020dfe541ff2d6853653128c325b91358a5f51be2242a342479750037d53dd70181ff03299

  • C:\Users\Admin\AppData\Local\Programs\supermovea_32vos\resources\app.asar

    Filesize

    3.7MB

    MD5

    71ea75b8cf4b2c5c213dba55c5deba4d

    SHA1

    c59bff181df2f9e047abcde8f3661231d995a8c8

    SHA256

    797be9923ad2df3efc0a73c0d6b43cc3fe7717bc4b1ec7c80d28fe8c46fd786b

    SHA512

    3900bfbfe5621a79fd0b440e8f0ab4a0eef9360796f59ee0cbf2c6e350d7ad04ed2ef5a1fa79eff9f20be7035901deadb70cc58f4ecf7a3e23f12662ebc419d2

  • C:\Users\Admin\AppData\Local\Programs\supermovea_32vos\resources\electron.asar

    Filesize

    256KB

    MD5

    b7bad86a92506aa7af9e66ca86ff2fab

    SHA1

    c0fcd1b819295558f537bde162b5c3013141f8f4

    SHA256

    e5a427c138a24f41ed422bd8c8ec2aa0cb84d7da25bfc745466efecb807b92e3

    SHA512

    d8a63edc7c18d48662cda9549fe4888ccfe221a6d22096e0c30696a4c77f029a70d4bd88006cb3f01edc3b58d10d0730bb23ea3a6a4feb57f10ab8e7a113d556

  • C:\Users\Admin\AppData\Local\Programs\supermovea_32vos\ui_resources_200_percent.pak

    Filesize

    109KB

    MD5

    4ae9c0016707a23548f9b55cb770ddc9

    SHA1

    323bbf97ba222d185eaa3a72c05d1b9b9c2da35d

    SHA256

    7242e4d5b41d3811c8ed068eb186ddac85a725555f841fbef8a82c13bd8c451c

    SHA512

    ae844b46150dec8a35fbc2e2463cc591f00c0e8ffba19efac0e89ab3693b430f9989ec62a19c70c1188657a58def4ea94b509451e79876c415dd1157b583e355

  • C:\Users\Admin\AppData\Local\Programs\supermovea_32vos\v8_context_snapshot.bin

    Filesize

    1.7MB

    MD5

    2b107954dc54bb94c564a6b32193b19b

    SHA1

    7b9b46b773e63e33ee5c4cff1c45786367dde04e

    SHA256

    b763f6eec75ef83c01274104f53d2d428effb84ae40fefca813323d44aa3d5da

    SHA512

    7d3bcff7bdbf536737ae75b36c9ebe14917d26574874e64eb402246c51335677037cd0fb75e39822abb81d5b55fb6542f54f81ce706851ff4ae69019745b0dbb

  • C:\Users\Admin\AppData\Local\Programs\supermovea_32vos\views_resources_200_percent.pak

    Filesize

    55KB

    MD5

    6246a3e0832895dde8ca8c3bfd798ca6

    SHA1

    14f48351d558d34c2a5f35617e34b772b95dd220

    SHA256

    222d401933e86d30fd5f8bccacf527020b2c395addf9c38e63c0df6f3e1c9ed5

    SHA512

    96627441e3907dda02d629101d327306ecb4ab9d87ad8e2aab6a8a6d5a5a6c5573774f6591c3d7f2a23a050e502b783654512bca764818af0121fe617d4b388e

  • C:\Users\Admin\AppData\Local\Temp\nsn33F2.tmp\SpiderBanner.dll

    Filesize

    9KB

    MD5

    17309e33b596ba3a5693b4d3e85cf8d7

    SHA1

    7d361836cf53df42021c7f2b148aec9458818c01

    SHA256

    996a259e53ca18b89ec36d038c40148957c978c0fd600a268497d4c92f882a93

    SHA512

    1abac3ce4f2d5e4a635162e16cf9125e059ba1539f70086c2d71cd00d41a6e2a54d468e6f37792e55a822d7082fb388b8dfecc79b59226bbb047b7d28d44d298

  • C:\Users\Admin\AppData\Local\Temp\nsn33F2.tmp\StdUtils.dll

    Filesize

    101KB

    MD5

    33b4e69e7835e18b9437623367dd1787

    SHA1

    53afa03edaf931abdc2d828e5a2c89ad573d926c

    SHA256

    72d38ef115e71fc73dc5978987c583fc8c6b50ff12e4a5d30649a4d164a8b6ae

    SHA512

    ca890e785d1a0a7e0b4a748416fba417826ae66b46e600f407d4e795b444612a8b830f579f2cf5b6e051bea800604f34f8801cc3daf05c8d29ad05bcda454a77

  • C:\Users\Admin\AppData\Local\Temp\nsn33F2.tmp\System.dll

    Filesize

    11KB

    MD5

    75ed96254fbf894e42058062b4b4f0d1

    SHA1

    996503f1383b49021eb3427bc28d13b5bbd11977

    SHA256

    a632d74332b3f08f834c732a103dafeb09a540823a2217ca7f49159755e8f1d7

    SHA512

    58174896db81d481947b8745dafe3a02c150f3938bb4543256e8cce1145154e016d481df9fe68dac6d48407c62cbe20753320ebd5fe5e84806d07ce78e0eb0c4

  • C:\Users\Admin\AppData\Local\Temp\nsn33F2.tmp\WinShell.dll

    Filesize

    3KB

    MD5

    1cc7c37b7e0c8cd8bf04b6cc283e1e56

    SHA1

    0b9519763be6625bd5abce175dcc59c96d100d4c

    SHA256

    9be85b986ea66a6997dde658abe82b3147ed2a1a3dcb784bb5176f41d22815a6

    SHA512

    7acf7f8e68aa6066b59ca9f2ae2e67997e6b347bc08eb788d2a119b3295c844b5b9606757168e8d2fbd61c2cda367bf80e9e48c9a52c28d5a7a00464bfd2048f

  • C:\Users\Admin\AppData\Local\Temp\nsn33F2.tmp\nsProcess.dll

    Filesize

    4KB

    MD5

    f0438a894f3a7e01a4aae8d1b5dd0289

    SHA1

    b058e3fcfb7b550041da16bf10d8837024c38bf6

    SHA256

    30c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11

    SHA512

    f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7

  • C:\Users\Admin\AppData\Local\Temp\nsn33F2.tmp\nsis7z.dll

    Filesize

    391KB

    MD5

    c6a070b3e68b292bb0efc9b26e85e9cc

    SHA1

    5a922b96eda6595a68fd0a9051236162ff2e2ada

    SHA256

    66ac8bd1f273a73e17a3f31d6add739d3cb0330a6417faeda11a9cae00b62d8b

    SHA512

    8eff8fc16f5bb574bd9483e3b217b67a8986e31497368c06fdaa3a1e93a40aee94a5b31729d01905157b0ae1e556a402f43cd29a4d30a0587e1ec334458a44e8

  • memory/428-404-0x00007FF7AE1F0000-0x00007FF7B2638000-memory.dmp

    Filesize

    68.3MB

  • memory/3236-439-0x00007FF7AE1F0000-0x00007FF7B2638000-memory.dmp

    Filesize

    68.3MB

  • memory/3364-445-0x00007FF7AE1F0000-0x00007FF7B2638000-memory.dmp

    Filesize

    68.3MB

  • memory/4284-422-0x00007FF7AE1F0000-0x00007FF7B2638000-memory.dmp

    Filesize

    68.3MB