Overview
overview
7Static
static
7c7caf8e08a...eb.exe
windows7-x64
7c7caf8e08a...eb.exe
windows10-2004-x64
7$PLUGINSDI...ne.dll
windows7-x64
1$PLUGINSDI...ne.dll
windows10-2004-x64
1$PLUGINSDI...ip.dll
windows7-x64
1$PLUGINSDI...ip.dll
windows10-2004-x64
1$PLUGINSDIR/INetC.dll
windows7-x64
3$PLUGINSDIR/INetC.dll
windows10-2004-x64
3$PLUGINSDI...er.dll
windows7-x64
1$PLUGINSDI...er.dll
windows10-2004-x64
1$PLUGINSDI...on.dll
windows7-x64
1$PLUGINSDI...on.dll
windows10-2004-x64
1$PLUGINSDI...er.exe
windows7-x64
4$PLUGINSDI...er.exe
windows10-2004-x64
5$PLUGINSDI...ls.dll
windows7-x64
1$PLUGINSDI...ls.dll
windows10-2004-x64
1$PLUGINSDI...en.dll
windows7-x64
1$PLUGINSDI...en.dll
windows10-2004-x64
1$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...p.html
windows7-x64
3$PLUGINSDI...p.html
windows10-2004-x64
3$PLUGINSDI...x.html
windows7-x64
3$PLUGINSDI...x.html
windows10-2004-x64
3$PLUGINSDI...app.js
windows7-x64
3$PLUGINSDI...app.js
windows10-2004-x64
3$PLUGINSDI...uts.js
windows7-x64
3$PLUGINSDI...uts.js
windows10-2004-x64
3$PLUGINSDI...dle.js
windows7-x64
3$PLUGINSDI...dle.js
windows10-2004-x64
3General
-
Target
c7caf8e08ab4b82116b0c93f6e85c41b19d69bd5bfef8d6cd3c47c495bc1fbeb
-
Size
2.1MB
-
Sample
240725-1ycy7a1alf
-
MD5
167570acbfc79e2c21d35c7e5efbd39f
-
SHA1
e66473969b363611f454287a4f195a116e10acbb
-
SHA256
c7caf8e08ab4b82116b0c93f6e85c41b19d69bd5bfef8d6cd3c47c495bc1fbeb
-
SHA512
1ece3487e36707ae2bae02a61a3a05beb0e6a5407d8f3f525aecd4582af655b6b151abb7d652e647f023afeec068b9b4a7a22660548c823fe0d4b5462bc5680b
-
SSDEEP
49152:rnOxE87vxpsrFpIv1t1fCufN6s3hQVgsuDYfNSl3Q1caq:rngPN+TIvX1auV53hQVgZcA6c
Behavioral task
behavioral1
Sample
c7caf8e08ab4b82116b0c93f6e85c41b19d69bd5bfef8d6cd3c47c495bc1fbeb.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c7caf8e08ab4b82116b0c93f6e85c41b19d69bd5bfef8d6cd3c47c495bc1fbeb.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/CommandLine.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/CommandLine.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/DotNetZip.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/DotNetZip.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/INetC.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/INetC.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/Microsoft.Win32.TaskScheduler.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/Microsoft.Win32.TaskScheduler.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/Newtonsoft.Json.dll
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/Newtonsoft.Json.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/OWInstaller.exe
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/OWInstaller.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/OverWolf.Client.CommonUtils.dll
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/OverWolf.Client.CommonUtils.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/SharpRaven.dll
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/SharpRaven.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/app/cmp.html
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/app/cmp.html
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/app/index.html
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/app/index.html
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/app/js/app.js
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/app/js/app.js
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/app/js/block_inputs.js
Resource
win7-20240705-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/app/js/block_inputs.js
Resource
win10v2004-20240709-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/app/js/libs/cmp.bundle.js
Resource
win7-20240705-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/app/js/libs/cmp.bundle.js
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
c7caf8e08ab4b82116b0c93f6e85c41b19d69bd5bfef8d6cd3c47c495bc1fbeb
-
Size
2.1MB
-
MD5
167570acbfc79e2c21d35c7e5efbd39f
-
SHA1
e66473969b363611f454287a4f195a116e10acbb
-
SHA256
c7caf8e08ab4b82116b0c93f6e85c41b19d69bd5bfef8d6cd3c47c495bc1fbeb
-
SHA512
1ece3487e36707ae2bae02a61a3a05beb0e6a5407d8f3f525aecd4582af655b6b151abb7d652e647f023afeec068b9b4a7a22660548c823fe0d4b5462bc5680b
-
SSDEEP
49152:rnOxE87vxpsrFpIv1t1fCufN6s3hQVgsuDYfNSl3Q1caq:rngPN+TIvX1auV53hQVgZcA6c
Score7/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
-
-
Target
$PLUGINSDIR/CommandLine.dll
-
Size
68KB
-
MD5
7949107875d0a5332ff10d8e24db65e4
-
SHA1
8f6b5a291f21a55c4d40f788349334a8fc4a6be1
-
SHA256
b69f8e16a39271ae247897cbe816ee1950f9f460e2e2b70a3a7538a8c0f31196
-
SHA512
a965ed74014bcb1a9d2f2564e80b4ef708868ffc8bc45c7873b93a1e9c88e664d7640a2349c672b52e31677c4ff681e1bc50e749c29c3b3a8a40baa9f11d1cd0
-
SSDEEP
1536:MZj9JT17qpL/6ePMqBNzrstoJSkrjbgbwzis3hwb7P53h0q:Mx9JT17WPMqBNWAkbwzi7b4q
Score1/10 -
-
-
Target
$PLUGINSDIR/DotNetZip.dll
-
Size
467KB
-
MD5
190e712f2e3b065ba3d5f63cb9b7725e
-
SHA1
75c1c8dd93c7c8a4b3719bb77c6e1d1a1620ae12
-
SHA256
6c512d9943a225d686b26fc832589e4c8bef7c4dd0a8bdfd557d5d27fe5bba0f
-
SHA512
2b4898d2d6982917612d04442807bd58c37739b2e4b302c94f41e03e685e24b9183b12de2057b3b303483698ad95e3a37795e6eb6d2d3b71e332b59deeca7d02
-
SSDEEP
6144:GuCInHLhJI4FY/ixjci6ychf8xalGQGtSV41kJDsTDDpBnse6OVxLV/Wo0k:UQL32ikCaUS4csRBse6sfWNk
Score1/10 -
-
-
Target
$PLUGINSDIR/INetC.dll
-
Size
24KB
-
MD5
640bff73a5f8e37b202d911e4749b2e9
-
SHA1
9588dd7561ab7de3bca392b084bec91f3521c879
-
SHA256
c1e568e25ec111184deb1b87cfda4bfec529b1abeab39b66539d998012f33502
-
SHA512
39c6c358e2b480c8cbebcc1da683924c8092fb2947f2da4a8df1b0dc1fdda61003d91d12232a436ec88ff4e0995b7f6ee8c6efbdca935eaa984001f7a72fea0a
-
SSDEEP
384:wv1j9e9dEs+rN+qFLAjNXT37vYnOrvFhSL+ZwcSyekzANZBJ:w1AvEs3HBLzYn29vYh
Score3/10 -
-
-
Target
$PLUGINSDIR/Microsoft.Win32.TaskScheduler.dll
-
Size
124KB
-
MD5
126f0356e94a6dd29f509dc6e60416c3
-
SHA1
0d3357537b6a506669211439025ef63adb61d2d7
-
SHA256
55465f7d43cf61ef722377393755ebc9f85f1c2e8fa96899fbfefe1659d0065d
-
SHA512
4b649364861739c17e855ab28853f70a68d494c17efa873062ee8cbd4b91fe4dbf72c584c4561d76717f694a7e2d6ec94350ee6ca90b2d98cdbcb825cd7f6c11
-
SSDEEP
3072:DBCeNh/pcfnLq3wyXYsKRNRwxz+gT37teucRpH00n:DB/w4xQWO5
Score1/10 -
-
-
Target
$PLUGINSDIR/Newtonsoft.Json.dll
-
Size
692KB
-
MD5
98cbb64f074dc600b23a2ee1a0f46448
-
SHA1
c5e5ec666eeb51ec15d69d27685fe50148893e34
-
SHA256
7b44639cbfbc8ddac8c7a3de8ffa97a7460bebb0d54e9ff2e1ccdc3a742c2b13
-
SHA512
eb9eabee5494f5eb1062a33cc605b66d051da6c6990860fe4fd20e5b137458277a636cf27c4f133012d7e0efaa5feb6f48f1e2f342008482c951a6d61feec147
-
SSDEEP
12288:p9BzaPm657wqehcZBLX+HK+kPJUQEKx07N0TCBGiBCjC0PDgM5j9FKjc3SH:p8m657w6ZBLmkitKqBCjC0PDgM5CH
Score1/10 -
-
-
Target
$PLUGINSDIR/OWInstaller.exe
-
Size
298KB
-
MD5
eb1087c6428652fdcad37c28af2616c6
-
SHA1
85c7324ffafaf944c82d976eeb256987be2c64ed
-
SHA256
a96ccdee5c51cbfb93514ab47ca4616751c49666aae3fa2363799f395f1c699f
-
SHA512
4b989752f95aee716c2d9001fb0463900f700112319054b35815e89dc99872ec776eaeb3c6e19d3e2ca519a18f6a4d38c99ea7e6ed36a42c890d18a80b098488
-
SSDEEP
6144:tpntLzy7dLKc/6XFGau09bFyoSIm900Tkq2dSxpl2xcxJ:tpntyL6X81FoSU0+S17
Score5/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops file in System32 directory
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
-
-
Target
$PLUGINSDIR/OverWolf.Client.CommonUtils.dll
-
Size
646KB
-
MD5
c0da114ea41689686ed47d9aa14966ba
-
SHA1
8d24eedb617c09648c1d54bbd7968df5d1709964
-
SHA256
27859b8295c6bad6603457188b4a52a48d538bac0fc737971eb8a79ff92b06dd
-
SHA512
25aadb491c66281109ca28a392b54ae5384dff55fc38c9cc879c3157e363f8cc6a3503c77f2c46e16aaa42d58f5ac2414d2881717404118cdac68333bc3ad9a0
-
SSDEEP
12288:JIYt/qyA5cbXNSDAoIL5QFm6eLa/TFE5NI4:nCcDTtQFm63FYI4
Score1/10 -
-
-
Target
$PLUGINSDIR/SharpRaven.dll
-
Size
80KB
-
MD5
c05cb33fbeea0399c1cf3202f7bd8249
-
SHA1
74bf0d88450e25173ed8d792b5a0e020e5eeb3f0
-
SHA256
6f95c71497dfc3d9b3bf22fa68917fe645b22bed8f0d3e1d55c969b538cc9208
-
SHA512
0e336a718f8a57f91b6f2fcc86b38fcc809917f690753eafa6ca6f0a95d05b0e1319555245e8d8459dfbdff1e7a34c9f335e0473f623ad5ad955421cf65062e8
-
SSDEEP
1536:oa9qjviI1YjOrfRK9bvyyfpHbnzDwkN7Pv3hIC:oEuqI1lRKbvyyB7nlNSC
Score1/10 -
-
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
7399323923e3946fe9140132ac388132
-
SHA1
728257d06c452449b1241769b459f091aabcffc5
-
SHA256
5a1c20a3e2e2eb182976977669f2c5d9f3104477e98f74d69d2434e79b92fdc3
-
SHA512
d6f28ba761351f374ae007c780be27758aea7b9f998e2a88a542eede459d18700adffe71abcb52b8a8c00695efb7ccc280175b5eeb57ca9a645542edfabb64f1
-
SSDEEP
192:eF2HS5ih/7i00dWz9T7PH6lOFcQMI5+Vw+bPFomi7dJWsP:rSUmlw9T7DmnI5+N273FP
Score3/10 -
-
-
Target
$PLUGINSDIR/UserInfo.dll
-
Size
4KB
-
MD5
9301577ff4d229347fe33259b43ef3b2
-
SHA1
5e39eb4f99920005a4b2303c8089d77f589c133d
-
SHA256
090c4bc8dc534e97b3877bd5115eb58b3e181495f29f231479f540bab5c01edc
-
SHA512
77dc7a1dedaeb1fb2ccefaba0a526b8d40ea64b9b37af53c056b9428159b67d552e5e3861cbffc2149ec646fdfe9ce94f4fdca51703f79c93e5f45c085e52c79
Score3/10 -
-
-
Target
$PLUGINSDIR/app/cmp.html
-
Size
5KB
-
MD5
d7b8b31b190e552677589cfd4cbb5d8e
-
SHA1
09ffb3c63991d5c932c819393de489268bd3ab88
-
SHA256
6c21e8c07ce28327dca05f873d73fe85d5473f9b22a751a4d3d28931f5d0c74f
-
SHA512
32794507a4b9a12e52ceb583222cb93300e38c634a72ea3f51a0189127aba60cf476fb7918942355a4f826185d7071e876cb40348ba34cf5d1ca7e9546ccb310
-
SSDEEP
48:t9rc0/GLAoShbEHaLKNGiNQtvmolOGR36tgtr/GTvJP8AscaV4LiMt7ByBZXGz+p:4VLjHa2NGiivmmpWsBVutFwAk5vSG
Score3/10 -
-
-
Target
$PLUGINSDIR/app/index.html
-
Size
20KB
-
MD5
c7b752acf6d1e10f3aca2c67b1ccf4d3
-
SHA1
ab793cb43e0c2b5af0fdcbf90d0d29d5d3e164f7
-
SHA256
69b9f99f6611f953d94984ac35bdaf9e9817f689e1e3614976bebe3465c613fc
-
SHA512
120addd79b7ade4f35b426c02631c8167d81080fde30a01b989453113f7547784e525d53bede41ede0c9b3caca8513060753ba51f75bf6936d32ee597d642576
-
SSDEEP
192:8sdqpDNDPkFHmY74+/qmtRCtmK8W9I2gHHMlxh8B39LJ/Hab48JgJnc5w/93mJ8D:+WNaM8UnbjPk89+mppHL
Score3/10 -
-
-
Target
$PLUGINSDIR/app/js/app.js
-
Size
21KB
-
MD5
f718bd3f18dd499612623852cd2a2135
-
SHA1
9432b7898f655fbbd8132f4b3f8822959ae3ff97
-
SHA256
a14fcaf11a16ad7d904960538ca35d5b05e1c1b6a916f228db6b319c6195acbb
-
SHA512
90a697f93f239e8210ad47b6f012d3b40ea9c23a92ab909434d0e2d71bc3d9663d1aa73c64646e3dbf417f9636d1190b3d0cf20d349456dee6b6b8d5536d0338
-
SSDEEP
384:4X+acDQrcljKdZGb9plmt902wjI3A4nzwF52xxYRifG6wBEoR3FGHWdeLj8T:0+acDQYlOdEbdmXH3A4nzIAnGifG11RL
Score3/10 -
-
-
Target
$PLUGINSDIR/app/js/block_inputs.js
-
Size
789B
-
MD5
b5b52c92b90f4283a761cb8a40860c75
-
SHA1
7212e7e566795017e179e7b9c9bf223b0cdb9ec2
-
SHA256
f8dbd6793b35f7a26806f4dabad157aaafdf6d66fad094b50c77d60f223fd544
-
SHA512
16ad53ede5424ca1384e3caea25225589e9eec9e80e2d845948802db90fad222f709a7b651cd7601a34ba67a0627433f25764638fd542cbd4612871308e7b353
Score3/10 -
-
-
Target
$PLUGINSDIR/app/js/libs/cmp.bundle.js
-
Size
345KB
-
MD5
0ebda2a1fd9d91e0aea085bbed473b98
-
SHA1
eb496b3e8d8c8c872b07a71649045a2c46065031
-
SHA256
72c175869741f5c0a8efab49cb07690188934c7399bd1495e5b7a6f2555ca7f5
-
SHA512
444a2f0d331e576b907a3e59d918357468b6adcfad110b756a471e68911f4a5a392e12ce20d1eef13bcbbbca5776ce461b845679135ac1cf5f510cfe62fb3459
-
SSDEEP
3072:vSDSLzJgAxPFNRfMHT2kDkNAJOQSPXwGtkLxrtQ8OaxPyf:bxgAxPG28kNvwGtspi
Score3/10 -
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1