Overview
overview
7Static
static
799602cdffa...f7.exe
windows7-x64
799602cdffa...f7.exe
windows10-2004-x64
7$PLUGINSDI...ne.dll
windows7-x64
1$PLUGINSDI...ne.dll
windows10-2004-x64
1$PLUGINSDI...ip.dll
windows7-x64
1$PLUGINSDI...ip.dll
windows10-2004-x64
1$PLUGINSDIR/INetC.dll
windows7-x64
3$PLUGINSDIR/INetC.dll
windows10-2004-x64
3$PLUGINSDI...er.dll
windows7-x64
1$PLUGINSDI...er.dll
windows10-2004-x64
1$PLUGINSDI...on.dll
windows7-x64
1$PLUGINSDI...on.dll
windows10-2004-x64
1$PLUGINSDI...er.exe
windows7-x64
4$PLUGINSDI...er.exe
windows10-2004-x64
5$PLUGINSDI...ls.dll
windows7-x64
1$PLUGINSDI...ls.dll
windows10-2004-x64
1$PLUGINSDI...en.dll
windows7-x64
1$PLUGINSDI...en.dll
windows10-2004-x64
1$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...p.html
windows7-x64
3$PLUGINSDI...p.html
windows10-2004-x64
3$PLUGINSDI...x.html
windows7-x64
3$PLUGINSDI...x.html
windows10-2004-x64
3$PLUGINSDI...app.js
windows7-x64
3$PLUGINSDI...app.js
windows10-2004-x64
3$PLUGINSDI...uts.js
windows7-x64
3$PLUGINSDI...uts.js
windows10-2004-x64
3$PLUGINSDI...dle.js
windows7-x64
3$PLUGINSDI...dle.js
windows10-2004-x64
3General
-
Target
99602cdffa15eb7d36e3b8d89cb1332fa4d68df8aa11c3c98da9e9a987bcf1f7
-
Size
2.0MB
-
Sample
240805-znkqlsxhpr
-
MD5
f24d21868ea3998a5b198850863448e9
-
SHA1
ed571d34c0ee2e5b8d0ae17bfb6b93b75230292d
-
SHA256
99602cdffa15eb7d36e3b8d89cb1332fa4d68df8aa11c3c98da9e9a987bcf1f7
-
SHA512
91b52f63713a4ca9dfe3f488361c6bad0c5033e16226d0bee9c4635cc6b28fdde4e61b42671048183ffb9a802c68bd0adaf83d444e5fe03f9e9b7299c7c16422
-
SSDEEP
49152:wr1WHhxE87vxpsrFpIv0fPHOMCBgs34Wnsu2Y3Nwxr1cUF:w5WjPN+TIv0fvFUv3pn/6H
Behavioral task
behavioral1
Sample
99602cdffa15eb7d36e3b8d89cb1332fa4d68df8aa11c3c98da9e9a987bcf1f7.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
99602cdffa15eb7d36e3b8d89cb1332fa4d68df8aa11c3c98da9e9a987bcf1f7.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/CommandLine.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/CommandLine.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/DotNetZip.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/DotNetZip.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/INetC.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/INetC.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/Microsoft.Win32.TaskScheduler.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/Microsoft.Win32.TaskScheduler.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/Newtonsoft.Json.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/Newtonsoft.Json.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/OWInstaller.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/OWInstaller.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/OverWolf.Client.CommonUtils.dll
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/OverWolf.Client.CommonUtils.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/SharpRaven.dll
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/SharpRaven.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/app/cmp.html
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/app/cmp.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/app/index.html
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/app/index.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/app/js/app.js
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/app/js/app.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/app/js/block_inputs.js
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/app/js/block_inputs.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/app/js/libs/cmp.bundle.js
Resource
win7-20240729-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/app/js/libs/cmp.bundle.js
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
99602cdffa15eb7d36e3b8d89cb1332fa4d68df8aa11c3c98da9e9a987bcf1f7
-
Size
2.0MB
-
MD5
f24d21868ea3998a5b198850863448e9
-
SHA1
ed571d34c0ee2e5b8d0ae17bfb6b93b75230292d
-
SHA256
99602cdffa15eb7d36e3b8d89cb1332fa4d68df8aa11c3c98da9e9a987bcf1f7
-
SHA512
91b52f63713a4ca9dfe3f488361c6bad0c5033e16226d0bee9c4635cc6b28fdde4e61b42671048183ffb9a802c68bd0adaf83d444e5fe03f9e9b7299c7c16422
-
SSDEEP
49152:wr1WHhxE87vxpsrFpIv0fPHOMCBgs34Wnsu2Y3Nwxr1cUF:w5WjPN+TIv0fvFUv3pn/6H
Score7/10-
Executes dropped EXE
-
Loads dropped DLL
-
-
-
Target
$PLUGINSDIR/CommandLine.dll
-
Size
68KB
-
MD5
ccd5f62a1d87970d9fea6d26fd45983a
-
SHA1
867942b2a6929ccaae481c02649386a5008db997
-
SHA256
b6ab16dd1656c7a90c0b24bde5453d761d9eb557b128c73f6ee9345ae6822b2e
-
SHA512
5d4653e438d004090ec8871702ea46d743c79b61abd7864b447bf16f60482e2fc991b9b2b1bb071a0501d4dd4ae4fdb033075ec18c5a1b50b0df6fa0092c4f2d
-
SSDEEP
1536:nZj9JT17qpL/6ePMqBNzrstoJSkrjbgbwziQ3hwa7PK3h82:nx9JT17WPMqBNWAkbwzifaF2
Score1/10 -
-
-
Target
$PLUGINSDIR/DotNetZip.dll
-
Size
467KB
-
MD5
190e712f2e3b065ba3d5f63cb9b7725e
-
SHA1
75c1c8dd93c7c8a4b3719bb77c6e1d1a1620ae12
-
SHA256
6c512d9943a225d686b26fc832589e4c8bef7c4dd0a8bdfd557d5d27fe5bba0f
-
SHA512
2b4898d2d6982917612d04442807bd58c37739b2e4b302c94f41e03e685e24b9183b12de2057b3b303483698ad95e3a37795e6eb6d2d3b71e332b59deeca7d02
-
SSDEEP
6144:GuCInHLhJI4FY/ixjci6ychf8xalGQGtSV41kJDsTDDpBnse6OVxLV/Wo0k:UQL32ikCaUS4csRBse6sfWNk
Score1/10 -
-
-
Target
$PLUGINSDIR/INetC.dll
-
Size
24KB
-
MD5
640bff73a5f8e37b202d911e4749b2e9
-
SHA1
9588dd7561ab7de3bca392b084bec91f3521c879
-
SHA256
c1e568e25ec111184deb1b87cfda4bfec529b1abeab39b66539d998012f33502
-
SHA512
39c6c358e2b480c8cbebcc1da683924c8092fb2947f2da4a8df1b0dc1fdda61003d91d12232a436ec88ff4e0995b7f6ee8c6efbdca935eaa984001f7a72fea0a
-
SSDEEP
384:wv1j9e9dEs+rN+qFLAjNXT37vYnOrvFhSL+ZwcSyekzANZBJ:w1AvEs3HBLzYn29vYh
Score3/10 -
-
-
Target
$PLUGINSDIR/Microsoft.Win32.TaskScheduler.dll
-
Size
124KB
-
MD5
529d605158a6fd888ea989d77785aa5f
-
SHA1
abf553c514b6ce60bb95b5b67d65f3a64d3ddf90
-
SHA256
f8bff4120506bb32b8c4a6a3e4fa31bc70b365b38cf2aa13b160985020b6d3d2
-
SHA512
f0d993ac7a173ff9e88c1993735e77c4d6db0bf4100bbca531a298c9e7953f6c9a53fe61f006d8ff276d707c24fb4856f9bb4a5ca6f534a1ca86b169c1fe3c88
-
SSDEEP
3072:uBCeNh/pcfnLq3wyXYsKRNRwxz+gT37teucRpH0dVrs:uB/w4xQWOcrs
Score1/10 -
-
-
Target
$PLUGINSDIR/Newtonsoft.Json.dll
-
Size
692KB
-
MD5
98cbb64f074dc600b23a2ee1a0f46448
-
SHA1
c5e5ec666eeb51ec15d69d27685fe50148893e34
-
SHA256
7b44639cbfbc8ddac8c7a3de8ffa97a7460bebb0d54e9ff2e1ccdc3a742c2b13
-
SHA512
eb9eabee5494f5eb1062a33cc605b66d051da6c6990860fe4fd20e5b137458277a636cf27c4f133012d7e0efaa5feb6f48f1e2f342008482c951a6d61feec147
-
SSDEEP
12288:p9BzaPm657wqehcZBLX+HK+kPJUQEKx07N0TCBGiBCjC0PDgM5j9FKjc3SH:p8m657w6ZBLmkitKqBCjC0PDgM5CH
Score1/10 -
-
-
Target
$PLUGINSDIR/OWInstaller.exe
-
Size
301KB
-
MD5
0e3b14dc59e65b57eeee705bc9003f2c
-
SHA1
583656f84f9b17441efbd23175638009e638cb26
-
SHA256
86d31a5cec2410c544d7cf5099e6e117da8a9982f7a51e03f1b9b1c3d6eff07a
-
SHA512
06b74c2fdd22fa7172a439ad7b4f40bce707c1653c3e1a99fbe43b0e03e09dd50108ca9980f0b94705295baa8ede9363ff4992dea81209549e094980b908f0d0
-
SSDEEP
6144:jczyBUDsrUODYRVxGxZ9bKFoSIm9u0Uqq2zCpleycm:joc4kYoSO0jF
Score5/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops file in System32 directory
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
-
-
Target
$PLUGINSDIR/OverWolf.Client.CommonUtils.dll
-
Size
648KB
-
MD5
5aed88b663a63e0d7d98f1481521e688
-
SHA1
2e2ff06bd3adfd3418610d49de9e30570bdc4140
-
SHA256
d18fca59c1d678df61964cccd09ca8594f859dc45668677c95616f3abaca9266
-
SHA512
e25c9083a19892dcd8ef53bbf915d5b8bf72509c780a79567752f76fb468c09bbac2b8a9acd6b03954820b09ef9a29f8dea183539f3af4665ef5a5497e38bd64
-
SSDEEP
12288:GIdIkrU4WLWY5smdHlAdHBcb1nB0LFixTl7RnAv3:KzlOVM1nBoFYl9Av3
Score1/10 -
-
-
Target
$PLUGINSDIR/SharpRaven.dll
-
Size
80KB
-
MD5
20422fc722b26cfbb8d68252ddc70fc9
-
SHA1
642792a565ce5cb9a3383cd6e6f96e88af0046b0
-
SHA256
83bccd15b4117050fbda0d6db992efede3cfaee7fdfbe167714b8d8c62a19380
-
SHA512
c2f8747164c303df05b77e5a03a87b23119617745403c0319b59a1d934f72b8d9c2c9d5ef7ba2a3a130cca46b2d0213b0a3b0e6aa9f8ff3df190976993a8e171
-
SSDEEP
1536:1a9qjviI1YjOrfRK9bvyyfpHbnzDwkk7PC3hi:1EuqI1lRKbvyyB7nlkn
Score1/10 -
-
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
7399323923e3946fe9140132ac388132
-
SHA1
728257d06c452449b1241769b459f091aabcffc5
-
SHA256
5a1c20a3e2e2eb182976977669f2c5d9f3104477e98f74d69d2434e79b92fdc3
-
SHA512
d6f28ba761351f374ae007c780be27758aea7b9f998e2a88a542eede459d18700adffe71abcb52b8a8c00695efb7ccc280175b5eeb57ca9a645542edfabb64f1
-
SSDEEP
192:eF2HS5ih/7i00dWz9T7PH6lOFcQMI5+Vw+bPFomi7dJWsP:rSUmlw9T7DmnI5+N273FP
Score3/10 -
-
-
Target
$PLUGINSDIR/UserInfo.dll
-
Size
4KB
-
MD5
9301577ff4d229347fe33259b43ef3b2
-
SHA1
5e39eb4f99920005a4b2303c8089d77f589c133d
-
SHA256
090c4bc8dc534e97b3877bd5115eb58b3e181495f29f231479f540bab5c01edc
-
SHA512
77dc7a1dedaeb1fb2ccefaba0a526b8d40ea64b9b37af53c056b9428159b67d552e5e3861cbffc2149ec646fdfe9ce94f4fdca51703f79c93e5f45c085e52c79
Score3/10 -
-
-
Target
$PLUGINSDIR/app/cmp.html
-
Size
5KB
-
MD5
d7b8b31b190e552677589cfd4cbb5d8e
-
SHA1
09ffb3c63991d5c932c819393de489268bd3ab88
-
SHA256
6c21e8c07ce28327dca05f873d73fe85d5473f9b22a751a4d3d28931f5d0c74f
-
SHA512
32794507a4b9a12e52ceb583222cb93300e38c634a72ea3f51a0189127aba60cf476fb7918942355a4f826185d7071e876cb40348ba34cf5d1ca7e9546ccb310
-
SSDEEP
48:t9rc0/GLAoShbEHaLKNGiNQtvmolOGR36tgtr/GTvJP8AscaV4LiMt7ByBZXGz+p:4VLjHa2NGiivmmpWsBVutFwAk5vSG
Score3/10 -
-
-
Target
$PLUGINSDIR/app/index.html
-
Size
20KB
-
MD5
c7b752acf6d1e10f3aca2c67b1ccf4d3
-
SHA1
ab793cb43e0c2b5af0fdcbf90d0d29d5d3e164f7
-
SHA256
69b9f99f6611f953d94984ac35bdaf9e9817f689e1e3614976bebe3465c613fc
-
SHA512
120addd79b7ade4f35b426c02631c8167d81080fde30a01b989453113f7547784e525d53bede41ede0c9b3caca8513060753ba51f75bf6936d32ee597d642576
-
SSDEEP
192:8sdqpDNDPkFHmY74+/qmtRCtmK8W9I2gHHMlxh8B39LJ/Hab48JgJnc5w/93mJ8D:+WNaM8UnbjPk89+mppHL
Score3/10 -
-
-
Target
$PLUGINSDIR/app/js/app.js
-
Size
21KB
-
MD5
de88fce9253d26e0c61daa1783baa775
-
SHA1
07c5848354a247056baad369059aac9d3c940ecc
-
SHA256
993f140f9f4e5cdbdcc657a3c159328bf58b3483dbc27c451516a556763a79ba
-
SHA512
71ddd47ef7ed7c02fb31e8ffa2ea6d1b5178dbda2ab37bac208e088c8ba2127e0cf5eaa74ee7ad5809fa69e534853312c6c8775c68aeda63bf0e4a5caefa39b7
-
SSDEEP
384:4X+ycDQrcljKdZGb9plmt902wjI3A4nzwF52xxYRifG6wBEoR3FGHWdeLj8T:0+ycDQYlOdEbdmXH3A4nzIAnGifG11RL
Score3/10 -
-
-
Target
$PLUGINSDIR/app/js/block_inputs.js
-
Size
789B
-
MD5
b5b52c92b90f4283a761cb8a40860c75
-
SHA1
7212e7e566795017e179e7b9c9bf223b0cdb9ec2
-
SHA256
f8dbd6793b35f7a26806f4dabad157aaafdf6d66fad094b50c77d60f223fd544
-
SHA512
16ad53ede5424ca1384e3caea25225589e9eec9e80e2d845948802db90fad222f709a7b651cd7601a34ba67a0627433f25764638fd542cbd4612871308e7b353
Score3/10 -
-
-
Target
$PLUGINSDIR/app/js/libs/cmp.bundle.js
-
Size
346KB
-
MD5
931c0aea91b1daf5c4936edac6a4ca1a
-
SHA1
78c35061126c76a97a42df7b8ca0639ae52712a8
-
SHA256
630a2295e409485e27a06aac96a49f04d553f3ba299799e26a496776d3583325
-
SHA512
a237db9a0d973d5a07d36b98586d099b4a9277ff125f8cdda52f515bd5d1ce0fe82bc0ca8e3f9396a7eea625e8d8da0b5c39963b580320ca7a6eb5f461e017f4
-
SSDEEP
3072:vSDSLzJgixPFNRISHo2kDkNAJOQSPXwGtkLxrtQ8OaxPyf:bxgixP+28kNvwGtspi
Score3/10 -
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1