Overview
overview
7Static
static
3Scan_docs#...98.exe
windows10-2004-x64
7Scan_docs#...98.exe
windows11-21h2-x64
7$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows11-21h2-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows11-21h2-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows11-21h2-x64
3$PLUGINSDI...rd.bmp
windows10-2004-x64
7$PLUGINSDI...rd.bmp
windows11-21h2-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows11-21h2-x64
3$SMSTARTUP/32x.exe
windows10-2004-x64
5$SMSTARTUP/32x.exe
windows11-21h2-x64
532x.exe
windows10-2004-x64
532x.exe
windows11-21h2-x64
5uninst.exe.nsis
windows10-2004-x64
3uninst.exe.nsis
windows11-21h2-x64
3Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
12-08-2024 09:38
Static task
static1
Behavioral task
behavioral1
Sample
Scan_docs#84768898.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
Scan_docs#84768898.exe
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/UAC.dll
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win10v2004-20240802-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win11-20240802-en
Behavioral task
behavioral13
Sample
$SMSTARTUP/32x.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral14
Sample
$SMSTARTUP/32x.exe
Resource
win11-20240802-en
Behavioral task
behavioral15
Sample
32x.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral16
Sample
32x.exe
Resource
win11-20240802-en
Behavioral task
behavioral17
Sample
uninst.exe.nsis
Resource
win10v2004-20240802-en
Behavioral task
behavioral18
Sample
uninst.exe.nsis
Resource
win11-20240802-en
General
-
Target
Scan_docs#84768898.exe
-
Size
5.5MB
-
MD5
ce65c8134821032063d54ca07e8a73ae
-
SHA1
13e5fe6fedb20530b1a82733b35b3bc23e9c7b9a
-
SHA256
02ec55a5a2ad775adccd333edd94ac0bd82129a233736f7240044e085b73b0b3
-
SHA512
04e4e45ec86735dba5b9289b887784691e7c6a1d5a912a805c7a8400e10c687a825b97d8c911c715c78d21b8e4551ad3e74b71e1e6df58c2f693c24bd9aa4304
-
SSDEEP
98304:C1kfl3MhgvWbkjpaKqPtUr0MHa35QvBq7E9ZYBtPsxcZE7sCC9:CufligvWIVJqr1p8Bq49ZetPApsCC
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2968 32x.exe -
Loads dropped DLL 1 IoCs
pid Process 4864 Scan_docs#84768898.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2968 32x.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Win64xx\uninst.exe Scan_docs#84768898.exe File created C:\Program Files (x86)\Win64xx\32x.exe Scan_docs#84768898.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Scan_docs#84768898.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4864 wrote to memory of 2968 4864 Scan_docs#84768898.exe 81 PID 4864 wrote to memory of 2968 4864 Scan_docs#84768898.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\Scan_docs#84768898.exe"C:\Users\Admin\AppData\Local\Temp\Scan_docs#84768898.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Program Files (x86)\Win64xx\32x.exe"C:\Program Files (x86)\Win64xx\32x.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.7MB
MD56ab9f278a420ac86fc7ec85647ce99f1
SHA16ef604f5ed1ebe6dcafd038d43469bfffbc17b3c
SHA2564c4872202abb5a60a8764bf44b370578a2b3d6f449b3881e96cc38f1b55f9cda
SHA51213340197d19548bfa2de73b7465032b3afce1acfe58970c3cdae213bb431eed011c1887fe5a6ee59b8708a10fb59b5a497b3b38da80e5d924fb708027638c640
-
Filesize
14KB
MD5adb29e6b186daa765dc750128649b63d
SHA1160cbdc4cb0ac2c142d361df138c537aa7e708c9
SHA2562f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08
SHA512b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada