Overview
overview
8Static
static
3b3fd906d3a...0N.exe
windows7-x64
8b3fd906d3a...0N.exe
windows10-2004-x64
8$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...ow.dll
windows7-x64
3$PLUGINSDI...ow.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3Analysis
-
max time kernel
107s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 16:35
Static task
static1
Behavioral task
behavioral1
Sample
b3fd906d3ac83693fd41e0464ae60650N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b3fd906d3ac83693fd41e0464ae60650N.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/ShutdownAllow.dll
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/ShutdownAllow.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20240802-en
General
-
Target
b3fd906d3ac83693fd41e0464ae60650N.exe
-
Size
132KB
-
MD5
b3fd906d3ac83693fd41e0464ae60650
-
SHA1
c80f17b3f6c10e30acc13a17e1980cdfd653ef26
-
SHA256
4b13d2657da7701589cb9562622039d120c29f00115c2e93ebc7bd27be2e96b4
-
SHA512
50e367f24bbd843ff58affd661d835660821bed474717afd1f837a55b83572d07946da3d4809ef2d2955db19b0fe4ea3bec4eaf8682f3b440c5b42fc4db7cdd9
-
SSDEEP
3072:3QIURTXJcchSVjgcfLJDMGED7Vi6ie4T7W:3smchmjXtDMGUhJ6u
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 2364 YesMessenger-full-installer-sign.exe -
Loads dropped DLL 8 IoCs
pid Process 628 b3fd906d3ac83693fd41e0464ae60650N.exe 628 b3fd906d3ac83693fd41e0464ae60650N.exe 628 b3fd906d3ac83693fd41e0464ae60650N.exe 628 b3fd906d3ac83693fd41e0464ae60650N.exe 2364 YesMessenger-full-installer-sign.exe 2364 YesMessenger-full-installer-sign.exe 2364 YesMessenger-full-installer-sign.exe 2364 YesMessenger-full-installer-sign.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language YesMessenger-full-installer-sign.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b3fd906d3ac83693fd41e0464ae60650N.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x00050000000194fd-30.dat nsis_installer_1 behavioral1/files/0x00050000000194fd-30.dat nsis_installer_2 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2364 YesMessenger-full-installer-sign.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 628 wrote to memory of 2364 628 b3fd906d3ac83693fd41e0464ae60650N.exe 31 PID 628 wrote to memory of 2364 628 b3fd906d3ac83693fd41e0464ae60650N.exe 31 PID 628 wrote to memory of 2364 628 b3fd906d3ac83693fd41e0464ae60650N.exe 31 PID 628 wrote to memory of 2364 628 b3fd906d3ac83693fd41e0464ae60650N.exe 31 PID 628 wrote to memory of 2364 628 b3fd906d3ac83693fd41e0464ae60650N.exe 31 PID 628 wrote to memory of 2364 628 b3fd906d3ac83693fd41e0464ae60650N.exe 31 PID 628 wrote to memory of 2364 628 b3fd906d3ac83693fd41e0464ae60650N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3fd906d3ac83693fd41e0464ae60650N.exe"C:\Users\Admin\AppData\Local\Temp\b3fd906d3ac83693fd41e0464ae60650N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\AppData\Local\Temp\YesMessenger-full-installer-sign.exeC:\Users\Admin\AppData\Local\Temp\YesMessenger-full-installer-sign.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2364
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25KB
MD567fe35eda906060626afc314f5011f55
SHA1f287f20ed6533f7b57717ffbee9b3ab3b4c6c16f
SHA256ed4ceca9a4e64fb682a0c747d90f8608ceca317ba0f6bf7e01ebf7ae1a24b29d
SHA51241bc5f1a32419d8daab9ea279998b092ad1f25aef361a8b6277c7aac4bff9600ae295328048c19d2848123ad842f2254ac5cfedd62351ed60feaf27cd9835b7d
-
Filesize
745B
MD52f4f2a064fff890d50fbf715fc4d00ac
SHA1cef9a77b28f4c96536d8d91d5848b059d8c23aa5
SHA2566cc3b061a7f3b8173e3527917e0295c33da7ce8f1b3b5854e3a8b7164aee6f21
SHA51229a88c199ef3ad03b3776ddcced3da6910b7455f502e001efeb678b9bbbfe28989829974e3b6379dc917af7bbbd62502fe13d3321f65cf64f3d73f2fe9bb80ad
-
Filesize
150KB
MD592cd9923c70c8b70d03dfa69159b0914
SHA17ebaf18718feea9f382e519ec8c994ddebca7670
SHA256dc01930954a61d4e361ce1932f3b5d139d10b5650ad978c01e3055d8290bab90
SHA5122880829f92eb7853343e605973ea0bf0f8e55b454b05c150a5d2193d7bc92a3c8f2c5bb333a8a21526c956a399ebef751ea43a63309d5c27f3927c1e3d289103
-
Filesize
7.5MB
MD52f07ab73e33fd886adb0114a81c275eb
SHA1820e909484250ca6fb4b51e788adcb1b0c898849
SHA25636c9b94cfa84a3b223af3424076ab699533883eea9bd7de45875ae758c1e664b
SHA512bb5a1969a6cdd9021e22c23352530f0185519a3aeece1c20a1a7a85788ff274f111fe046678a658c46c61d7f14da7a63059e8d73d3513ff30d2b4def0cac03bc
-
Filesize
3KB
MD5db401847c04d665a6f83dcafdd6ac23d
SHA1bdbdcf5baaedd62d8d3f471693ef99d1fea60d7a
SHA256c6518731ae740494bdd87c53a43086be7f0ce125f728b2860a014235cd56134e
SHA512c204bcd55d87cabfcdb79ca2230ae0e89425f2c7e67b46d3a04937440cdfbbe3d9cafa5e52a8ab5d4539a3af4710ce44624476fa42602edb23cb549aa77ecd71
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
24KB
MD5eff1d9f80967c384e8d25c5a6369af1f
SHA11bad344a6f8a991e2017d79113e1e54f0dde32b8
SHA2560537e86a8940e8c516330c1e646bf46cb62d79fc5a9add557c5050b40fa9f346
SHA512cc824bcf581182c072df0e59c4d5af73fd5768215e18585e94d15617cda224763b62bd36a24510766e1bd651da05f024e6b6b9b0eaf3b6371f119c508a5a1e18
-
Filesize
14KB
MD5325b008aec81e5aaa57096f05d4212b5
SHA127a2d89747a20305b6518438eff5b9f57f7df5c3
SHA256c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b
SHA51218362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf
-
Filesize
7KB
MD580e34b7f576b710d100f6e7c0bed0c2e
SHA12b5b895034d41ee0d0d01bf650594ad0d1346662
SHA256569d62345f6c915236772fa2575d1806cd2bfe089505807cb477618f1eeccf99
SHA512f5970c192b7089040fd1cf26e5cab131879b91722dff0216cdc735f9cfde1eda061409b579eb0f11e3b32e5513e34bbedd4050b75bb1b2acc81be814c2c6c59b