Overview
overview
7Static
static
3ArmCord-3....64.exe
windows7-x64
7ArmCord-3....64.exe
windows10-2004-x64
7$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3ArmCord.exe
windows10-2004-x64
7LICENSES.c...m.html
windows7-x64
3LICENSES.c...m.html
windows10-2004-x64
3d3dcompiler_47.dll
windows10-2004-x64
1ffmpeg.dll
windows10-2004-x64
1libEGL.dll
windows10-2004-x64
1libGLESv2.dll
windows10-2004-x64
1resources/elevate.exe
windows7-x64
3resources/elevate.exe
windows10-2004-x64
3vk_swiftshader.dll
windows10-2004-x64
1vulkan-1.dll
windows10-2004-x64
1$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...7z.dll
windows7-x64
3$PLUGINSDI...7z.dll
windows10-2004-x64
3$R0/Uninst...rd.exe
windows7-x64
7$R0/Uninst...rd.exe
windows10-2004-x64
7Analysis
-
max time kernel
74s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
01/09/2024, 15:36
Static task
static1
Behavioral task
behavioral1
Sample
ArmCord-3.3.0-win-x64.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ArmCord-3.3.0-win-x64.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/WinShell.dll
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/WinShell.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
ArmCord.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral12
Sample
LICENSES.chromium.html
Resource
win7-20240704-en
Behavioral task
behavioral13
Sample
LICENSES.chromium.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral14
Sample
d3dcompiler_47.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
ffmpeg.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral16
Sample
libEGL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
libGLESv2.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral18
Sample
resources/elevate.exe
Resource
win7-20240708-en
Behavioral task
behavioral19
Sample
resources/elevate.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral20
Sample
vk_swiftshader.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
vulkan-1.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240704-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240708-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win7-20240729-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral28
Sample
$R0/Uninstall ArmCord.exe
Resource
win7-20240705-en
Behavioral task
behavioral29
Sample
$R0/Uninstall ArmCord.exe
Resource
win10v2004-20240802-en
General
-
Target
LICENSES.chromium.html
-
Size
9.0MB
-
MD5
f017c462d59fd22271a2c5e7f38327f9
-
SHA1
7e1bbeea6ac2599bd0f08877aa5811d32f1aceb9
-
SHA256
40f314c778851106918aae749d75b2d913984327602a1bfb7ef0cc6443ff2a37
-
SHA512
72177281486f6ec26ccc743b43481c31470c7dd53f17b0a67ac087dded190c2e3dde5570260150c2e9650186a515740af7f81e31965c95bb762340f9ac100c07
-
SSDEEP
24576:G8QQf6Ox6j1newR6Xe1Vmf86k6T6W6r656+eGj7dOp+:fG6eGd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f05a533085fcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000f262bdbc0104f65b49ed52cd9e9774de8551012458ca9477fe7c0639bc4e50e3000000000e80000000020000200000004d9d8ac49c114cb810c03db0f59dc92c9fc207e5c455fec11590417e5690f5f92000000052fd659b77a472cb005d95160c4acbfd345de3f82835b4193b969159bde4245d400000004a07019f0cca9449c829d71d001ac60031f4ae08173dbadf4eadbc30c5f29c40a2ea43a8dc45a5c56125933d7f79a12fbb39bd1621762328dc89d1b5bcf58063 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5A4E16B1-6878-11EF-880F-D61F2295B977} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431367029" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000129d672222a01bc884f1a2aba2a711ad5e8ec98d5d6ea25eb7369b64fa974311000000000e8000000002000020000000dee062d352360c4cf02080f72225656ab39fa843c05a61b5dd94c34d80275c0890000000bb280b0066149326430892f36932cfb3057a7ca5f636853afd86cf1173dd6b84c90b39697562111eacde53cc5060aa8550e2e95ff14296f8b6e96061103d3a10f5146e81a4fa6b28c6876cae0522300fbcbf47c0332a1fcdd77b702148f23b72233a4640282c85c55685f350a946859eac591ce19c21862bfecee992dfd901ed1d69809a3b38a7b7534602baff0d8284400000007fea57cf0531e9953238761c791802fd0d06e39b25e5ce552078cb70aac246d1d2b324777e233515ad47211d058ce72fcdc5f318da16986408e0b21ae5e7eb6e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2288 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2288 iexplore.exe 2288 iexplore.exe 1836 IEXPLORE.EXE 1836 IEXPLORE.EXE 1836 IEXPLORE.EXE 1836 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2288 wrote to memory of 1836 2288 iexplore.exe 30 PID 2288 wrote to memory of 1836 2288 iexplore.exe 30 PID 2288 wrote to memory of 1836 2288 iexplore.exe 30 PID 2288 wrote to memory of 1836 2288 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\LICENSES.chromium.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2288 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e254efe1ec7af57a52f9ebe3c27638bd
SHA169c576633b104d7fef27dcef29ff63d34909bc4c
SHA2565813b01ec3ee653c62ad40816b2f71b80f4fffede3acda6dacec3ef60e172a8d
SHA512d9de212cf66b162d63d33dbaebadd80853565235477e0e13c06651ec04288517d778bdf4d3036c34ab505f2a036c84b04c37746cd5e81cab231bf8ad4170cf2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f5456281690a2731ac34f3277edf8ac
SHA122376edac7ef1c3932495af1dbb98e8a6eb91d57
SHA2566292b4c4a878f40456a5be4799af0c1dd405e5f098642a4b8947f52eb8e22342
SHA512af65d29181294bc00019e2ef77570ccf03a288f5fa2668d0c0721ca2c46811f3221ca4b76f9f2bbae165bfc1979d12ea7322b28bc4446e68522065f8a9396c67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e0a4b6ebed28b5244c5864becc1ad19
SHA1fbbb6d04cf5c9e5c5112bcbfd0649b9b72824b64
SHA256159db2b37b5c6a19c76078e64cd482aee721d9d0937f74b20cb672f13f2af72a
SHA51204b65dc9fb9f6bf4c38289120c17d54d075cb1c0af8cd045947ad085f9ee352bbadcf8701341803a498ae45ab4d5c1ae7098d078032cf9cc60e7aff26c332264
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50060979c8621264ae0460afbc1a4083a
SHA17905bbfbec9ec1f3032853b2a8531d4d964a81d1
SHA2564ead8c6e7e47d59c6042ec4bfcc4c06b74b4d6022090b5c58578a1df5b0edc7a
SHA5124dd2c28453a811a4d91b2d71142c552168b65ba73db16d6da76245173457beff0cbb55d998401cdc671eaeed96ba24faa4a1b32e02343d01dffab0793001e838
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59876efb596e4c86a927eba06aa86975e
SHA1be6e5e9f3b9c355cfb847d7115756a300da51bed
SHA256d0d8cdc34c635569b894add91bb4097ff428b69dd41d2bb1e9bccab655645dd9
SHA512ca5eefca326fde9e4b099a4023b711a0fc378d17de99caea49fe3d4fac467e48abc3378b95bd48a2b7da7d27f0d0ae8fc3bc7344026a82d04ffdd67c5845d250
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a60169f0d4554416e19adec62eb0b8a
SHA1dc64a8e95a8292cfeb0c60b25f57c072389395d0
SHA256f5256c3b72bea98cbede313aa004b25af8158b36161526ffa188bccafa7da783
SHA512972522651c5fe292bd15c2a13ff392c08a1a1863fd1d16bb98a9ae20035fb573322afee0a32655c32091185364cd45a47d9817b39d2b85c5097d38a62d23989c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c5caeb5b98c9ea75edc49df70e9b1e0
SHA1284a9e22f9c74096e722fc199514884541ec1ba5
SHA256dadeb08c11619137a2316ff00a4c34b0c8f778d0bd96d9bd14ef6f811d12368b
SHA5125e9f4a7eda1c185f827a4c74f5cfea516355207fa112bfbb4c5f1d519ea785be29572ed0521134a18de1933e62dca831efdec8e82d87e34b3cfe9822fe10dfc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514aefd466333fa4e836559d508167356
SHA1bc23d30c50b84c429d388539b8974f7221f23b0a
SHA25695deea901db0ba18d3b41ce64c77d35e067f447209f2db755bc146a9373d84f0
SHA512bee5cd188f13f7bbc9f685d4a9ea698e1e719f26b8ae3585991a84498201ea96252076ed3b5a6f45b38abc554773bb3eabdb5b3afde9eaffb8af7da7479be41e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e5b68becff99b931ebb10e071d5b05f
SHA14e702124cffb38acd7c007029bde0e965ab9670b
SHA2566dc82674f816eb9080ae68440d8b6c1265865c18fd9b83a720aca013b5931771
SHA512c8a5f0cab7d3d41c174820a178f413742e14e23303b35cdb541981f22c6c1878ca9e726ada850b0234541a9bf21c6e76d86cdf3f0b619a9ee95d97077efce03b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5094c3af695553d0aacae1392f5f01edb
SHA142dcce2633266897cb9eb9c9e545aba225fe7f07
SHA256f3d76fcd532bf4f2527fa96c41fd434a054d402dcda6568f992a88f3c249d5df
SHA512f037edb8b82f1d68292833b2dd60bb7cff5e3ca47081b537d461992bb8a34ce628071a6a31bf368f9a5f699f20ce6ba3c202db1a0f760e3d096dec5a870a029c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554ffe0838a56032faf639a0d77d5ef09
SHA1633ef0ca53ca70311a20a6bacf12f45aee6cac4d
SHA25687db12c0484a13b4e7ba473fc496e151890f519558711d296ce40e524b5554a2
SHA5125b926b29da36bbdcb952d751e484a025cad4572b84ebd9e6fdacabcbc57e821bdac68c13bf7363db8d480be0a38e4d98fbc0cff0b936e35d482923d22b51d5d5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b