Overview
overview
9Static
static
3Panel.exe
windows7-x64
9Panel.exe
windows10-2004-x64
9$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/app-64.7z
windows7-x64
3$PLUGINSDIR/app-64.7z
windows10-2004-x64
3$PLUGINSDI...7z.dll
windows7-x64
3$PLUGINSDI...7z.dll
windows10-2004-x64
3Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-es -
resource tags
arch:x64arch:x86image:win7-20240903-eslocale:es-esos:windows7-x64systemwindows -
submitted
03-09-2024 21:45
Static task
static1
Behavioral task
behavioral1
Sample
Panel.exe
Resource
win7-20240729-es
Behavioral task
behavioral2
Sample
Panel.exe
Resource
win10v2004-20240802-es
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20240903-es
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240802-es
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-es
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-es
Behavioral task
behavioral7
Sample
$PLUGINSDIR/app-64.7z
Resource
win7-20240903-es
Behavioral task
behavioral8
Sample
$PLUGINSDIR/app-64.7z
Resource
win10v2004-20240802-es
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win7-20240903-es
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win10v2004-20240802-es
General
-
Target
$PLUGINSDIR/app-64.7z
-
Size
73.2MB
-
MD5
c36c550dda0e59fa6cefbd1735a4a70f
-
SHA1
d614c5ebfb938d03cecfe385a157cdd6b930a0f3
-
SHA256
7c4b9086bef5783ad618fe37ae6bd81969fbceba1cb4527b92601e4546967993
-
SHA512
18e7be1cc169332243eded96bce141b2f50d13458533136fcfe2a77650be45dd603454f757605385f2a4af5560679e47abc655b51d78a6c0010d43bf4a68d6d4
-
SSDEEP
1572864:Hzey87GuGQD1+51FVMGPvkIRsAG0KOG6XP4zxQAgtf56m9pIj:Hzey87MQD12fV+IRsH0jwTC6mDIj
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2604 rundll32.exe 1480 rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2436 AcroRd32.exe 2436 AcroRd32.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2728 wrote to memory of 2604 2728 cmd.exe 31 PID 2728 wrote to memory of 2604 2728 cmd.exe 31 PID 2728 wrote to memory of 2604 2728 cmd.exe 31 PID 2604 wrote to memory of 1480 2604 rundll32.exe 33 PID 2604 wrote to memory of 1480 2604 rundll32.exe 33 PID 2604 wrote to memory of 1480 2604 rundll32.exe 33 PID 1480 wrote to memory of 2436 1480 rundll32.exe 35 PID 1480 wrote to memory of 2436 1480 rundll32.exe 35 PID 1480 wrote to memory of 2436 1480 rundll32.exe 35 PID 1480 wrote to memory of 2436 1480 rundll32.exe 35
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\app-64.7z1⤵
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\app-64.7z2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\app-64.7z3⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\app-64.7z"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2436
-
-
-