Overview
overview
7Static
static
3mphairsetup.exe
windows7-x64
7mphairsetup.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...sh.dll
windows7-x64
3$PLUGINSDI...sh.dll
windows10-2004-x64
3Mwic_32.dll
windows7-x64
3Mwic_32.dll
windows10-2004-x64
3POS58/pos5...DD.dll
windows7-x64
3POS58/pos5...DD.dll
windows10-2004-x64
3POS58/pos5...UI.dll
windows7-x64
3POS58/pos5...UI.dll
windows10-2004-x64
3POS58/pos5...58.dll
windows7-x64
3POS58/pos5...58.dll
windows10-2004-x64
3POS58/pos5...OR.dll
windows7-x64
1POS58/pos5...OR.dll
windows10-2004-x64
1POS58/pos5...IB.dll
windows7-x64
1POS58/pos5...IB.dll
windows10-2004-x64
POS58/pos5...RV.dll
windows7-x64
1POS58/pos5...RV.dll
windows10-2004-x64
1RWic.dll
windows7-x64
3RWic.dll
windows10-2004-x64
3mphair.exe
windows7-x64
4mphair.exe
windows10-2004-x64
4mpsoftup.exe
windows7-x64
3mpsoftup.exe
windows10-2004-x64
3readme.htm
windows7-x64
3readme.htm
windows10-2004-x64
3uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7新云软件.url
windows7-x64
1新云软件.url
windows10-2004-x64
1Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 19:23
Static task
static1
Behavioral task
behavioral1
Sample
mphairsetup.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
mphairsetup.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/advsplash.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/advsplash.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Mwic_32.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
Mwic_32.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
POS58/pos58_2000_xp/I386/RASDD.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
POS58/pos58_2000_xp/I386/RASDD.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
POS58/pos58_2000_xp/I386/RASDDUI.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
POS58/pos58_2000_xp/I386/RASDDUI.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
POS58/pos58_2000_xp/POS58.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
POS58/pos58_2000_xp/POS58.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
POS58/pos58_win98/DMCOLOR.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
POS58/pos58_win98/DMCOLOR.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
POS58/pos58_win98/ICONLIB.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
POS58/pos58_win98/ICONLIB.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
POS58/pos58_win98/UNIDRV.dll
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
POS58/pos58_win98/UNIDRV.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
RWic.dll
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
RWic.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
mphair.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
mphair.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
mpsoftup.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
mpsoftup.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
readme.htm
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
readme.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
uninst.exe
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
uninst.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
新云软件.url
Resource
win7-20240729-en
Behavioral task
behavioral32
Sample
新云软件.url
Resource
win10v2004-20240802-en
General
-
Target
mpsoftup.exe
-
Size
144KB
-
MD5
5093d7c2be3a91017227c8d56eefdd27
-
SHA1
97bdce70648d689928541cb303048b288162c45f
-
SHA256
e485042508de9cf5b5c49feb1f18be753bf8f2cb8bf5658cc9272b9de0861962
-
SHA512
76b516e933cfe8a5d54d9c33ce06337c549927388187878966f5852a3a604d6c546f999fce96d6d5de388fa9c23542678fd31c30296d7cb0523a5a8f8e3570b5
-
SSDEEP
3072:GmjBb/xWeCqVEzO30ZfwU+bdFaSQ4ubd+XY1xHQsyVQAR29:GI/xXCqV8iYfp+bdYJ+o19Q/M9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mpsoftup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ielowutil.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1227059287" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d03c27529200db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0682e529200db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31129746" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1229715763" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432415574" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31129746" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003f945ed72d44d3489ac9a36be9e2e8b10000000002000000000010660000000100002000000074dc1545337d8651fe1ff02c95da6087cc8be04caf861445248642e96c7f1b2a000000000e80000000020000200000008b282634e562ee4ccbddc0187a2a7771b7f0d6792cd0ac58b487df3475d8a9de200000007edef74e32648b0a21db57a6e95752c31c30e01a6e1f523b60921c1ffb07b2d240000000cc376c2c09e207b2208ffdc1fcef5525bee7bc7752243b8aedccf292beb219a8a1ba03bd2570e986ca3b5b848613308b795f1fdbf6dfa666c50d8a70b41c6f09 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31129746" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{74C10C7D-6C85-11EF-9A03-D60584CC4361} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1227059287" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003f945ed72d44d3489ac9a36be9e2e8b100000000020000000000106600000001000020000000153daf3cddabbef2667172e12ca064bf9d7a7e241a45aaeebd71b4508aed2fd8000000000e80000000020000200000000d12880aabe1c7856387b17c1ce6797e30e987d6f7f2c5bd1fb6ad998a73d036200000001e7b75ac0732eda1fa3b6f4f6fd061d41fe0ef7ce0097b3aaff4ae035249b38e40000000d78826e758211fb07118d56119df770ab6faaa9bf5405dc8b8dcf8c0ef4786713d543f0b7fdf7817b6e2626b5ba1b5e521f2fe72a5c9730da89318fccb132f2c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3316 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3316 iexplore.exe 3316 iexplore.exe 1424 IEXPLORE.EXE 1424 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3316 wrote to memory of 1424 3316 iexplore.exe 88 PID 3316 wrote to memory of 1424 3316 iexplore.exe 88 PID 3316 wrote to memory of 1424 3316 iexplore.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\mpsoftup.exe"C:\Users\Admin\AppData\Local\Temp\mpsoftup.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2428
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵
- System Location Discovery: System Language Discovery
PID:4472
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3316 CREDAT:17410 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1424
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5ba1bf8cf86ec57057637af172911cd13
SHA132daf654da1afadd3021d486164516318295debf
SHA25677fb6880c4ae2e78d705501c19c9cd4a4d3d2f9e42d45e313561caa0b6c832e0
SHA51246780dd891659bde9eb87f07c857a43de3de9eccc53077b437282d1dd0c1339321399b0faa4cc2a6534396cdd4d358209bfe1f9622bda1e5681acef2b9c4a255
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD58372ab0fc49032de93d957e1bf63625a
SHA128c3e8b105f6b9a2bdec074ce7b7d2603289751c
SHA25644d60e659e1c5babb5613d37359cb5e25e679a9153bfb7087d5496b4248e1b2b
SHA512594200daf5bf0b5aba5068af29414fb2c09e511cdf366baba25b5cccc373ba00e850b5e07b250c5271b59f42b93e55ac0be4d16b30b6cbb15e9357775c0048bd
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee