Overview
overview
7Static
static
3disk_recov...up.exe
windows7-x64
7disk_recov...up.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3BlackShark.exe
windows7-x64
1BlackShark.exe
windows10-2004-x64
3Disk Recov...rd.exe
windows7-x64
7Disk Recov...rd.exe
windows10-2004-x64
7FLUSH.exe
windows7-x64
FLUSH.exe
windows10-2004-x64
MIG_29.dll
windows7-x64
3MIG_29.dll
windows10-2004-x64
3PascalStreams.dll
windows7-x64
3PascalStreams.dll
windows10-2004-x64
3StarBurn.dll
windows7-x64
3StarBurn.dll
windows10-2004-x64
3Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3WiaDll.dll
windows7-x64
4WiaDll.dll
windows10-2004-x64
4bs_load.dll
windows7-x64
3bs_load.dll
windows10-2004-x64
3bs_wm.dll
windows7-x64
3bs_wm.dll
windows10-2004-x64
3contmenu.dll
windows7-x64
3contmenu.dll
windows10-2004-x64
3gdiplus.dll
windows7-x64
3gdiplus.dll
windows10-2004-x64
3Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 09:41
Static task
static1
Behavioral task
behavioral1
Sample
disk_recovery_wizard_setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
disk_recovery_wizard_setup.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
BlackShark.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
BlackShark.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Disk Recovery Wizard.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
Disk Recovery Wizard.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
FLUSH.exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
FLUSH.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
MIG_29.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
MIG_29.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
PascalStreams.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
PascalStreams.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
StarBurn.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
StarBurn.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
Uninstall.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Uninstall.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
WiaDll.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
WiaDll.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
bs_load.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
bs_load.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
bs_wm.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
bs_wm.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
contmenu.dll
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
contmenu.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
gdiplus.dll
Resource
win7-20240729-en
Behavioral task
behavioral32
Sample
gdiplus.dll
Resource
win10v2004-20240910-en
General
-
Target
contmenu.dll
-
Size
124KB
-
MD5
e459df19ed02928859602e7ca22faa55
-
SHA1
f0f7da70e1b7eb5dcd5e7a5406e49bf495be722c
-
SHA256
a920b9f0c4b93c525d2d2ad16c2f26206a5b7972830d548d3607296267e647ec
-
SHA512
0c1f67a3099facd28137d1d863d32e6808dfc5cf8f7b55fe677fcf0d3accc3144af829a7dee6a8e9d4ae2f190e63716be55f6ff8f1df2956c858434ead0954ac
-
SSDEEP
3072:ESWowO2QnnUpIfM0QCZSOdISNdbxD//gCjSdZzKs6:PwO2SxMzOiW9Sdx
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0AF221E8-29B6-46EB-B420-DC696F042596} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0AF221E8-29B6-46EB-B420-DC696F042596}\ = "Find and Recover deleted files on you Computer" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0AF221E8-29B6-46EB-B420-DC696F042596}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0AF221E8-29B6-46EB-B420-DC696F042596}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Directory\shellex regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Directory\shellex\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\DiskInternals_Uneraser\ = "{0AF221E8-29B6-46EB-B420-DC696F042596}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0AF221E8-29B6-46EB-B420-DC696F042596}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\contmenu.dll" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Directory\shellex\ContextMenuHandlers regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Directory\shellex\ContextMenuHandlers\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\DiskInternals_Uneraser regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2936 wrote to memory of 2888 2936 regsvr32.exe 82 PID 2936 wrote to memory of 2888 2936 regsvr32.exe 82 PID 2936 wrote to memory of 2888 2936 regsvr32.exe 82
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\contmenu.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\contmenu.dll2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2888
-