Overview
overview
9Static
static
9Everything...up.exe
windows7-x64
4Everything...up.exe
windows10-2004-x64
4$PLUGINSDI...ng.exe
windows7-x64
6$PLUGINSDI...ng.exe
windows10-2004-x64
6$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3NexusProverka.exe
windows7-x64
3NexusProverka.exe
windows10-2004-x64
3RegScanner.chm
windows7-x64
1RegScanner.chm
windows10-2004-x64
1RegScanner.exe
windows7-x64
1RegScanner.exe
windows10-2004-x64
1shellbag_a...1).exe
windows7-x64
3shellbag_a...1).exe
windows10-2004-x64
3Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 18:13
Static task
static1
Behavioral task
behavioral1
Sample
Everything-1.4.1.1026.x86-Setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Everything-1.4.1.1026.x86-Setup.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Everything/Everything.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Everything/Everything.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
NexusProverka.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
NexusProverka.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
RegScanner.chm
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
RegScanner.chm
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
RegScanner.exe
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
RegScanner.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
shellbag_analyzer_cleaner (1).exe
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
shellbag_analyzer_cleaner (1).exe
Resource
win10v2004-20240802-en
General
-
Target
$PLUGINSDIR/Everything/Everything.exe
-
Size
1.7MB
-
MD5
c665fa0aa5afa3fb41c21afe5884b4f1
-
SHA1
c79bddbea392247a4e88221f53c0e2e30368b614
-
SHA256
fb653fd840b0399cea31986b49b5ceadd28fb739dd2403a8bb05051eea5e5bbc
-
SHA512
743328d688e21f1e19605e82f1abe1b451a4812108fba7b3838b63404f9dd53a693839006cc5176dd070ab5f43de94fa9cdec47805a7e36b01042c9f6c9e4b7f
-
SSDEEP
49152:Qhua8pOpRzsOV9bzmkSMDgOPIOY9ayV9PxCr5:QhudpMHys9
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: Everything.exe File opened (read-only) \??\A: Everything.exe File opened (read-only) \??\B: Everything.exe File opened (read-only) \??\E: Everything.exe File opened (read-only) \??\I: Everything.exe File opened (read-only) \??\K: Everything.exe File opened (read-only) \??\L: Everything.exe File opened (read-only) \??\N: Everything.exe File opened (read-only) \??\X: Everything.exe File opened (read-only) \??\H: Everything.exe File opened (read-only) \??\S: Everything.exe File opened (read-only) \??\U: Everything.exe File opened (read-only) \??\Z: Everything.exe File opened (read-only) \??\G: Everything.exe File opened (read-only) \??\J: Everything.exe File opened (read-only) \??\M: Everything.exe File opened (read-only) \??\W: Everything.exe File opened (read-only) \??\O: Everything.exe File opened (read-only) \??\Q: Everything.exe File opened (read-only) \??\R: Everything.exe File opened (read-only) \??\T: Everything.exe File opened (read-only) \??\V: Everything.exe File opened (read-only) \??\Y: Everything.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Everything.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2736 Everything.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2736 Everything.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2736 Everything.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\Everything\Everything.exe"C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\Everything\Everything.exe"1⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2736