Overview
overview
8Static
static
3Setup.exe
windows7-x64
7Setup.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3LetsCorp.exe
windows7-x64
7LetsCorp.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...ss.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3driver/tap0901.sys
windows10-2004-x64
1driver/tapinstall.exe
windows7-x64
1driver/tapinstall.exe
windows10-2004-x64
1launch4.exe
windows7-x64
8launch4.exe
windows10-2004-x64
8Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 23:52
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
LetsCorp.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
LetsCorp.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
driver/tap0901.sys
Resource
win10v2004-20240802-en
Behavioral task
behavioral18
Sample
driver/tapinstall.exe
Resource
win7-20240903-en
Behavioral task
behavioral19
Sample
driver/tapinstall.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral20
Sample
launch4.exe
Resource
win7-20240903-en
Behavioral task
behavioral21
Sample
launch4.exe
Resource
win10v2004-20240802-en
General
-
Target
launch4.exe
-
Size
29.1MB
-
MD5
597cd30fd43bbd1b7860e249061c555f
-
SHA1
676f2f92da2985d62103995d821a1f9012f190f9
-
SHA256
a4bede8f47d510ae66d4a0b63566fbc21a80d3913a99a52030d0b432e343280a
-
SHA512
dcca1170cb026a92ae2f5e159b66f9d30e501e63281a81636d51fd44927fc6da2d8bb6645c993364d3a5915269ef3218842baff042859c5b389a5ef399c2505c
-
SSDEEP
786432:iXSBA738g1a9FccSOUEd7J4xzzLv/xbdqa+nY:DK3a3Swd7Ju7JbdqxnY
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4780 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation launch4.exe -
Executes dropped EXE 1 IoCs
pid Process 3508 p3vYsDL.exe -
Loads dropped DLL 2 IoCs
pid Process 3508 p3vYsDL.exe 3508 p3vYsDL.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WINDOWS = "C:\\Program Files (x86)\\3vYsDLI\\p3vYsDL.exe" launch4.exe -
Drops file in Program Files directory 9 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\3vYsDLI\ launch4.exe File created C:\Program Files (x86)\3vYsDLI\t4d.tmp launch4.exe File created C:\Program Files (x86)\3vYsDLI\templateWatch.dat launch4.exe File created C:\Program Files (x86)\3vYsDLI\p3vYsDL.exe launch4.exe File created C:\Program Files (x86)\3vYsDLI\t3d.tmp launch4.exe File opened for modification C:\Program Files (x86)\3vYsDLI\t3d.tmp launch4.exe File created C:\Program Files (x86)\3vYsDLI\MSVCP140.dll launch4.exe File created C:\Program Files (x86)\3vYsDLI\VCRUNTIME140.dll launch4.exe File opened for modification C:\Program Files (x86)\3vYsDLI\libcef.dll launch4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language launch4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language p3vYsDL.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 p3vYsDL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString p3vYsDL.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe 3508 p3vYsDL.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4780 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 532 wrote to memory of 4780 532 launch4.exe 91 PID 532 wrote to memory of 4780 532 launch4.exe 91 PID 532 wrote to memory of 4780 532 launch4.exe 91 PID 532 wrote to memory of 3508 532 launch4.exe 93 PID 532 wrote to memory of 3508 532 launch4.exe 93 PID 532 wrote to memory of 3508 532 launch4.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\launch4.exe"C:\Users\Admin\AppData\Local\Temp\launch4.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\3vYsDLI' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4780
-
-
C:\Program Files (x86)\3vYsDLI\p3vYsDL.exe"C:\Program Files (x86)\3vYsDLI\p3vYsDL.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77KB
MD59d5a742f221c4929a178baf2b93fc7fb
SHA1928c9e0e1c18ec474c2f450ca00a154e44ac547a
SHA256f10727074bcb4375f276e48da64029d370299768536157321fb4bd9b1997b898
SHA512f4614962c67bb41b8a2fb17e3112745f4ba012bbf382c1cc7deacd6c8525a53d75890a2eb46f0da61bfa054dc52505b09a29291d5fa1c25c6201a66b9dc4b547
-
Filesize
3.0MB
MD5a3e9a318d0bb16091b862f4bf70c73b6
SHA1f3abd6519c705c46ba0e5d6a6bc2f3b48e945d03
SHA2567a5f94516f2dcadf478c6936c234cd9b9d28d3fadc55b346485dc1ef6194f003
SHA5129e1dd2116fc0c3afe4807a717ac08d730f4fd2d9a28628516ea0def7a9b8b7432ecfeda8ad7901ce6137f34b406ed16f72234b8f05228688e356f5fcf64289ac
-
Filesize
874KB
MD5a1e4f7bd3e0e4f4381d48c7cb5aa6d26
SHA1e8f376a709669c5c67486e76214caacb7778a2de
SHA256f280a4887f9f3f20973cf6a254150dd3617e58a06201b955aeba6f04bf4ef5d9
SHA512f5e7f12c01e0ed6d213cde09aac86dc6fbdcc58c54535aaf213e60f36a19b8dc00c56b86230012b1a9f37163b6f9c46c51231b6e2e108bd7a531f54ec3bd5284
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82