Overview
overview
8Static
static
7JJSploit.exe
windows11-21h2-x64
$PLUGINSDI...ns.dll
windows11-21h2-x64
3$PLUGINSDI...em.dll
windows11-21h2-x64
3HWiNFO32.dll
windows11-21h2-x64
3Qt5Core.dll
windows11-21h2-x64
3Qt5Gui.dll
windows11-21h2-x64
3Qt5Network.dll
windows11-21h2-x64
3Qt5Svg.dll
windows11-21h2-x64
3Qt5Widgets.dll
windows11-21h2-x64
3ThermaltakeUpdate.exe
windows11-21h2-x64
3X1 RGB.exe
windows11-21h2-x64
8fw/X1 RGB ...te.exe
windows11-21h2-x64
3hidapi.dll
windows11-21h2-x64
3imageformats/qdds.dll
windows11-21h2-x64
3imageformats/qgif.dll
windows11-21h2-x64
3imageforma...ns.dll
windows11-21h2-x64
3imageformats/qico.dll
windows11-21h2-x64
3imageformats/qjp2.dll
windows11-21h2-x64
1imageforma...eg.dll
windows11-21h2-x64
3imageformats/qmng.dll
windows11-21h2-x64
1imageformats/qsvg.dll
windows11-21h2-x64
3imageformats/qtga.dll
windows11-21h2-x64
3imageforma...ff.dll
windows11-21h2-x64
3imageforma...mp.dll
windows11-21h2-x64
3imageforma...bp.dll
windows11-21h2-x64
3libeay32.dll
windows11-21h2-x64
3platforms/...al.dll
windows11-21h2-x64
3platforms/...en.dll
windows11-21h2-x64
3platforms/...ws.dll
windows11-21h2-x64
3ssleay32.dll
windows11-21h2-x64
3uninst.exe
windows11-21h2-x64
7vc_redist.x86.exe
windows11-21h2-x64
7Analysis
-
max time kernel
146s -
max time network
156s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
04/10/2024, 08:17
Static task
static1
Behavioral task
behavioral1
Sample
JJSploit.exe
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
HWiNFO32.dll
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
Qt5Core.dll
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
Qt5Gui.dll
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
Qt5Network.dll
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
Qt5Svg.dll
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
Qt5Widgets.dll
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
ThermaltakeUpdate.exe
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
X1 RGB.exe
Resource
win11-20240802-en
Behavioral task
behavioral12
Sample
fw/X1 RGB Firmware Update.exe
Resource
win11-20240802-en
Behavioral task
behavioral13
Sample
hidapi.dll
Resource
win11-20240802-en
Behavioral task
behavioral14
Sample
imageformats/qdds.dll
Resource
win11-20240802-en
Behavioral task
behavioral15
Sample
imageformats/qgif.dll
Resource
win11-20240802-en
Behavioral task
behavioral16
Sample
imageformats/qicns.dll
Resource
win11-20240802-en
Behavioral task
behavioral17
Sample
imageformats/qico.dll
Resource
win11-20240802-en
Behavioral task
behavioral18
Sample
imageformats/qjp2.dll
Resource
win11-20240802-en
Behavioral task
behavioral19
Sample
imageformats/qjpeg.dll
Resource
win11-20240802-en
Behavioral task
behavioral20
Sample
imageformats/qmng.dll
Resource
win11-20240802-en
Behavioral task
behavioral21
Sample
imageformats/qsvg.dll
Resource
win11-20240802-en
Behavioral task
behavioral22
Sample
imageformats/qtga.dll
Resource
win11-20240802-en
Behavioral task
behavioral23
Sample
imageformats/qtiff.dll
Resource
win11-20240802-en
Behavioral task
behavioral24
Sample
imageformats/qwbmp.dll
Resource
win11-20240802-en
Behavioral task
behavioral25
Sample
imageformats/qwebp.dll
Resource
win11-20240802-en
Behavioral task
behavioral26
Sample
libeay32.dll
Resource
win11-20240802-en
Behavioral task
behavioral27
Sample
platforms/qminimal.dll
Resource
win11-20240802-en
Behavioral task
behavioral28
Sample
platforms/qoffscreen.dll
Resource
win11-20240802-en
Behavioral task
behavioral29
Sample
platforms/qwindows.dll
Resource
win11-20240802-en
Behavioral task
behavioral30
Sample
ssleay32.dll
Resource
win11-20240802-en
Behavioral task
behavioral31
Sample
uninst.exe
Resource
win11-20240802-en
Behavioral task
behavioral32
Sample
vc_redist.x86.exe
Resource
win11-20240802-en
General
-
Target
X1 RGB.exe
-
Size
1.8MB
-
MD5
0f58576b89ed4fbc469fb50e1de0b132
-
SHA1
b455cf634d174382a9f38e98e769cb6194e3c26d
-
SHA256
11b8cbedd2b4e2d1d96f3416522efada40d524ae45e734d0e6fac83980b86a53
-
SHA512
b020501021db99ac44f0f70c26c90b261d56c12ac6187d555a343726571f29ff3857ac49044f4d389f0562fc00b212132f1c76192490453ee54c26b51962f070
-
SSDEEP
49152:2MU6aQEeTTPrGFO97TbjdQ5gKCGXwGqKUzIZiLiu6QK7d3:XlRT6FO97Ta5gKCGXwGqzzIMLi3
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\HWiNFO64A.SYS X1 RGB.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1864 4988 WerFault.exe 77 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language X1 RGB.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4988 X1 RGB.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4988 X1 RGB.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2684 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2684 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4988 X1 RGB.exe 4988 X1 RGB.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 4988 X1 RGB.exe 4988 X1 RGB.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4988 X1 RGB.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\X1 RGB.exe"C:\Users\Admin\AppData\Local\Temp\X1 RGB.exe"1⤵
- Drops file in Drivers directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4988 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4988 -s 13482⤵
- Program crash
PID:1864
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004EC 0x00000000000004DC1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4988 -ip 49881⤵PID:2656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21B
MD55fd905c933c0074ab4a9d9af9e3adc7a
SHA1890b41cb511c52ce1a51a1f83c7832c37c9a24de
SHA256843bde256c350f22899a769808285919ae6a5477030de3a7d9d6862471cd2057
SHA512cbd6e5ffa74ec0bf3f40ac43cb0f427f9c7c0afa1255d4bb216f4c7b925af9d4d2003c0cd3d122d83e8b64a79d4f9247f1c4cef7d3e568fe6ed83a342216f8a9
-
Filesize
26KB
MD5ef558a02d734a1403583e95cceec2487
SHA1799bd9b507484bd02c6795f463609f65540a6400
SHA256f0d052daf48a62e4a90d067bfcb5ee9563804de68d0ea82e0e11c8d16ad19d29
SHA51222d1869be7b9acf62a266df42c750feea905265d48b642c6de04ae61485eed0454b3f04b658152d6495f7c1c8498ea545f4069ce6131d526a758bcca03a64753