Resubmissions

13/10/2024, 14:28

241013-rs5mkswbpl 3

13/10/2024, 14:24

241013-rqvplawapp 7

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2024, 14:24

General

  • Target

    0 Mouse Delay + Input Delay/XMouseButtonControlSetup.2.20.5.exe

  • Size

    2.9MB

  • MD5

    2e9725bc1d71ad1b8006dfc5a2510f88

  • SHA1

    6e1f7d12881696944bf5e030a7d131b969de0c6c

  • SHA256

    2240bf5fb5d80938b0676c46ef9f84bc1739c32f60c473ff85e530ae0eca2818

  • SHA512

    62bd9cde806f83f911f1068b452084ef2adc01bc0dec2d0f668a781cc0d94e39f6e35618264d8796ca205724725abd40429f463017e6ca5caf7d683429f82d39

  • SSDEEP

    49152:n65SJw48kZN+nCYk7c44+Y0hdwn4Km2A5aT/pVE0hYYajihV2Qso0SWMrboF:tfpeno4oY0QZm2dlNJsrHM4

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 2 IoCs
  • Modifies Control Panel 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Modifies registry class 33 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0 Mouse Delay + Input Delay\XMouseButtonControlSetup.2.20.5.exe
    "C:\Users\Admin\AppData\Local\Temp\0 Mouse Delay + Input Delay\XMouseButtonControlSetup.2.20.5.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    PID:1684
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://www.highrez.co.uk/scripts/postinstall.asp?package=XMouse&major=2&minor=20&build=5&revision=0&platform=x64
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1628
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1628 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1508
  • C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe
    "C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe" /Installed /notportable
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Modifies Control Panel
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:1280
  • C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe
    "C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe" /notportable
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:2348

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\BugTrapU-x64.dll

          Filesize

          364KB

          MD5

          80d5f32b3fc515402b9e1fe958dedf81

          SHA1

          a80ffd7907e0de2ee4e13c592b888fe00551b7e0

          SHA256

          0ab8481b44e7d2f0d57b444689aef75b61024487a5cf188c2fc6b8de919b040a

          SHA512

          1589246cd480326ca22c2acb1129a3a90edf13b75031343061f0f4ed51580dfb890862162a65957be9026381bb24475fec6ddcb86692c5961a24b18461e5f1f0

        • C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonHook.dll

          Filesize

          1.0MB

          MD5

          d62a4279ebba19c9bf0037d4f7cbf0bc

          SHA1

          5257d9505cca6b75fe55dfdaf2ea83a7d2d28170

          SHA256

          c845e808dc035329a7c95c846413a7afb9976f09872ba3c05dfa5f492156eef0

          SHA512

          6895a12cddc41bf516279b1235fca238b0b3b0cef2cc25abe14a9160ed23f5bde3d476f885d674537febc7de7eb58b0824d96153c626e1563a5a8a1887fb5323

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          46f845538e3f574643847ad9a47325b1

          SHA1

          9d9a11121da98337a772bb5c24f7dc85400dc30a

          SHA256

          54656dae80b3e0630c80cc3fe703e685e5a6f572a50c9bfcdcc942847b2685f1

          SHA512

          c3f655c7e7d22af57079a9360417bfd8c00d3848e70e6b18c153a886b3dba8a60b421f948a97d14e77fed67a26c7a47fcc9264281684b5c5161303475ce8550f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          343ff0c1c2ce3e76b06aceaa9737b706

          SHA1

          e4a5ecde0ea6622aef9c2bb9256ad100a6077e63

          SHA256

          3cb832e45299fe400ef657a3eb5e1aea8551389909ea7c2c6b80f6e54eb2102f

          SHA512

          2e1d226bb18d21cfd9d3cf89fd5236e9446fdb3cdd655b3b0cefc354f37f9a255047f3aedf22980a265a80438677094029e81095188b1dcced096839142c3bfd

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          f2f771ca01816c8a22e1f755e49f85d8

          SHA1

          a241f3e6fbd1c3e754c8d553535617414cdfb3a4

          SHA256

          6d4c4771e827f84972126db05da223b2dbd9f008694f6f835e91f52da73f0b79

          SHA512

          b797871397155d50f7329c7f59ade60dde83f3bd46e2568cc6f606b6ba5ecd1890a0cb7d8aba0a13cbb17660a26e4fc2b09b818fe2141d1af87b7b4acea12d18

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          0e7b3200dc861ce89247a453c8d6fef0

          SHA1

          4a875c9b270e1e19a65b162bd7782b51d8660e82

          SHA256

          d9920761172f7cded7e23d9499f692785150218996c2f5bfea605af05af7f853

          SHA512

          43e58865a605b52309860d24aeaf14ada007d973d9074dee9c453e7c663bb851ac56cb0a12344f41ef1711928186aca4c8876e5260b78760f2fe48679d488bc4

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          4a3284e2d37c48572b68dbf4b472ff56

          SHA1

          fec6d49187a39273eaa393fb7131a41320281f5f

          SHA256

          707ef55a7ffde284da1220e2f384b32dfd6952066b3232941986c061f8a9bfb3

          SHA512

          0fa52e1b4767fec2c566c5568a22d6e1449e658699bf75026b4d848631bb39b4db7f083087dbf2d9e7bcbe889c785e10f750cc92f3e6db10b4727b20b4402552

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          b2f4e05487b0bd49e3af97a4d7e43ce7

          SHA1

          52092229caa95f61670ff76381606f5a0264f398

          SHA256

          c47e5ee27941af3a68938217ee76f9e5d108f764b8294bf4d5b50b0770a529ef

          SHA512

          95481f9cdddeb133a6990b82282857c3ba2e8b45ea5771b0157a9431ccdfeec434ca5ee2bb28b1a8e0f45ad433be9ab8cef8662601138ee59b4b8ce72e81cc9e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          fbb6f0c1df05abd7c0c274066fdfaf50

          SHA1

          860c1ae870fb9e5055687a51e75a6ad3c07a8977

          SHA256

          d754c3859d8c9e4b73eec4eff4ef54f6989d2f7dfd8456cca20319a283d44815

          SHA512

          8ed62765cf21662f86fd3e2f355b34865e779ee16e0eb966211fec5132672820975ae45bac6f00bd4592643b6f61dc0fb1d8bbf655d091e01f1d3bfaba0c558b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          5dcb370a0344a67b72a52c10855e3131

          SHA1

          4acd7921919abf64c56570751df8c38913f9bbe2

          SHA256

          14169496efbda554d173220a9abecef33a76d756a7ee07eb889d521bf56397f1

          SHA512

          72d5061ac7f5c7f03474ff05caf1c9afeb4c6525752354ea85a822825e7c10004d3ec3a5fe2f1db2a59df9d13ee8793ba67b64e9fb78641d173474d89aaa1134

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          c428a7a0b02bdee06f65bda127d620f1

          SHA1

          c09c197f0fd393cdfc9fdff89bd34eb76e3aa291

          SHA256

          a454ae1198b4b55b1a06547cfe8439e64ab361834d290d135a57edbaeb071192

          SHA512

          23774e5953ca5c0259e18fc0099188dc52826685a030f609d166046781b0a2d1af1b50c338a027c1625c7dad0d954e95fa6584ebb39ac2772331de9ff75d41de

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          525c54a3be499b7647e75a5501954436

          SHA1

          d854d8dca8e202f9619a177fa35ebf0f08b2b5da

          SHA256

          3ae956b1564fbe549cba62542250bd4e564ed098d6132e7a3b4990cdf96e341b

          SHA512

          c00ad260ebb29d55a900bd5f71efe473ae5b9197ec21333fb89d2080a3c3ebcf23adc12d3dfaa77b960ff2a526602858432a34d657c6b981a0c33151d88a17e5

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          97837df30a59238cd2dc1de34f1ca93d

          SHA1

          6bfcd3af6ad43a6081d72a8d05616b2e4fd6fd79

          SHA256

          84a22735022af2e16d77a62b67ac0db5cea4550228512963070a9955d818d9b3

          SHA512

          2579b8b189e16f9b24137287566289d2621fa9d6dc9ce4acaefedf3b7c2f511c8178531a49f3f82569ad74cee6209247d6d1df940d8aa4a94976d3d8673df785

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          dec0085d6934b5b51ebc104fa8ebdb1e

          SHA1

          f0710b63a4610d3b7c78ab862594a3e7198fda60

          SHA256

          c317a7fc203d7b6d67f78a6427ac0bee8b77864803d8141524ec262883437608

          SHA512

          11a27f24816ce5014210f43c943dedcb7bb36d8227ee09eff387ba9702f155fea3a2e0dd2b5711cfd33366c48cb0099e027e5ffba81456d90914c6b557a08efe

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\anyweax\imagestore.dat

          Filesize

          3KB

          MD5

          2f6aa6e332960f86cd1f883b9b210b93

          SHA1

          1bfe7e7f9f3cff62e2cc74f8603c70179fa52468

          SHA256

          066bf656fa402aae10c33b80c88bf9f26dd32db377eac8bc1a65c3646610e455

          SHA512

          99fa9c9aec7c00ace787ba228cf186cdb70a13cea997692608070a5773bcd2fdf42eb338c387a3044e9afe13368f4df6cc537fb5fa911c7956ad34062703fb0e

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Q4648X1K\xmbc[1].ico

          Filesize

          3KB

          MD5

          1279bf31d9659ad2017369ec1b90473c

          SHA1

          0f21c5a8266c36af7909118899e1fa07590f2df8

          SHA256

          74e3162830413f502277c221381f07b34d77a155f5cbeca379e1a4ffc29af116

          SHA512

          18ab594628c7873c56a85cc748585a3422f06d3f3ad70e5d33e86bed8bb9595d43513960731db89820d89b2ed950b48d6b891dbda768164f968ab06f5a86c277

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ROLMKJ86\f[1].txt

          Filesize

          182KB

          MD5

          af953fbfe6cc5c129e6b893f81e24722

          SHA1

          4b1f27eacfed1fd6c92003b48d8180240d765d54

          SHA256

          08a53aaf424f67f364e2190aa18adabbac750eaee8b6b869ce361da5110b6d5c

          SHA512

          d11a98c3978dd24515e396c4c13ae793570d9a69f15525c167fc8cb18561cfe0ec4dc04db67beaef9afb518a6796dc4b9d2ca5aa87e02273fa69b84fb428c98f

        • C:\Users\Admin\AppData\Local\Temp\CabA70B.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\TarA71D.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • C:\Users\Admin\AppData\Local\Temp\nsd567B.tmp\ioSpecial.ini

          Filesize

          696B

          MD5

          9a692cac6e3a659ca070638132e78fe1

          SHA1

          79c802e1ac76aed991953d73713d588cf4a90ef0

          SHA256

          b21f6eae635113e760b920fac76752814a9dc81d2b8992ae4ddae69d503342a1

          SHA512

          0040eed734b48132e8bdd8e74a5a0ce91b2794b22e5ece9bb62b8ff0034d3fd6e3b9ce97b1849f4a04e758a625ea2bb52949ffce80dec2bbce0ceed9f1830404

        • C:\Users\Admin\AppData\Local\Temp\nsd567B.tmp\ioSpecial.ini

          Filesize

          709B

          MD5

          779967e59a97e7bfbb3c571b0ddcdc8f

          SHA1

          908683331bb81cf0040711abd1730aaae6946c17

          SHA256

          4c0df9cdef28837ee68a8b4a854838a64cbffafaeb79fc44d5b01c5968d0a69b

          SHA512

          c12308dfc8cee4927830ce4d4cca3cf2abfaf45e674686e8657104eb25e6c2e4d8a79eb6c0c1ddc6c00019153af38dcc7cf97cfdaf2f80ef0e7b83051871eeb6

        • C:\Users\Admin\AppData\Local\Temp\nsd567B.tmp\ioSpecial.ini

          Filesize

          726B

          MD5

          019e1512cbff00c55280a1cd3323487c

          SHA1

          1a9747597eeaa67ddc87df36210834a39e518deb

          SHA256

          17099e658633eaf89fb826c7a014799f122ac3f6f9dc1c5d0e86a4260382d408

          SHA512

          6d24e44bc3180db6aed2a243e9da3c8933796d611b6ea740454fe1d74dc1e47e7306f1d7815f00fb9053c297052e21cf81fc659cacbbfbf6df4034185188e721

        • C:\Users\Admin\Documents\Persist.xmbcps

          Filesize

          16B

          MD5

          4ae71336e44bf9bf79d2752e234818a5

          SHA1

          e129f27c5103bc5cc44bcdf0a15e160d445066ff

          SHA256

          374708fff7719dd5979ec875d56cd2286f6d3cf7ec317a3b25632aab28ec37bb

          SHA512

          0b6cbac838dfe7f47ea1bd0df00ec282fdf45510c92161072ccfb84035390c4da743d9c3b954eaa1b0f86fc9861b23cc6c8667ab232c11c686432ebb5c8c3f27

        • C:\Users\Admin\Documents\XMouseButtonControl.log

          Filesize

          2KB

          MD5

          ef721f7845f5a8209fcb7344750c506e

          SHA1

          52c5fbfe5f74327d04a00f2f9bfada6c6e109fe0

          SHA256

          01fb1cae4c67b1c8b311129573ea54d37f2a6c84e4717bbc438ad74443fedf1b

          SHA512

          af0a4da5de9a6191d20d160b3a8bd1abb06a061a5b12f5c182507f46408bed6b648754d8f9ce91a51260d435c8b49b8d7af45884f6c284ac421d5e9589cc30d2

        • \Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe

          Filesize

          1.7MB

          MD5

          bb632bc4c4414303c783a0153f6609f7

          SHA1

          eb16bf0d8ce0af4d72dff415741fd0d7aac3020e

          SHA256

          7cc348f8d2ee10264e136425059205cf2c17493b4f3f6a43af024aecb926d8c8

          SHA512

          15b34efe93d53e54c1527705292fbf145d6757f10dd87bc787dc40bf02f0d641468b95c571f7037417f2f626de2afcd68b5d82214e27e9e622ab0475633e9de5

        • \Program Files\Highresolution Enterprises\X-Mouse Button Control\uninstaller.exe

          Filesize

          74KB

          MD5

          bfffc38fff05079b15a5317e279dc7a9

          SHA1

          0c18db954f11646d65d0300e58fefcd9ff7634de

          SHA256

          c4e59737ffd988ef4bc7a62e3316a470b1b09a9889f65908110fba3d7b1c6500

          SHA512

          d30220e024ac242285ea757006e7da3874e5f889951de226d48c372a6a8701b76d4a917134ecc1e72c6c3a8d43444762288e7134a25d837e9f43d972675c81d6

        • \Users\Admin\AppData\Local\Temp\nsd567B.tmp\InstallOptions.dll

          Filesize

          14KB

          MD5

          d753362649aecd60ff434adf171a4e7f

          SHA1

          3b752ad064e06e21822c8958ae22e9a6bb8cf3d0

          SHA256

          8f24c6cf0b06d18f3c07e7bfca4e92afce71834663746cfaa9ddf52a25d5c586

          SHA512

          41bf41add275867553fa3bd8835cd7e2a2a362a2d5670ccbfad23700448bad9fe0f577fb6ee9d4eb81dfc10d463b325b8a873fe5912eb580936d4ad96587aa6d

        • \Users\Admin\AppData\Local\Temp\nsd567B.tmp\ShellExecAsUser.dll

          Filesize

          7KB

          MD5

          86a81b9ab7de83aa01024593a03d1872

          SHA1

          8fd7c645e6e2cb1f1bcb97b3b5f85ce1660b66be

          SHA256

          27d61cacd2995f498ba971b3b2c53330bc0e9900c9d23e57b2927aadfdee8115

          SHA512

          cc37bd5d74d185077bdf6c4a974fb29922e3177e2c5971c664f46c057aad1236e6f3f856c5d82f1d677c29896f0e3e71283ef04f886db58abae151cb27c827ac

        • \Users\Admin\AppData\Local\Temp\nsd567B.tmp\System.dll

          Filesize

          10KB

          MD5

          56a321bd011112ec5d8a32b2f6fd3231

          SHA1

          df20e3a35a1636de64df5290ae5e4e7572447f78

          SHA256

          bb6df93369b498eaa638b0bcdc4bb89f45e9b02ca12d28bcedf4629ea7f5e0f1

          SHA512

          5354890cbc53ce51081a78c64ba9c4c8c4dc9e01141798c1e916e19c5776dac7c82989fad0f08c73e81aaba332dad81205f90d0663119af45550b97b338b9cc3

        • \Users\Admin\AppData\Local\Temp\nsd567B.tmp\nsDialogs.dll

          Filesize

          9KB

          MD5

          f832e4279c8ff9029b94027803e10e1b

          SHA1

          134ff09f9c70999da35e73f57b70522dc817e681

          SHA256

          4cd17f660560934a001fc8e6fdcea50383b78ca129fb236623a9666fcbd13061

          SHA512

          bf92b61aa267e3935f0ea7f47d8d96f09f016e648c2a7e7dcd5ecc47da864e824c592098c1e39526b643bd126c5c99d68a7040411a4cf68857df629f24d4107d

        • memory/1684-232-0x00000000089B0000-0x00000000089B2000-memory.dmp

          Filesize

          8KB