Overview
overview
8Static
static
1ExxxxSet_up.exe.lnk
windows7-x64
8ExxxxSet_up.exe.lnk
windows10-2004-x64
8UP/ii.dll
windows7-x64
1UP/ii.dll
windows10-2004-x64
1UP/machine_64.dll
windows7-x64
7UP/machine_64.dll
windows10-2004-x64
7UP/psmachi...64.dll
windows7-x64
1UP/psmachi...64.dll
windows10-2004-x64
1UP/updateres_sv.dll
windows7-x64
1UP/updateres_sv.dll
windows10-2004-x64
1General
-
Target
5e276e821f3d3d0aefa466e229fbe8b1ffe92503f41349d2bd1d99e2a11c0a8c.zip
-
Size
25.5MB
-
Sample
241121-qallbasmbx
-
MD5
4ee343ada47e98fdb16cab2157ba4bdd
-
SHA1
0e844700a660eab07d6358d9089b08ffcbe6dfdd
-
SHA256
5e276e821f3d3d0aefa466e229fbe8b1ffe92503f41349d2bd1d99e2a11c0a8c
-
SHA512
a849441365d04e5e7d9f04bfe2c3bddbc6c7a96cd01ea7d65ca54a15b189dac3f74b22154cec3c7aa5be6852730cfc8d0ad66ef0d743011a35f1be7cf5f6fc9f
-
SSDEEP
196608:11xOxOxOxOxOxOxOxOxOxOxOxOxOxOxOxOxOxOxOxOxOxOxUrHLLLLLLLLLLurH9:vYYYYYYYYYYYYYYYYYYYYYYmrOr57
Static task
static1
Behavioral task
behavioral1
Sample
ExxxxSet_up.exe.lnk
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ExxxxSet_up.exe.lnk
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
UP/ii.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
UP/ii.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
UP/machine_64.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
UP/machine_64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
UP/psmachine_arm64.dll
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
UP/psmachine_arm64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
UP/updateres_sv.dll
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
UP/updateres_sv.dll
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
ExxxxSet_up.exe.lnk
-
Size
1KB
-
MD5
87619571a8b1b30c00b74b7c7f0649fe
-
SHA1
443f494bb21ba44fe3b6be107ae37bfd143afe68
-
SHA256
d7c0655c6f1db4acb14bb4c1ddec34ce8f3849c9e0bf9e28d28c8f1c00121fd7
-
SHA512
151234967c65a224d29f1c987d4d2aa5f930cd02da62ed46aef11692a7f4d9a7a05c70cd5e83f0b3831af540fde97ca19912e9ff4d5c6c58583b9aeaa7ff4a3e
Score8/10-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
-
-
Target
UP/ii.dll
-
Size
17.5MB
-
MD5
04312655f1288a6838029eab745ed584
-
SHA1
ccd001dcebb19b6aafcdd3e39f3860d24a59fe2c
-
SHA256
810da0429f85f429581fc1d9c67faf8797493dfab52132679bbcdecf823a42bf
-
SHA512
3d34be3f2ce76f388bb25f578724bb85cddd6a620a38ea107fea459e6c5a445c4b7e962b863ecac968582207ad7cd2266788f522cc5dadf4fa5faff40bb8a60d
-
SSDEEP
393216:s33333333333333333333333333333333333333333333333P:s333333333333333333333333333333f
Score1/10 -
-
-
Target
UP/machine_64.dll
-
Size
390KB
-
MD5
a1e69165b66d05938ab8fc8232edc866
-
SHA1
d0de23e3b6f03068a828e5e4201cc97c051994c2
-
SHA256
5b7345de0b70b8d0cefd4140acf428a5b0ffe5a147adf8a75d981b37fbd81e3a
-
SHA512
b4f94fdcaaad36958a35e194cd20e13c280f5c802c97d3b5813fe13ffc61ca4688a28f93b41e465a3def00fe6b13a6db47ea777418c0b6dfe7fde4a33a33cfbb
-
SSDEEP
6144:QXpzQBQvkr+bAdodpIwXpmuWs+lohHwFP1KkF7oOThiKD:Ql1vOajh8uWxo49KKTr
Score7/10-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
-
-
Target
UP/psmachine_arm64.dll
-
Size
17.2MB
-
MD5
98e0505fc7f9f5662554601973a240f2
-
SHA1
8245a185f2612364347f26d4bf80424a33959091
-
SHA256
142925ca121f0c5c05db78fae96658329f64c5e34b10cca00fe285427a3d8d84
-
SHA512
f89a7dad9cfa1aed1bfba7527079aa49fcc1c1cfe950f68db63c47bdf8f6ac302f65c3b29fa61f0b834dacb7838051780f98ac9fac6316dd0154772b3d395303
-
SSDEEP
393216:63333333333333333333333333333333333333333333333wz:6333333333333333333333333333333c
Score1/10 -
-
-
Target
UP/updateres_sv.dll
-
Size
34.3MB
-
MD5
26395664d06f9186cd231b0188f8b8c5
-
SHA1
4beae3a3735402249754ae594c7e6503c8de20da
-
SHA256
2c337128c782d7bdcf54805df1088532d6bf3a766f6036ba81de96f766dd219c
-
SHA512
45c1275e701d7108af8c3fb23d819b6f2b200e62a0132679b4966d805f0fe16202321b5cdcd62bd21eee57bc05d39719511df89e5a76c0077ff66ed24774062d
-
SSDEEP
786432:6333333333333333333333333333333333333333333333333333333333333333:0
Score1/10 -
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Component Object Model Hijacking
1