Overview
overview
7Static
static
3FanControl.zip
windows7-x64
7FanControl.zip
windows10-2004-x64
1ADLXWrapper.dll
windows7-x64
1ADLXWrapper.dll
windows10-2004-x64
1Autofac.dll
windows7-x64
1Autofac.dll
windows10-2004-x64
1Emoji.Wpf.dll
windows7-x64
1Emoji.Wpf.dll
windows10-2004-x64
1FanControl.IPC.dll
windows7-x64
1FanControl.IPC.dll
windows10-2004-x64
1FanControl...ry.dll
windows7-x64
1FanControl...ry.dll
windows10-2004-x64
1FanControl...ns.dll
windows7-x64
1FanControl...ns.dll
windows10-2004-x64
1FanControl...es.dll
windows7-x64
1FanControl...es.dll
windows10-2004-x64
1FanControl.exe
windows7-x64
3FanControl.exe
windows10-2004-x64
7GongSoluti...op.dll
windows7-x64
1GongSoluti...op.dll
windows10-2004-x64
1Google.Protobuf.dll
windows7-x64
1Google.Protobuf.dll
windows10-2004-x64
1Grpc.Core.Api.dll
windows7-x64
1Grpc.Core.Api.dll
windows10-2004-x64
1GrpcDotNet...es.dll
windows7-x64
1GrpcDotNet...es.dll
windows10-2004-x64
1HidSharp.dll
windows7-x64
1HidSharp.dll
windows10-2004-x64
1LibreHardw...ib.dll
windows7-x64
1LibreHardw...ib.dll
windows10-2004-x64
1MaterialDe...rs.dll
windows7-x64
1MaterialDe...rs.dll
windows10-2004-x64
1Analysis
-
max time kernel
121s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 18:02
Static task
static1
Behavioral task
behavioral1
Sample
FanControl.zip
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
FanControl.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
ADLXWrapper.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
ADLXWrapper.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Autofac.dll
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
Autofac.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Emoji.Wpf.dll
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
Emoji.Wpf.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
FanControl.IPC.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
FanControl.IPC.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
FanControl.Library.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
FanControl.Library.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
FanControl.Plugins.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
FanControl.Plugins.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
FanControl.Resources.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
FanControl.Resources.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
FanControl.exe
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
FanControl.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
GongSolutions.WPF.DragDrop.dll
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
GongSolutions.WPF.DragDrop.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Google.Protobuf.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Google.Protobuf.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Grpc.Core.Api.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Grpc.Core.Api.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
GrpcDotNetNamedPipes.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
GrpcDotNetNamedPipes.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
HidSharp.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
HidSharp.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
LibreHardwareMonitorLib.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
LibreHardwareMonitorLib.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
MaterialDesignColors.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
MaterialDesignColors.dll
Resource
win10v2004-20241007-en
General
-
Target
FanControl.exe
-
Size
1.3MB
-
MD5
9b94d3f94fae042147cbe5dc8009370f
-
SHA1
3116e6fa60f5cd0d580ff748d6ae0499e7534ff2
-
SHA256
6d99e5b8af7bd2312f7d3aa2e42514ceb40ed3203dfc669558e8d5d0879c724b
-
SHA512
1ee4b0a0d5a5eee964f20f875b6c0254086b4ac2925e47be64e943e4bff97be2b536ebb787dd9390160649ccda6a29f3134800901880458c407695186c5dab71
-
SSDEEP
6144:ny2M4ziRCIr+bDy/oUMs2p+pGv1xPGUD5p7aQNwul3k8+uiOiK6kU2SPSC5rII2e:ny2M/CIr+bG/oE2cI/uUjtNu/rf/3pP
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "438374101" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0db74cf3f3cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F7831991-A832-11EF-B5D6-4625F4E6DDF6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a1d2a0641feb3a44a6341c1ceb56f5f2000000000200000000001066000000010000200000007736249fb413601eafe6182aedb9587ff3485d1bd5bb9cf5e75b1f57a035ab41000000000e80000000020000200000008d854eb4801bbaf002e87bb82d541dcaa3c725df3676f002df9f42d2b181fad12000000020d4f8cd01816fa3fb7301b39dd07c04853d750fb72aa5a1556664ee2f3b1a7f400000005413c400c98fdd9564fd39afcd45ee609b8c8487cdb4a53e7a7df37b0eb9ed25ff36f3317062d67b4b740eb4da0c9498a6c417d013f73246a0186277d4802df2 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2000 iexplore.exe 2000 iexplore.exe 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2000 2296 FanControl.exe 28 PID 2296 wrote to memory of 2000 2296 FanControl.exe 28 PID 2296 wrote to memory of 2000 2296 FanControl.exe 28 PID 2000 wrote to memory of 1808 2000 iexplore.exe 29 PID 2000 wrote to memory of 1808 2000 iexplore.exe 29 PID 2000 wrote to memory of 1808 2000 iexplore.exe 29 PID 2000 wrote to memory of 1808 2000 iexplore.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\FanControl.exe"C:\Users\Admin\AppData\Local\Temp\FanControl.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch&plcid=0x409&o1=.NETFramework,Version=v4.8&processName=FanControl.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.02⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2000 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1808
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58466e75e84acbfacaacdfd1a31f110aa
SHA14229fe543bd116c4d5fa50b4fcbb6bac672ad932
SHA2568ac1cdaf5897b59d9d070f8f80a802d24bfd64902b392103780eae888a1dc390
SHA512e66a0a2412e070d3ea41012ebc3fe2b4180d667f2d2a1082528f34c22d53637223ef5070b5ee154affcb3e6793044c1d7d1305aefa3590dbf27857d8adf71c0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0fd32214e785aa47408f45b3aa350f5
SHA18821a84e9ee971fc830f154c3e7c24dd066be569
SHA256760517f6767cb6f771772a2fd5cfb908a93aac832e2ee2d1310b25e45c8e1e16
SHA51227bf0a3dcb4d0e76b4dd227f965f703f604adeae5df39b1fcaca59518a9802a923188bce4af3b4fe22564b54695325dc570b5b182292fbe0d989db0e7ca2c7c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543245ef3975f9bdb681d4d5533a9ce70
SHA1acf6f6ed8d0b6c307f0abdf6ed78e5ee980660ea
SHA2561334eab0575628eeb5edaf76f54b8677cb1641d847cd6b90942fc698d6ce3b71
SHA512bb7f67d08f31cd157e47bfe2a7dacaca15ef9c1526101c25723dacdcff8e7e7dc86a957d7362118cc7a8d6be544037a009ad84ba6fb2b35b474dba76727b4cfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ef7da64d718f23fde3fb2e736776dc4
SHA1d7a995df767d4de2fdc950d3f5f2bac98b7b1244
SHA256eb95e9c339a1b652125496b43661e97ee40140ecb2585867b6b9d2c136b3eb56
SHA5129e4ea51cb09c34bfd048fecbe7278cd3d0bd73c6492a40dd74c8b57851055045620245d4461f58e3d7e998e3bedca2df2141a6665d1f682b59bf74265c6fa621
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fa4b2d11d86e325eee1d90aa00ddf89
SHA17d216c13caadd23c9f09f32313ce7c1008f0a8b2
SHA256238fa6ed0e49a2afb1876065b62a88cd5eb75450f488ce2e44f04da95fda4c20
SHA5122ceed4e368fec9869453b010f40aa4a8134d99c15f33fa64cfad2dcb4f52c9d55a82674ff87d1bd4038b252fa973f1342b9531f8284f64b9a54a22ad00176a72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544cfc0e4639b01e36519d71a9df9fb6f
SHA1bb2e2f1c84bd5e7db30fa2aa879b5b50ecbb3e6b
SHA256e562fe0a632bdb6046fbd09046e462c3e06c04e630613620cf4b65f48f149c13
SHA512a53fdac2c11977866bc3b180423299c440d7412f2cc257c783715455b06e5184a9408cae34693e3651352452069a0b2f9b00ba7fc1615d9286c3869edf86137d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524869ef34398104383f64361743c32e0
SHA1503eead3f86f3abdc0233884b42a64071338490c
SHA25636e640c28915f8195f0f016838d008a00a848385c15f280b9c23524f7d76b6fc
SHA512ed44b59e4f6a6b9b8202aa24c21957272b57fe0b75b28abf6243636e6d7266c1d91b2f8c5cac134e7547fc7a884aef1849281d0ecee69e2469a84094469953e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597e703ae0d4241e9bcc29a759f0f86ac
SHA1bec54f643b54d7d4f66bff6e4a7830dd9ae5189b
SHA2569ef58eaf2a262debefc2f5eaa7bbc8eef859678d1ae93c01ca5fc8ea7570d926
SHA51229fe853d857c573c88f1fb5c44d032bfebd18103c52715d5054345e8340fec08db63c202d1ed6e5a3cb6b9fd1f53094d8c9dcae6c42132f0b8a5514444ccce74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d9ff18c268bd0dc313c81c5d007e1d9
SHA1b7c5d3beb68c44915ed42521c37fa6ac49edf568
SHA256a4ff490eedf8c8f0d4abf7dcf74d3d61aae3cc912928cb89f10a02e64d21d165
SHA512412aa041bb0c7b0ebb72bd030345d6bad1fae2831c5a064c0c2cf95be69ccbc4a45cc9fe9985b514bd6ebd40d45222ddc7e9cd4136adc2bc7ffcee80ed5757fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b515d2cb32af20a5e1936c484254b31
SHA19e60d032939eab912dca6f6e8ced75594577f4dc
SHA25686030a80ae106f3fa4b93acfb5bbfab950dea54e5bb631b4a7df00df12341fc3
SHA512bffcdd2fd1385bb577349f21dcfb38adf44c3d6f1cea91cfb466631ded8bad95a515f5ca93b19b55f0fbc6bb0cb9bd6e5902611b958c59b2e179f0678336aef6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cea0a5bcd6463a8092dc721b6b8a2768
SHA13be341355b739d70b6ea4e7f3572a11faedc5746
SHA25656e072b589979879ec4280f49fa1feb111a9d1ca5cb49cdac8fb839e46009bfa
SHA51218980ea47640aa18e78efb819c51e446008a6636543a3cafbb7a0b7b8a67a26ca9183a4157335b5c2713e7e3cba6b0a09f00ca0dad018331c5eb3edfc43138d9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b