Overview
overview
10Static
static
3DupeMix Se....0.exe
windows7-x64
7DupeMix Se....0.exe
windows10-2004-x64
10$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3$PLUGINSDIR/app-64.7z
windows7-x64
7$PLUGINSDIR/app-64.7z
windows10-2004-x64
1locales/sv.pak
windows7-x64
3locales/sv.pak
windows10-2004-x64
3locales/sw.pak
windows7-x64
3locales/sw.pak
windows10-2004-x64
3locales/ta.pak
windows7-x64
3locales/ta.pak
windows10-2004-x64
3locales/te.pak
windows7-x64
3locales/te.pak
windows10-2004-x64
3locales/th.pak
windows7-x64
3locales/th.pak
windows10-2004-x64
3locales/tr.pak
windows7-x64
3locales/tr.pak
windows10-2004-x64
3locales/uk.ps1
windows7-x64
3locales/uk.ps1
windows10-2004-x64
3locales/ur.pak
windows7-x64
3locales/ur.pak
windows10-2004-x64
3locales/vi.pak
windows7-x64
3locales/vi.pak
windows10-2004-x64
3locales/zh-CN.pak
windows7-x64
3locales/zh-CN.pak
windows10-2004-x64
3Analysis
-
max time kernel
103s -
max time network
21s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 15:28
Static task
static1
Behavioral task
behavioral1
Sample
DupeMix Setup 1.0.0.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
DupeMix Setup 1.0.0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/WinShell.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/WinShell.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/app-64.7z
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/app-64.7z
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
locales/sv.pak
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
locales/sv.pak
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
locales/sw.pak
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
locales/sw.pak
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
locales/ta.pak
Resource
win7-20241023-en
Behavioral task
behavioral18
Sample
locales/ta.pak
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
locales/te.pak
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
locales/te.pak
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
locales/th.pak
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
locales/th.pak
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
locales/tr.pak
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
locales/tr.pak
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
locales/uk.ps1
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
locales/uk.ps1
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
locales/ur.pak
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
locales/ur.pak
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
locales/vi.pak
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
locales/vi.pak
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
locales/zh-CN.pak
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
locales/zh-CN.pak
Resource
win10v2004-20241007-en
General
-
Target
locales/sv.pak
-
Size
376KB
-
MD5
bbe0785c5f9591e8a1e7c4830fe949d6
-
SHA1
da4f3286079d50e1c04e923529e03e7d334c7fff
-
SHA256
0ad84f6f95fd7505862278a7c1c92d00a7e7dd4a765569e9c3086f55c1d7059d
-
SHA512
38bab6f3a6c9395d3b57e63168045ad2e8188b2f04751a15253e7226ec3043c9678a77be1eb27a3b2e751934a024f3ffc89fffd9f1e229e19638be318b53e961
-
SSDEEP
6144:M4pIcHsEAjiwshcB7xopq/4LLXru9M9SOxDE/xUDvZv5pB5mEgb7:BpIcsV9Bxq5/5mz
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
AcroRd32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
Processes:
rundll32.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid Process 2936 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid Process 2936 AcroRd32.exe 2936 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid Process procid_target PID 2388 wrote to memory of 2916 2388 cmd.exe 30 PID 2388 wrote to memory of 2916 2388 cmd.exe 30 PID 2388 wrote to memory of 2916 2388 cmd.exe 30 PID 2916 wrote to memory of 2936 2916 rundll32.exe 31 PID 2916 wrote to memory of 2936 2916 rundll32.exe 31 PID 2916 wrote to memory of 2936 2916 rundll32.exe 31 PID 2916 wrote to memory of 2936 2916 rundll32.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\locales\sv.pak1⤵
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\locales\sv.pak2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\locales\sv.pak"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2936
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD54423171554c8c3336ca78bd4b319b5a0
SHA17f2b0558d6f8db0657de0a7d5204f58f6defc64c
SHA2565c0c622fcf73e31b9364618c617949fc1a76de0a01b83a04f8ba3f9532fe70d9
SHA51289d259b6c52b1540b907123822ca99725ff211b3665e1f871093d4dafd61e0b90fb229161925f3efabc61ae52d996ad63983119e3ce3be215bbc509b7351bd0a