Overview
overview
10Static
static
3DupeMix Se....0.exe
windows7-x64
7DupeMix Se....0.exe
windows10-2004-x64
10$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3$PLUGINSDIR/app-64.7z
windows7-x64
7$PLUGINSDIR/app-64.7z
windows10-2004-x64
1locales/sv.pak
windows7-x64
3locales/sv.pak
windows10-2004-x64
3locales/sw.pak
windows7-x64
3locales/sw.pak
windows10-2004-x64
3locales/ta.pak
windows7-x64
3locales/ta.pak
windows10-2004-x64
3locales/te.pak
windows7-x64
3locales/te.pak
windows10-2004-x64
3locales/th.pak
windows7-x64
3locales/th.pak
windows10-2004-x64
3locales/tr.pak
windows7-x64
3locales/tr.pak
windows10-2004-x64
3locales/uk.ps1
windows7-x64
3locales/uk.ps1
windows10-2004-x64
3locales/ur.pak
windows7-x64
3locales/ur.pak
windows10-2004-x64
3locales/vi.pak
windows7-x64
3locales/vi.pak
windows10-2004-x64
3locales/zh-CN.pak
windows7-x64
3locales/zh-CN.pak
windows10-2004-x64
3Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 15:28
Static task
static1
Behavioral task
behavioral1
Sample
DupeMix Setup 1.0.0.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
DupeMix Setup 1.0.0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/WinShell.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/WinShell.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/app-64.7z
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/app-64.7z
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
locales/sv.pak
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
locales/sv.pak
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
locales/sw.pak
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
locales/sw.pak
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
locales/ta.pak
Resource
win7-20241023-en
Behavioral task
behavioral18
Sample
locales/ta.pak
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
locales/te.pak
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
locales/te.pak
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
locales/th.pak
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
locales/th.pak
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
locales/tr.pak
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
locales/tr.pak
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
locales/uk.ps1
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
locales/uk.ps1
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
locales/ur.pak
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
locales/ur.pak
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
locales/vi.pak
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
locales/vi.pak
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
locales/zh-CN.pak
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
locales/zh-CN.pak
Resource
win10v2004-20241007-en
General
-
Target
locales/ta.pak
-
Size
1019KB
-
MD5
a8beab6896018a6d37f9b2e5bdd7a78c
-
SHA1
64310684247219a14ac3ac3b4c8ebaa602c5f03a
-
SHA256
c68b708ba61b3eeab5ae81d9d85d6e9f92e416ecfae92e8de9965608732384df
-
SHA512
73b0a31235bf4b7c5ad673f08717f3b4f03bcdf2a91440ee7228aa78c2d15dd2aed32498e23ded78ec35bc731dbe16b6a1c236a170f2a84123a464857686c7b5
-
SSDEEP
6144:LXNxfybLQ4iFd2n1E+1lhfi5yzntRMcA2i:rffyblEd21Z13i5yzMcA2i
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
AcroRd32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
Processes:
rundll32.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid Process 2320 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid Process 2320 AcroRd32.exe 2320 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid Process procid_target PID 2464 wrote to memory of 2316 2464 cmd.exe 31 PID 2464 wrote to memory of 2316 2464 cmd.exe 31 PID 2464 wrote to memory of 2316 2464 cmd.exe 31 PID 2316 wrote to memory of 2320 2316 rundll32.exe 33 PID 2316 wrote to memory of 2320 2316 rundll32.exe 33 PID 2316 wrote to memory of 2320 2316 rundll32.exe 33 PID 2316 wrote to memory of 2320 2316 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\locales\ta.pak1⤵
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\locales\ta.pak2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\locales\ta.pak"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2320
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5b52c9602d095f3e60a788134a06eeb39
SHA188f2da7688ab1101794e143e81d36ade8127d7af
SHA256d656b43100b3a75ca499e5d0812ce438274d83af805d513a7e015e20b0729a27
SHA512d9f546ed3ac9004baeb1d697d9cd6576ec309e7aa3b22a886166aeeef500185424d61c62450f82ced6f61cae967a3ef4b352e96dad6698c26df0e27823b7ce72