Overview
overview
10Static
static
3DupeMix Se....0.exe
windows7-x64
7DupeMix Se....0.exe
windows10-2004-x64
10$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3$PLUGINSDIR/app-64.7z
windows7-x64
7$PLUGINSDIR/app-64.7z
windows10-2004-x64
1locales/sv.pak
windows7-x64
3locales/sv.pak
windows10-2004-x64
3locales/sw.pak
windows7-x64
3locales/sw.pak
windows10-2004-x64
3locales/ta.pak
windows7-x64
3locales/ta.pak
windows10-2004-x64
3locales/te.pak
windows7-x64
3locales/te.pak
windows10-2004-x64
3locales/th.pak
windows7-x64
3locales/th.pak
windows10-2004-x64
3locales/tr.pak
windows7-x64
3locales/tr.pak
windows10-2004-x64
3locales/uk.ps1
windows7-x64
3locales/uk.ps1
windows10-2004-x64
3locales/ur.pak
windows7-x64
3locales/ur.pak
windows10-2004-x64
3locales/vi.pak
windows7-x64
3locales/vi.pak
windows10-2004-x64
3locales/zh-CN.pak
windows7-x64
3locales/zh-CN.pak
windows10-2004-x64
3Analysis
-
max time kernel
102s -
max time network
21s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 15:28
Static task
static1
Behavioral task
behavioral1
Sample
DupeMix Setup 1.0.0.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
DupeMix Setup 1.0.0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/WinShell.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/WinShell.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/app-64.7z
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/app-64.7z
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
locales/sv.pak
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
locales/sv.pak
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
locales/sw.pak
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
locales/sw.pak
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
locales/ta.pak
Resource
win7-20241023-en
Behavioral task
behavioral18
Sample
locales/ta.pak
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
locales/te.pak
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
locales/te.pak
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
locales/th.pak
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
locales/th.pak
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
locales/tr.pak
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
locales/tr.pak
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
locales/uk.ps1
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
locales/uk.ps1
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
locales/ur.pak
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
locales/ur.pak
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
locales/vi.pak
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
locales/vi.pak
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
locales/zh-CN.pak
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
locales/zh-CN.pak
Resource
win10v2004-20241007-en
General
-
Target
locales/th.pak
-
Size
792KB
-
MD5
293ad7c20c22d744e4db0fb001ec45bb
-
SHA1
486c9e0732306a45aceb633da2b3ded281197620
-
SHA256
d67d68f24d3347e244a7e8c3b63d47f18fcf37258256f48dad785cf98bb560fa
-
SHA512
ac2b2dd82095925b3229958e89dcf5283bdce0273734a0c338f5a1aa8b014644806ca517f0fc2003669910e58fedf9c2ca7a009fa3f53d58c07bc5e9191f2e2f
-
SSDEEP
12288:z0O3mMkgs3s5UW4HLRflsjj8sKGs1loIG0EeuLADh7Kle9dPu753ohP09XAyFHyW:Y69K5V5q
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 2820 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid process 2820 AcroRd32.exe 2820 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 2116 wrote to memory of 2960 2116 cmd.exe rundll32.exe PID 2116 wrote to memory of 2960 2116 cmd.exe rundll32.exe PID 2116 wrote to memory of 2960 2116 cmd.exe rundll32.exe PID 2960 wrote to memory of 2820 2960 rundll32.exe AcroRd32.exe PID 2960 wrote to memory of 2820 2960 rundll32.exe AcroRd32.exe PID 2960 wrote to memory of 2820 2960 rundll32.exe AcroRd32.exe PID 2960 wrote to memory of 2820 2960 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\locales\th.pak1⤵
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\locales\th.pak2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\locales\th.pak"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2820
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD58e47bb9c558fa99d19e66997d941d1d1
SHA15b393162e1b04c0b237bbf1014c6553b0428a090
SHA2565e262bdc188829748784baead48cf9f0c57ca32efeaef994ed181ba13ff6188d
SHA512c279d814cb9d63b9503bb8a8ff3f6666e05dbe35c3cec5b46ff4beba4848c97e6b0d79101593d5613fcf3f28273cca8ea00fa28c1297dde034c715af0ba93035